ATTACKBED

Installation

  • 1. Overview
  • 2. Requirements
  • 3. Prepare repository
  • 4. Configure access to openstack
    • 4.1. Activate the configuration
  • 5. Setting up a python virtual environment
    • 5.1. (Optional) Installing Ansible in the virtual environment
  • 6. Deploy server images
    • 6.1. Download and install base images
    • 6.2. Download and install server images
    • 6.3. Build server images manually
  • 7. Deploy bootstrap
  • 8. Deploy log pipeline
    • 8.1. Architecture
    • 8.2. Configuration
    • 8.3. Deployment
  • 9. Deploy scenario

Tools

  • Testbedrun
    • Using the testbedrun Script
    • Arguments
    • Input YAML File Format
    • Workflow
    • Example Command
  • MITRE Technique & Tactic Counter
    • Installation
    • Usage
    • Arguments
    • Output
    • Example

Scenarios

  • Overview
    • Prepare Ansible
  • Run Attacks
  • Gather Logs
  • Videoserver (Scenario 1)
    • Attacker Steps:
  • Linux Malware (Scenario 2)
    • Attacker Steps:
  • Lateral Movement (Scenario 3)
    • Attacker Steps:
  • Network (Scenario 4)
    • Attacker Steps:
  • LAN Turtle (Scenario 5)
    • Attacker Steps:
  • Client (Scenario 6)
    • Attacker Steps:

Development

  • Overview
    • Purpose
    • Project Structure
    • Getting Started with Development
    • Contributing
  • Attacker Services and Ports
    • Scenario Usage
  • Firewall Connections Per Scenario
    • Firewall Zones and Policies Overview
    • Scenario Connections
ATTACKBED
  • Search


© Copyright 2023, Wolfgang Hotwagner.

Built with Sphinx using a theme provided by Read the Docs.