-
Notifications
You must be signed in to change notification settings - Fork 21
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #354 from Limmen/add_level_15
Level 15 is added, this level has 4 nodes with 1 flag.
- Loading branch information
Showing
6 changed files
with
1,473 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,13 @@ | ||
|
||
# Installs the configuration in the metastore | ||
install: | ||
python config.py --install | ||
|
||
# Uninstalls the configuration from the metastore | ||
uninstall: | ||
python config.py --uninstall | ||
|
||
# Cleans all configuration files | ||
clean_config: | ||
rm -rf ./config.json | ||
rm -rf ./containers |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,47 @@ | ||
# Capture the Flag - Level 15 | ||
|
||
An emulation environment with a set of nodes that run common networked services such as SSH, Kafka, | ||
etc. Some of the services are vulnerable to simple dictionary attacks as they use weak passwords. | ||
The task of an attacker agent is to identify the vulnerabilities and exploit them and discover hidden flags | ||
on the nodes. Conversely, the task of the defender is to harden the defense of the nodes and to detect the | ||
attacker. | ||
|
||
- Number of nodes: 4 | ||
- IDS: Yes (Snort) | ||
- Traffic generation: Yes | ||
- Number of flags: 1 | ||
- Vulnerabilities: SSH, FTP, Telnet servers that can be compromised using dictionary attacks | ||
|
||
## Architecture | ||
<p align="center"> | ||
<img src="env.png" width="600"> | ||
</p> | ||
|
||
|
||
## Useful commands | ||
|
||
```bash | ||
make install # Install the emulation in the metastore | ||
make uninstall # Uninstall the emulation from the metastore | ||
make clean_config # Clean config files | ||
docker container ls --all # list all running containers | ||
docker image ls --all # list all images | ||
docker system prune # remove unused images and containers | ||
docker container prune # remove stopped containers | ||
sudo useradd -rm -d /home/csle_admin -s /bin/bash -g root -G sudo -p "$(openssl passwd -1 'csle@admin-pw_191')" csle_admin | ||
docker run --name=iperf3 -d --restart=unless-stopped -p 5201:5201/tcp -p 5201:5201/udp mlabbe/iperf3 # Start the iperf server on the host | ||
iperf3 -R -c <SERVER> # network performance, where <SERVER> is the IP where the iperf server is running e.g. the host 172.31.212.92 | ||
``` | ||
|
||
## Author & Maintainer | ||
|
||
Kim Hammar <kimham@kth.se> | ||
Forough Shahab <foro@kth.se> | ||
|
||
## Copyright and license | ||
|
||
[LICENSE](../../../../../LICENSE.md) | ||
|
||
Creative Commons | ||
|
||
(C) 2020-2024, Kim Hammar |
Oops, something went wrong.