lab updates

This commit is contained in:
Z. Cliffe Schreuders
2020-12-08 12:05:41 +00:00
parent 4aa3635b29
commit 21069b1fc2
2 changed files with 3 additions and 2 deletions

View File

@@ -130,11 +130,12 @@ Randomised instance generated by [SecGen](http://github.com/cliffe/SecGen) (<%=
%>
<%= ERB.new(File.read self.templates_path + $permission_attacks.pop ).result(self.get_binding) %>
<!-- 1x random integrity attack-->
<!-- 2x random integrity attack-->
<%
$integrity_attacks = ['integrity_attack1.xml.erb', 'integrity_attack2.xml.erb', 'integrity_attack3.xml.erb', 'integrity_attack4.xml.erb', 'integrity_attack5.xml.erb', 'integrity_attack6.xml.erb', 'integrity_attack7.xml.erb'].shuffle
%>
<%= ERB.new(File.read self.templates_path + $integrity_attacks.pop ).result(self.get_binding) %>
<%= ERB.new(File.read self.templates_path + $integrity_attacks.pop ).result(self.get_binding) %>
<!--1x network monitoring-->
<%

View File

@@ -8,7 +8,7 @@
<get_shell>false</get_shell>
<post_command></post_command>
<prompt>Create a Snort rule that detects any unencrypted POP3 email *user authentication attempt* (someone trying to log in), to a mail server on <%= $web_server_ip %>. The alert must include the message "<%= $rand_alert4 %>". Up to three flags will be awarded, based on the quality of the rule.</prompt>
<prompt>Create a Snort rule that detects any unencrypted POP3 email *user authentication attempt* (someone trying to log in), to a mail server on <%= $web_server_ip %>. The alert must include the message "<%= $rand_alert4 %>". One flags will be awarded, based on the quality of the rule.</prompt>
<condition>
<output_matches>^--1</output_matches>