mirror of
https://github.com/cliffe/SecGen.git
synced 2026-02-21 11:18:06 +00:00
lab updates
This commit is contained in:
100
scenarios/labs/introducing_attacks/2_malware_msf_payloads.xml
Normal file
100
scenarios/labs/introducing_attacks/2_malware_msf_payloads.xml
Normal file
@@ -0,0 +1,100 @@
|
||||
<?xml version="1.0"?>
|
||||
|
||||
<scenario xmlns="http://www.github/cliffe/SecGen/scenario"
|
||||
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
||||
xsi:schemaLocation="http://www.github/cliffe/SecGen/scenario">
|
||||
|
||||
<name>Malware and an Introduction to Metasploit and Payloads</name>
|
||||
<author>Z. Cliffe Schreuders</author>
|
||||
<description>
|
||||
# Introduction
|
||||
This week we will cover the ever present danger of malicious code, the problems with the traditional approaches such as anti-malware, and you will try your hand at using the Metasploit Framework to create a Trojan horse program.
|
||||
|
||||
# Lecture
|
||||
[Slides here](http://z.cliffe.schreuders.org/presentations/slides/DSL_DS_OSPT_Lectures_2_Malware.html)
|
||||
|
||||
# Reading
|
||||
[Chapter 23 "Protecting Against Programmed Threats": Garfinkel, S. and Spafford, G. and Schwartz, A. (2003), Practical Unix and Internet Security, O'Reilly. (ISBN-10: 0596003234) Available online via the library](http://www.dawsonera.com.ezproxy.leedsbeckett.ac.uk/depp/reader/protected/external/AbstractView/S9781449310325)
|
||||
|
||||
Suggested:
|
||||
|
||||
Chapter 3 "Program Security": Pfleeger, C.P. and Pfleeger, S.L. (2007), Security in Computing, Prentice Hall. (ISBN-10: 0132390779)
|
||||
|
||||
Chapter 19 "Malicious Logic": Bishop, M. (2005), Introduction to Computer Security, Addison-Wesley. (ISBN-10: 0321247442)
|
||||
# Lab
|
||||
[Lab sheet here](https://docs.google.com/document/d/1QsOLdqwBP6njIoKbeQRdattbLBLPFCB-eKHW0OxdE8U/edit?usp=sharing).
|
||||
</description>
|
||||
|
||||
<type>lab-sheet</type>
|
||||
<difficulty>easy</difficulty>
|
||||
|
||||
|
||||
<system>
|
||||
<system_name>windows_victim</system_name>
|
||||
<base platform="windows" distro="7"/>
|
||||
|
||||
<input into_datastore="IP_addresses">
|
||||
<!-- 0 windows desktop -->
|
||||
<value>172.16.0.2</value>
|
||||
<!-- 1 kali -->
|
||||
<value>172.16.0.3</value>
|
||||
</input>
|
||||
|
||||
<utility module_path=".*parameterised_accounts" platform="windows">
|
||||
<input into="accounts" into_datastore="accounts">
|
||||
<generator type="account">
|
||||
<input into="username">
|
||||
<generator type="random_word_generator">
|
||||
<input into="wordlist">
|
||||
<value>mythical_creatures</value>
|
||||
</input>
|
||||
</generator>
|
||||
</input>
|
||||
<input into="password">
|
||||
<value>tiaspbiqe2r</value>
|
||||
</input>
|
||||
<input into="super_user">
|
||||
<value>true</value>
|
||||
</input>
|
||||
<input into="strings_to_leak">
|
||||
<generator type="random_line_generator">
|
||||
<input into="linelist">
|
||||
<value>secrets</value>
|
||||
</input>
|
||||
</generator>
|
||||
</input>
|
||||
<input into="leaked_filenames">
|
||||
<value>my_secret.txt</value>
|
||||
</input>
|
||||
</generator>
|
||||
</input>
|
||||
</utility>
|
||||
|
||||
<network type="private_network">
|
||||
<input into="IP_address">
|
||||
<datastore access="0">IP_addresses</datastore>
|
||||
</input>
|
||||
</network>
|
||||
</system>
|
||||
|
||||
<system>
|
||||
<system_name>kali</system_name>
|
||||
<base distro="Kali" name="MSF"/>
|
||||
|
||||
<input into_datastore="kali_root_account">
|
||||
<value>{"username":"root","password":"toor","super_user":"","strings_to_leak":[],"leaked_filenames":[]}</value>
|
||||
</input>
|
||||
|
||||
<utility module_path=".*metasploit_framework"/>
|
||||
<utility module_path=".*handy_cli_tools"/>
|
||||
<service module_path=".*apache"/>
|
||||
<utility module_path=".*nmap"/>
|
||||
|
||||
<network type="private_network" >
|
||||
<input into="IP_address">
|
||||
<datastore access="1">IP_addresses</datastore>
|
||||
</input>
|
||||
</network>
|
||||
</system>
|
||||
|
||||
</scenario>
|
||||
Reference in New Issue
Block a user