This commit is contained in:
Z. Cliffe Schreuders
2021-04-23 09:30:07 +01:00
17 changed files with 188 additions and 9 deletions

View File

@@ -9,6 +9,7 @@
forge "https://forgeapi.puppetlabs.com"
mod 'puppetlabs-stdlib', '4.24.0' # stdlib enables parsejson() in manifests and other useful functions
mod 'puppetlabs-apt', '7.4.0' # pin apt to 7.4.0 as current version is incompatible with our base boxes
mod 'SecGen-secgen_functions', :path => '<%= SECGEN_FUNCTIONS_PUPPET_DIR %>'
<% @currently_processing_system.module_selections.each do |selected_module| -%>

View File

@@ -12,6 +12,33 @@
<type>lab-sheet</type>
<difficulty>intermediate</difficulty>
<CyBOK KA="AAA" topic="Authorisation">
<keyword>access control</keyword>
<keyword>enforcing access control</keyword>
<keyword>ACCESS CONTROL - DAC (DISCRETIONARY ACCESS CONTROL)</keyword>
<keyword>Vulnerabilities and attacks on access control misconfigurations</keyword>
</CyBOK>
<CyBOK KA="MAT" topic="MALCODE/MALWARE">
<keyword>trojan</keyword>
<keyword>backdoor</keyword>
<keyword>TROJANS - BACKDOOR</keyword>
</CyBOK>
<CyBOK KA="OSVS" topic="Primitives for Isolation and Mediation">
<keyword>Access controls and operating systems</keyword>
<keyword>Linux security model</keyword>
<keyword>Unix File Permissions</keyword>
<keyword>filesystems, inodes, and commands</keyword>
<keyword>umask</keyword>
</CyBOK>
<CyBOK KA="OSVS" topic="Primitives for Isolation and Mediation">
<keyword>Access controls and operating systems</keyword>
<keyword>Linux security model</keyword>
<keyword>Linux Extended Access Control Lists (facl)</keyword>
</CyBOK>
<CyBOK KA="OSVS" topic="Role of Operating Systems">
<keyword>mediation</keyword>
</CyBOK>
<system>
<system_name>desktop</system_name>
<base distro="Debian 9" type="desktop" name="KDE"/>

View File

@@ -12,6 +12,33 @@
<type>lab-sheet</type>
<difficulty>intermediate</difficulty>
<CyBOK KA="AAA" topic="Authorisation">
<keyword>access control</keyword>
<keyword>enforcing access control</keyword>
<keyword>ACCESS CONTROL - DAC (DISCRETIONARY ACCESS CONTROL)</keyword>
<keyword>Vulnerabilities and attacks on access control misconfigurations</keyword>
</CyBOK>
<CyBOK KA="MAT" topic="MALCODE/MALWARE">
<keyword>trojan</keyword>
<keyword>backdoor</keyword>
<keyword>TROJANS - BACKDOOR</keyword>
</CyBOK>
<CyBOK KA="OSVS" topic="Primitives for Isolation and Mediation">
<keyword>Access controls and operating systems</keyword>
<keyword>Linux security model</keyword>
<keyword>Unix File Permissions</keyword>
<keyword>filesystems, inodes, and commands</keyword>
<keyword>umask</keyword>
</CyBOK>
<CyBOK KA="OSVS" topic="Primitives for Isolation and Mediation">
<keyword>Access controls and operating systems</keyword>
<keyword>Linux security model</keyword>
<keyword>Linux Extended Access Control Lists (facl)</keyword>
</CyBOK>
<CyBOK KA="OSVS" topic="Role of Operating Systems">
<keyword>mediation</keyword>
</CyBOK>
<system>
<system_name>desktop</system_name>
<base distro="Debian 9" type="desktop" name="KDE"/>

View File

@@ -12,6 +12,18 @@
<type>lab-sheet</type>
<difficulty>intermediate</difficulty>
<CyBOK KA="NS" topic="Network Protocols and Vulnerability">
<keyword>ADDRESS RESOLUTION PROTOCOL(ARP)</keyword>
<keyword>ARP (ADDRESS RESOLUTION PROTOCOL)</keyword>
<keyword>ARP SPOOFING</keyword>
<keyword>MITM (MAN-IN-THE-MIDDLE ATTACK)</keyword>
<keyword>MAN-IN-THE-MIDDLE ATTACK (MITM)</keyword>
<keyword>ATTACK(S) - ARP</keyword>
</CyBOK>
<CyBOK KA="SOIM" topic="Monitor: Data Sources">
<keyword>network traffic</keyword>
</CyBOK>
<system>
<system_name>desktop</system_name>
<base distro="Debian 9" type="desktop" name="KDE"/>

View File

@@ -12,6 +12,17 @@
<type>lab-sheet</type>
<difficulty>intermediate</difficulty>
<CyBOK KA="SOIM" topic="Execute: Mitigation and Countermeasures">
<keyword>Recover data and services after an incident</keyword>
<keyword>BACKUP - DIFFERENTIAL</keyword>
<keyword>BACKUP - INFERENTIAL</keyword>
</CyBOK>
<CyBOK KA="SOIM" topic="INCIDENT RESPONSE">
<keyword>RECOVERY - BACKUPS</keyword>
<keyword>RECOVERY</keyword>
<keyword>BACKUPS</keyword>
</CyBOK>
<system>
<system_name>desktop</system_name>
<base distro="Debian 9" type="desktop" name="KDE"/>

View File

@@ -12,6 +12,17 @@
<type>lab-sheet</type>
<difficulty>intermediate</difficulty>
<CyBOK KA="SOIM" topic="Execute: Mitigation and Countermeasures">
<keyword>Recover data and services after an incident</keyword>
<keyword>BACKUP - DIFFERENTIAL</keyword>
<keyword>BACKUP - INFERENTIAL</keyword>
</CyBOK>
<CyBOK KA="SOIM" topic="INCIDENT RESPONSE">
<keyword>RECOVERY - BACKUPS</keyword>
<keyword>RECOVERY</keyword>
<keyword>BACKUPS</keyword>
</CyBOK>
<system>
<system_name>desktop</system_name>
<base distro="Debian 9" type="desktop" name="KDE"/>

View File

@@ -12,6 +12,21 @@
<type>lab-sheet</type>
<difficulty>intermediate</difficulty>
<CyBOK KA="SS" topic="Categories of Vulnerabilities">
<keyword>memory management vulnerabilities</keyword>
<keyword>Stack smashing buffer overflows</keyword>
</CyBOK>
<CyBOK KA="MAT" topic="Attacks and exploitation">
<keyword>EXPLOITATION</keyword>
<keyword>EXPLOITATION FRAMEWORKS</keyword>
<keyword>Exploit development</keyword>
<keyword>Metasploit Framework development</keyword>
</CyBOK>
<CyBOK KA="SS" topic="Mitigating Exploitation">
<keyword>ASLR (ADDRESS SPACE LAYOUT RANDOMIZATION)</keyword>
<keyword>NON-EXECUTABLE MEMORY</keyword>
</CyBOK>
<system>
<system_name>desktop</system_name>
<base distro="Debian 9" type="desktop" name="KDE"/>

View File

@@ -12,6 +12,14 @@
<type>lab-sheet</type>
<difficulty>intermediate</difficulty>
<CyBOK KA="OSVS" topic="Primitives for Isolation and Mediation">
<keyword>capabilities</keyword>
<keyword>Rule-based controls: Course grained: Linux capabilities</keyword>
</CyBOK>
<CyBOK KA="SOIM" topic="Monitor: Data Sources">
<keyword>network traffic</keyword>
</CyBOK>
<system>
<system_name>desktop</system_name>
<base distro="Debian 9" type="desktop" name="KDE"/>

View File

@@ -12,6 +12,12 @@
<type>lab-sheet</type>
<difficulty>intermediate</difficulty>
<CyBOK KA="SOIM" topic="Monitor: Data Sources">
<keyword>application logs: web server logs and files</keyword>
<keyword>system and kernel logs</keyword>
<keyword>Syslog</keyword>
</CyBOK>
<system>
<system_name>desktop</system_name>
<base distro="Debian 9" type="desktop" name="KDE"/>

View File

@@ -12,6 +12,12 @@
<type>lab-sheet</type>
<difficulty>intermediate</difficulty>
<CyBOK KA="SOIM" topic="Monitor: Data Sources">
<keyword>application logs: web server logs and files</keyword>
<keyword>system and kernel logs</keyword>
<keyword>Syslog</keyword>
</CyBOK>
<system>
<system_name>desktop</system_name>
<base distro="Debian 9" type="desktop" name="KDE"/>

View File

@@ -12,6 +12,13 @@
<type>lab-sheet</type>
<difficulty>intermediate</difficulty>
<!--TODO-->
<CyBOK KA="SOIM" topic="Monitor: Data Sources">
<keyword>application logs: web server logs and files</keyword>
<keyword>system and kernel logs</keyword>
<keyword>Syslog</keyword>
</CyBOK>
<system>
<system_name>desktop</system_name>
<base distro="Debian 9" type="desktop" name="KDE"/>

View File

@@ -12,6 +12,18 @@
<type>lab-sheet</type>
<difficulty>intermediate</difficulty>
<CyBOK KA="NS" topic="Network Defence Tools">
<keyword>packet filters</keyword>
<keyword>intrusion detection systems</keyword>
<keyword>intrusion prevention systems</keyword>
</CyBOK>
<CyBOK KA="SOIM" topic="Execute: Mitigation and Countermeasures">
<keyword>intrusion prevention systems</keyword>
</CyBOK>
<CyBOK KA="SOIM" topic="CM (CONFIGURATION MANAGEMENT)">
<keyword>SSH (SECURE SHELL)</keyword>
</CyBOK>
<system>
<system_name>desktop</system_name>
<base distro="Debian 9" type="desktop" name="KDE"/>

View File

@@ -12,6 +12,10 @@
<type>lab-sheet</type>
<difficulty>intermediate</difficulty>
<CyBOK KA="NS" topic="Network Defence Tools">
<keyword>DEMILITARISED ZONE (DMZ)</keyword>
</CyBOK>
<system>
<system_name>desktop</system_name>
<base distro="Debian 9" type="desktop" name="KDE"/>

View File

@@ -12,6 +12,10 @@
<type>lab-sheet</type>
<difficulty>intermediate</difficulty>
<CyBOK KA="NS" topic="Network Defence Tools">
<keyword>DEMILITARISED ZONE (DMZ)</keyword>
</CyBOK>
<system>
<system_name>desktop</system_name>
<base distro="Debian 9" type="desktop" name="KDE"/>

View File

@@ -1,8 +1,8 @@
<?xml version="1.0"?>
<scenario xmlns="http://www.github/cliffe/SecGen/scenario"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://www.github/cliffe/SecGen/scenario">
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://www.github/cliffe/SecGen/scenario">
<name>Labtainers lab: file-deletion</name>
<author>Z. Cliffe Schreuders</author>
@@ -12,6 +12,11 @@
<type>lab-sheet</type>
<difficulty>intermediate</difficulty>
<CyBOK KA="F" topic="Operating System Analysis">
<keyword>storage forensics</keyword>
<keyword>data recovery and file content carving</keyword>
</CyBOK>
<system>
<system_name>desktop</system_name>
<base distro="Debian 9" type="desktop" name="KDE"/>
@@ -37,8 +42,8 @@
<value>true</value>
</input>
<input into="groups">
<value>docker</value>
</input>
<value>docker</value>
</input>
<input into="leaked_filenames">
<value></value>
</input>
@@ -53,11 +58,11 @@
</input>
<!--Create the groups-->
<utility module_path=".*/groups">
<input into="groups">
<value>docker</value>
</input>
</utility>
<utility module_path=".*/groups">
<input into="groups">
<value>docker</value>
</input>
</utility>
<!--Create the users-->
<utility module_path=".*/parameterised_accounts">
<input into="accounts">

View File

@@ -12,6 +12,19 @@
<type>lab-sheet</type>
<difficulty>intermediate</difficulty>
<CyBOK KA="AAA" topic="Authentication">
<keyword>access control</keyword>
<keyword>Protecting integrity</keyword>
</CyBOK>
<CyBOK KA="F" topic="Operating System Analysis">
<keyword>cryptographic hashing</keyword>
<keyword>storage forensics</keyword>
<keyword>data recovery and file content carving</keyword>
</CyBOK>
<CyBOK KA="SOIM" topic="Monitor: Data Sources">
<keyword>MONITORING - FILE INTEGRITY CHECKERS</keyword>
</CyBOK>
<system>
<system_name>desktop</system_name>
<base distro="Debian 9" type="desktop" name="KDE"/>

View File

@@ -12,6 +12,16 @@
<type>lab-sheet</type>
<difficulty>intermediate</difficulty>
<CyBOK KA="MAT" topic="Attacks and exploitation">
<keyword>EXPLOITATION</keyword>
<keyword>Exploit development</keyword>
<keyword>Mitigation bypass: ASLR</keyword>
</CyBOK>
<CyBOK KA="SS" topic="Categories of Vulnerabilities">
<keyword>memory management vulnerabilities</keyword>
<keyword>Format string attacks</keyword>
</CyBOK>
<system>
<system_name>desktop</system_name>
<base distro="Debian 9" type="desktop" name="KDE"/>