diff --git a/modules/generators/structured_content/hackerbot_config/ids_rules/templates/lab.xml.erb b/modules/generators/structured_content/hackerbot_config/ids_rules/templates/lab.xml.erb index 4fedd0bf1..0e7741760 100644 --- a/modules/generators/structured_content/hackerbot_config/ids_rules/templates/lab.xml.erb +++ b/modules/generators/structured_content/hackerbot_config/ids_rules/templates/lab.xml.erb @@ -145,7 +145,7 @@ Randomised instance generated by [SecGen](http://github.com/cliffe/SecGen) (<%= false - Create a Snort rule that detects any TCP connection attempt to TCP port <%= $rand_port %>. The alert must include the message "<%= $rand_alert1 %>". + Create a Snort rule that detects any TCP connection attempt to TCP port <%= $rand_port %> to <%= $web_server_ip %>. The alert must include the message "<%= $rand_alert1 %>". ^--1 @@ -181,7 +181,7 @@ Randomised instance generated by [SecGen](http://github.com/cliffe/SecGen) (<%= false - Create a Snort rule that detects any packet with the contents "<%= $rand_content1 %>". The alert must include the message "<%= $rand_alert2 %>". + Create a Snort rule that detects any packet with the contents "<%= $rand_content1 %>" to <%= $web_server_ip %>. The alert must include the message "<%= $rand_alert2 %>". ^--1 @@ -219,7 +219,7 @@ Randomised instance generated by [SecGen](http://github.com/cliffe/SecGen) (<%= false - Create a Snort rule that detects any unencrypted POP3 email *user authentication attempt* (someone trying to log in). The alert must include the message "<%= $rand_alert4 %>". Up to three flags will be awarded, based on the quality of the rule. + Create a Snort rule that detects any unencrypted POP3 email *user authentication attempt* (someone trying to log in), to a mail server on <%= $web_server_ip %>. The alert must include the message "<%= $rand_alert4 %>". Up to three flags will be awarded, based on the quality of the rule. ^--1 @@ -231,12 +231,12 @@ Randomised instance generated by [SecGen](http://github.com/cliffe/SecGen) (<%= ^--0.*<%= $rand_alert4 %>.*Classification.*User.*<%= $rand_alert4 %> - :-D Well done! ALL THREE FLAGS!: <%= $flag1 %>, <%= $flag2 %>, <%= $flag3 %>. Could be improved with a meaningful classification. + :-D Well done! ALL THREE FLAGS!: <%= $flag1 %>, <%= $flag2 %>, <%= $flag3 %>. ^--0.*<%= $rand_alert4 %>.*<%= $rand_alert4 %> - 8-) Well done! Two flags: <%= $flag1 %>, <%= $flag2 %>. Could be improved with a classification. + 8-) Well done! Two flags: <%= $flag1 %>, <%= $flag2 %>. Could be further improved with a classification. diff --git a/modules/generators/structured_content/hackerbot_config/ids_rules/templates/random_service_ids_rule.xml.erb b/modules/generators/structured_content/hackerbot_config/ids_rules/templates/random_service_ids_rule.xml.erb index 0c5a2d53f..75d590e25 100644 --- a/modules/generators/structured_content/hackerbot_config/ids_rules/templates/random_service_ids_rule.xml.erb +++ b/modules/generators/structured_content/hackerbot_config/ids_rules/templates/random_service_ids_rule.xml.erb @@ -6,7 +6,7 @@ false - Create a Snort rule that detects any TCP connection attempt to <%= $rand_service1 %> (just the connection attempt, does not require content inspection). The alert must include the message "<%= $rand_alert3 %>". + Create a Snort rule that detects any TCP connection attempt to <%= $rand_service1 %> (just the connection attempt, does not require content inspection) on <%= $web_server_ip %>. The alert must include the message "<%= $rand_alert3 %>". ^--1 diff --git a/scenarios/labs/5_ids_rules.xml b/scenarios/labs/5_ids_rules.xml index ddbde1bc4..6f63989e8 100644 --- a/scenarios/labs/5_ids_rules.xml +++ b/scenarios/labs/5_ids_rules.xml @@ -8,6 +8,13 @@ desktop + + 172.16.0.2 + 172.16.0.3 + 172.16.0.4 + 172.16.0.5 + + @@ -115,13 +122,13 @@ true - http://172.16.0.5 + IP_addresses - 172.16.0.5 + IP_addresses accounts @@ -134,7 +141,11 @@ - + + + IP_addresses + + @@ -169,7 +180,11 @@ - + + + IP_addresses + + @@ -201,7 +216,11 @@ - + + + IP_addresses + + @@ -226,19 +245,23 @@ hackerbot_access_root_password - 172.16.0.3 + IP_addresses - 172.16.0.4 + IP_addresses - 172.16.0.5 + IP_addresses - + + + IP_addresses + +