diff --git a/modules/generators/structured_content/hackerbot_config/ids_rules/templates/lab.xml.erb b/modules/generators/structured_content/hackerbot_config/ids_rules/templates/lab.xml.erb
index 4fedd0bf1..0e7741760 100644
--- a/modules/generators/structured_content/hackerbot_config/ids_rules/templates/lab.xml.erb
+++ b/modules/generators/structured_content/hackerbot_config/ids_rules/templates/lab.xml.erb
@@ -145,7 +145,7 @@ Randomised instance generated by [SecGen](http://github.com/cliffe/SecGen) (<%=
false
- Create a Snort rule that detects any TCP connection attempt to TCP port <%= $rand_port %>. The alert must include the message "<%= $rand_alert1 %>".
+ Create a Snort rule that detects any TCP connection attempt to TCP port <%= $rand_port %> to <%= $web_server_ip %>. The alert must include the message "<%= $rand_alert1 %>".^--1
@@ -181,7 +181,7 @@ Randomised instance generated by [SecGen](http://github.com/cliffe/SecGen) (<%=
false
- Create a Snort rule that detects any packet with the contents "<%= $rand_content1 %>". The alert must include the message "<%= $rand_alert2 %>".
+ Create a Snort rule that detects any packet with the contents "<%= $rand_content1 %>" to <%= $web_server_ip %>. The alert must include the message "<%= $rand_alert2 %>".^--1
@@ -219,7 +219,7 @@ Randomised instance generated by [SecGen](http://github.com/cliffe/SecGen) (<%=
false
- Create a Snort rule that detects any unencrypted POP3 email *user authentication attempt* (someone trying to log in). The alert must include the message "<%= $rand_alert4 %>". Up to three flags will be awarded, based on the quality of the rule.
+ Create a Snort rule that detects any unencrypted POP3 email *user authentication attempt* (someone trying to log in), to a mail server on <%= $web_server_ip %>. The alert must include the message "<%= $rand_alert4 %>". Up to three flags will be awarded, based on the quality of the rule.^--1
@@ -231,12 +231,12 @@ Randomised instance generated by [SecGen](http://github.com/cliffe/SecGen) (<%=
^--0.*<%= $rand_alert4 %>.*Classification.*User.*<%= $rand_alert4 %>
- :-D Well done! ALL THREE FLAGS!: <%= $flag1 %>, <%= $flag2 %>, <%= $flag3 %>. Could be improved with a meaningful classification.
+ :-D Well done! ALL THREE FLAGS!: <%= $flag1 %>, <%= $flag2 %>, <%= $flag3 %>.^--0.*<%= $rand_alert4 %>.*<%= $rand_alert4 %>
- 8-) Well done! Two flags: <%= $flag1 %>, <%= $flag2 %>. Could be improved with a classification.
+ 8-) Well done! Two flags: <%= $flag1 %>, <%= $flag2 %>. Could be further improved with a classification.
diff --git a/modules/generators/structured_content/hackerbot_config/ids_rules/templates/random_service_ids_rule.xml.erb b/modules/generators/structured_content/hackerbot_config/ids_rules/templates/random_service_ids_rule.xml.erb
index 0c5a2d53f..75d590e25 100644
--- a/modules/generators/structured_content/hackerbot_config/ids_rules/templates/random_service_ids_rule.xml.erb
+++ b/modules/generators/structured_content/hackerbot_config/ids_rules/templates/random_service_ids_rule.xml.erb
@@ -6,7 +6,7 @@
false
- Create a Snort rule that detects any TCP connection attempt to <%= $rand_service1 %> (just the connection attempt, does not require content inspection). The alert must include the message "<%= $rand_alert3 %>".
+ Create a Snort rule that detects any TCP connection attempt to <%= $rand_service1 %> (just the connection attempt, does not require content inspection) on <%= $web_server_ip %>. The alert must include the message "<%= $rand_alert3 %>".^--1
diff --git a/scenarios/labs/5_ids_rules.xml b/scenarios/labs/5_ids_rules.xml
index ddbde1bc4..6f63989e8 100644
--- a/scenarios/labs/5_ids_rules.xml
+++ b/scenarios/labs/5_ids_rules.xml
@@ -8,6 +8,13 @@
desktop
+
+ 172.16.0.2
+ 172.16.0.3
+ 172.16.0.4
+ 172.16.0.5
+
+
@@ -115,13 +122,13 @@
true
- http://172.16.0.5
+ IP_addresses
- 172.16.0.5
+ IP_addressesaccounts
@@ -134,7 +141,11 @@
-
+
+
+ IP_addresses
+
+
@@ -169,7 +180,11 @@
-
+
+
+ IP_addresses
+
+
@@ -201,7 +216,11 @@
-
+
+
+ IP_addresses
+
+
@@ -226,19 +245,23 @@
hackerbot_access_root_password
- 172.16.0.3
+ IP_addresses
- 172.16.0.4
+ IP_addresses
- 172.16.0.5
+ IP_addresses
-
+
+
+ IP_addresses
+
+