diff --git a/modules/vulnerabilities/unix/email_phishing/phish_victim_bot/manifests/install.pp b/modules/vulnerabilities/unix/email_phishing/phish_victim_bot/manifests/install.pp index 53139cf8b..cce742917 100644 --- a/modules/vulnerabilities/unix/email_phishing/phish_victim_bot/manifests/install.pp +++ b/modules/vulnerabilities/unix/email_phishing/phish_victim_bot/manifests/install.pp @@ -37,14 +37,11 @@ class phish_victim_bot::install { if $usernames { $usernames.each |$index, $username| { # Create user - if $username != "kali" { - user { $username: - ensure => present, - password => pw_hash($passwords[$index], 'SHA-512', 'bXlzYWx0'), - managehome => true, - before => File["/home/$username/.user.properties"], - } - } + user { $username: + ensure => present, + password => pw_hash($passwords[$index], 'SHA-512', 'bXlzYWx0'), + managehome => true, + } -> file { "/home/$username/.user.properties": ensure => present, owner => $username, @@ -65,28 +62,24 @@ class phish_victim_bot::install { source => 'puppet:///modules/phish_victim_bot/libreoffice-macros-registrymodifications.xcu', } - if $username != "kali" { # run on each boot via cron - cron { "$username-mail": - command => "Xvfb :9$index & export DISPLAY=:9$index && sleep 60 && cd /home/$username && java -cp /opt/mailreader/mail.jar:/opt/mailreader/activation-1.1-rev-1.jar:/opt/mailreader/ MailReader &", - special => 'reboot', - user => $username, - require => User[$username] - } - - ::secgen_functions::leak_files { "$username-mail-file-leak": - storage_directory => "/home/$username", - leaked_filenames => [$leaked_filenames[$index]], - strings_to_leak => [$strings_to_leak[$index]], - owner => $username, - mode => '0600', - leaked_from => "phish_victim_bot-$username", - require => User[$username] - } + cron { "$username-mail": + command => "Xvfb :9$index & export DISPLAY=:9$index && sleep 60 && cd /home/$username && java -cp /opt/mailreader/mail.jar:/opt/mailreader/activation-1.1-rev-1.jar:/opt/mailreader/ MailReader &", + special => 'reboot', + user => $username, } + + ::secgen_functions::leak_files { "$username-mail-file-leak": + storage_directory => "/home/$username", + leaked_filenames => [$leaked_filenames[$index]], + strings_to_leak => [$strings_to_leak[$index]], + owner => $username, + mode => '0600', + leaked_from => "phish_victim_bot-$username", + } + } } - file { '/opt/mailreader/': ensure => directory, owner => 'root', @@ -115,8 +108,9 @@ class phish_victim_bot::install { source => 'puppet:///modules/phish_victim_bot/mail.jar', }-> exec{ 'compile to mailreader class': - path => ['/bin', '/usr/bin', '/usr/local/bin', '/sbin', '/usr/sbin'], - command => "javac -cp /opt/mailreader/mail.jar:/opt/mailreader/activation-1.1-rev-1.jar MailReader.java && chmod 0755 /opt/mailreader/MailReader.class && chown root:root /opt/mailreader/MailReader.class", - cwd => '/opt/mailreader/', + path => ['/bin', '/usr/bin', '/usr/local/bin', '/sbin', '/usr/sbin'], + command => "javac -cp /opt/mailreader/mail.jar:/opt/mailreader/activation-1.1-rev-1.jar MailReader.java && chmod 0755 /opt/mailreader/MailReader.class && chown root:root /opt/mailreader/MailReader.class", + cwd => '/opt/mailreader/', } + } diff --git a/scenarios/labs/cyber_security_landscape/3_phishing.xml b/scenarios/labs/cyber_security_landscape/3_phishing.xml index c71eef8f1..7ae626b56 100644 --- a/scenarios/labs/cyber_security_landscape/3_phishing.xml +++ b/scenarios/labs/cyber_security_landscape/3_phishing.xml @@ -59,7 +59,6 @@ j.addams j.baker j.wilkinson - kali newbie diff --git a/scenarios/labs/workshops/lab_workshop.xml b/scenarios/labs/workshops/lab_workshop.xml index 264886766..0e14dd4c4 100644 --- a/scenarios/labs/workshops/lab_workshop.xml +++ b/scenarios/labs/workshops/lab_workshop.xml @@ -168,7 +168,7 @@ web_server - +