malware analysis env update: using debian 12 instead of Kali for base using Ghidra

This commit is contained in:
thomashaw
2024-10-02 11:08:03 +01:00
parent cbf85ac3fb
commit f895e0288d

View File

@@ -10,16 +10,14 @@
<type>simulation-environment</type>
<system>
<system_name>kali_linux</system_name>
<base distro="Kali" name="MSF"/>
<system_name>debian</system_name>
<base distro="Debian 12"/>
<input into_datastore="IP_addresses">
<!-- 0 kali -->
<!-- 0 linux desktop -->
<value>172.16.0.2</value>
<!-- 1 linux desktop -->
<!-- 1 windows 7 -->
<value>172.16.0.3</value>
<!-- 2 windows 7 -->
<value>172.16.0.4</value>
</input>
<input into_datastore="user_accounts">
@@ -72,40 +70,15 @@
</system>
<system>
<system_name>debian_10_desk_1</system_name>
<base distro="Debian 10" type="desktop" name="KDE"/>
<system_name>win7_desk_1</system_name>
<base platform="windows" distro="7"/>
<!--generate two accounts, YOU and someone else-->
<utility module_path=".*/parameterised_accounts">
<utility module_path=".*/parameterised_accounts" platform="windows">
<input into="accounts">
<datastore>user_accounts</datastore>
</input>
</utility>
<utility module_path=".*/kde_minimal">
<input into="accounts">
<datastore>user_accounts</datastore>
</input>
<input into="autostart_konsole">
<value>true</value>
</input>
</utility>
<utility module_path=".*/handy_cli_tools"/>
<utility module_path=".*/nmap"/>
<utility module_path=".*/hash_tools"/>
<utility module_path=".*/iceweasel">
<input into="accounts">
<datastore>user_accounts</datastore>
</input>
</utility>
<vulnerability module_path=".*/ssh_root_login">
<input into="root_password">
<datastore>spoiler_admin_pass</datastore>
</input>
</vulnerability>
<network type="private_network" >
<input into="IP_address">
<datastore access="1">IP_addresses</datastore>
@@ -119,27 +92,4 @@
</build>
</system>
<system>
<system_name>win7_desk_1</system_name>
<base platform="windows" distro="7"/>
<utility module_path=".*/parameterised_accounts" platform="windows">
<input into="accounts">
<datastore>user_accounts</datastore>
</input>
</utility>
<network type="private_network" >
<input into="IP_address">
<datastore access="2">IP_addresses</datastore>
</input>
</network>
<build type="cleanup">
<input into="root_password">
<datastore>spoiler_admin_pass</datastore>
</input>
</build>
</system>
</scenario>