thomashaw
cdd1358664
Future proofing Faker modules with symbol parameters (deprecated calls break with faker gem newer than 3.0.0).
...
(cherry picked from commit 7a30703348 )
2023-02-17 10:26:19 +00:00
thomashaw
3d6cd4e72d
flags fix2
2022-11-14 10:02:39 +00:00
thomashaw
4042101c0a
flags fix
2022-11-13 14:04:15 +00:00
thomashaw
cb1b8ff6ec
random password
2022-11-13 14:00:28 +00:00
thomashaw
7574f9278b
Auto login as challenger - easier than making participants use a password.
2022-11-09 16:23:39 +00:00
thomashaw
bfd037774d
Reverting message to crackme user, sending to challenger is sufficient (with wall).
2022-11-09 10:30:53 +00:00
thomashaw
3dcc101e47
Testing with dynamic passwords from build.
2022-11-07 15:00:01 +00:00
thomashaw
b96406cd34
removed backticks
2022-11-02 15:43:53 +00:00
thomashaw
eee2b67710
Adding flag messages. Updated the messages so that they're less linear according to Cliffe's feedback.
...
Still TODO: programatically disable notifications from system messages / wall
then pretty much good to go!
2022-11-02 14:26:22 +00:00
thomashaw
d91a5d8d17
Adding flag messages. Test this.
...
Still TODO: Update the messages so that they're less linear according to Cliffe's feedback, programatically disable notifications from system messages / wall, then pretty much good to go!
2022-11-02 14:15:46 +00:00
thomashaw
3d5862c63a
send msg to kali instead of hackme-desktop (maybe do both? test on box.)
2022-10-28 21:58:33 +01:00
thomashaw
b0bf417444
enable root login for kali
2022-10-28 21:56:29 +01:00
thomashaw
48242ed742
testing scenario as challenger->challenger sending
2022-10-28 17:56:59 +01:00
thomashaw
38189c081e
CSL: AES Lab (wip 2/?)
2022-10-24 11:16:48 +01:00
thomashaw
9697ab10ab
CSL: AES Lab (wip)
2022-10-24 11:07:05 +01:00
thomashaw
ba22de39cf
Goal message granular mappings (WiP)
2022-09-06 22:27:35 +01:00
thomashaw
7144dd8637
granluar mappings wip
2022-09-06 21:33:14 +01:00
thomashaw
98f8e15968
granluar mappings wip
2022-09-06 21:17:18 +01:00
thomashaw
0161754b34
Goal message granular mappings (WiP)
2022-09-06 20:13:11 +01:00
thomashaw
c64d6103de
message_actioner: Distinction between client and aaa server root passwords to test
2022-08-29 20:48:53 +01:00
thomashaw
50ffd27b6e
adding test flags scenario to dev branch
2022-08-17 10:58:23 +01:00
thomashaw
3339432d9b
Fixing scenario + adding an error message for if a file within '/' is monitored as a goal.
2022-04-21 15:15:57 +01:00
thomashaw
5a20a036c0
updating aaa_client too...
2022-02-23 19:52:27 +00:00
thomashaw
5be33225d7
updated auditbeat config to track system logins and user changes
2022-02-23 17:31:13 +00:00
thomashaw
9be18e8201
updating test scenario...
2022-02-22 13:51:22 +00:00
thomashaw
fc42affef1
fixing typo + updating test scenario
2022-02-22 13:47:34 +00:00
Z. Cliffe Schreuders
e464835192
test scenario update, fixing PyYAML install issue...
2022-02-21 13:23:30 +00:00
thomashaw
8c5452a62f
scenario fix
2022-02-17 15:59:27 +00:00
thomashaw
5d193d382d
Adding the account access rule template...
2022-02-16 17:04:29 +00:00
thomashaw
60d3604efd
Dynamic generation of goal flags (and some cleanup, removing goal_flags etc.).
2022-02-16 15:28:59 +00:00
thomashaw
56726d9632
test_scenario.xml update: test symlinks
2022-02-08 16:09:35 +00:00
thomashaw
9a40c2fb32
test_scenario.xml update: only test hidden_file
2022-02-08 15:21:12 +00:00
thomashaw
abae0fa5e5
hidden_file changes: Updating metadata + scenarios for testing w/ static file_path_to_leak passed from scenario
2022-02-08 14:16:53 +00:00
thomashaw
a7251e16f6
added static read_file goal to hidden_file
2022-02-04 10:57:02 +00:00
thomashaw
5960aef159
scenario updates to include web -> hacktivity mapping
2022-02-03 19:48:05 +00:00
thomashaw
1fc034e9ef
WebActioner generation update: updated string generation
2022-02-03 19:00:42 +00:00
thomashaw
2fee767b93
WIP - Testing challenger homedir bug... (2)
2022-02-03 15:58:42 +00:00
thomashaw
d86c10cdc4
WIP - Testing challenger homedir bug... (2)
2022-02-03 11:04:57 +00:00
thomashaw
07647250d5
WIP - Testing challenger homedir bug...
2022-02-02 18:59:32 +00:00
thomashaw
d456ee8074
WIP - Testing challenger homedir bug...
2022-02-02 18:38:37 +00:00
thomashaw
af669de939
param accs test scenario
2022-01-31 14:22:32 +00:00
thomashaw
98e75eb4b5
scenarios: hard-coded groups
2022-01-31 13:40:27 +00:00
thomashaw
f4e33d2d17
(wip) adding static flags to test alert trigger -> web request functionality
2021-12-14 22:32:42 +00:00
thomashaw
7f922bf32e
experiment_aaa.xml: Moved the location of the flags to the aaa server so that they can be submitted via hacktivity
2021-12-14 20:13:21 +00:00
thomashaw
0d2faf1172
Merge remote-tracking branch 'origin/master' into auto_grading_dev
...
# Conflicts:
# lib/helpers/constants.rb
# lib/templates/Puppetfile.erb
# secgen.rb
2021-12-14 13:14:20 +00:00
Z. Cliffe Schreuders
ca9172c778
scenario
2021-12-13 15:24:27 +00:00
Z. Cliffe Schreuders
60e855555d
nostromo module
...
Co-Authored-By: Anaas Naveed <Anaas@Naveed>
2021-12-10 16:39:35 +00:00
Z. Cliffe Schreuders
555a1736e6
pachev vuln module and scenarios
...
Co-Authored-By: Anaas Naveed <Anaas@Naveed>
2021-12-01 12:10:22 +00:00
Z. Cliffe Schreuders
406e65a140
ctf metadata update
2021-11-29 16:20:35 +00:00
Z. Cliffe Schreuders
789d778dd0
lab updates
2021-11-25 16:46:21 +00:00