Commit Graph

703 Commits

Author SHA1 Message Date
thomashaw
cdd1358664 Future proofing Faker modules with symbol parameters (deprecated calls break with faker gem newer than 3.0.0).
(cherry picked from commit 7a30703348)
2023-02-17 10:26:19 +00:00
thomashaw
3d6cd4e72d flags fix2 2022-11-14 10:02:39 +00:00
thomashaw
4042101c0a flags fix 2022-11-13 14:04:15 +00:00
thomashaw
cb1b8ff6ec random password 2022-11-13 14:00:28 +00:00
thomashaw
7574f9278b Auto login as challenger - easier than making participants use a password. 2022-11-09 16:23:39 +00:00
thomashaw
bfd037774d Reverting message to crackme user, sending to challenger is sufficient (with wall). 2022-11-09 10:30:53 +00:00
thomashaw
3dcc101e47 Testing with dynamic passwords from build. 2022-11-07 15:00:01 +00:00
thomashaw
b96406cd34 removed backticks 2022-11-02 15:43:53 +00:00
thomashaw
eee2b67710 Adding flag messages. Updated the messages so that they're less linear according to Cliffe's feedback.
Still TODO:  programatically disable notifications from system messages / wall

then pretty much good to go!
2022-11-02 14:26:22 +00:00
thomashaw
d91a5d8d17 Adding flag messages. Test this.
Still TODO: Update the messages so that they're less linear according to Cliffe's feedback, programatically disable notifications from system messages / wall, then pretty much good to go!
2022-11-02 14:15:46 +00:00
thomashaw
3d5862c63a send msg to kali instead of hackme-desktop (maybe do both? test on box.) 2022-10-28 21:58:33 +01:00
thomashaw
b0bf417444 enable root login for kali 2022-10-28 21:56:29 +01:00
thomashaw
48242ed742 testing scenario as challenger->challenger sending 2022-10-28 17:56:59 +01:00
thomashaw
38189c081e CSL: AES Lab (wip 2/?) 2022-10-24 11:16:48 +01:00
thomashaw
9697ab10ab CSL: AES Lab (wip) 2022-10-24 11:07:05 +01:00
thomashaw
ba22de39cf Goal message granular mappings (WiP) 2022-09-06 22:27:35 +01:00
thomashaw
7144dd8637 granluar mappings wip 2022-09-06 21:33:14 +01:00
thomashaw
98f8e15968 granluar mappings wip 2022-09-06 21:17:18 +01:00
thomashaw
0161754b34 Goal message granular mappings (WiP) 2022-09-06 20:13:11 +01:00
thomashaw
c64d6103de message_actioner: Distinction between client and aaa server root passwords to test 2022-08-29 20:48:53 +01:00
thomashaw
50ffd27b6e adding test flags scenario to dev branch 2022-08-17 10:58:23 +01:00
thomashaw
3339432d9b Fixing scenario + adding an error message for if a file within '/' is monitored as a goal. 2022-04-21 15:15:57 +01:00
thomashaw
5a20a036c0 updating aaa_client too... 2022-02-23 19:52:27 +00:00
thomashaw
5be33225d7 updated auditbeat config to track system logins and user changes 2022-02-23 17:31:13 +00:00
thomashaw
9be18e8201 updating test scenario... 2022-02-22 13:51:22 +00:00
thomashaw
fc42affef1 fixing typo + updating test scenario 2022-02-22 13:47:34 +00:00
Z. Cliffe Schreuders
e464835192 test scenario update, fixing PyYAML install issue... 2022-02-21 13:23:30 +00:00
thomashaw
8c5452a62f scenario fix 2022-02-17 15:59:27 +00:00
thomashaw
5d193d382d Adding the account access rule template... 2022-02-16 17:04:29 +00:00
thomashaw
60d3604efd Dynamic generation of goal flags (and some cleanup, removing goal_flags etc.). 2022-02-16 15:28:59 +00:00
thomashaw
56726d9632 test_scenario.xml update: test symlinks 2022-02-08 16:09:35 +00:00
thomashaw
9a40c2fb32 test_scenario.xml update: only test hidden_file 2022-02-08 15:21:12 +00:00
thomashaw
abae0fa5e5 hidden_file changes: Updating metadata + scenarios for testing w/ static file_path_to_leak passed from scenario 2022-02-08 14:16:53 +00:00
thomashaw
a7251e16f6 added static read_file goal to hidden_file 2022-02-04 10:57:02 +00:00
thomashaw
5960aef159 scenario updates to include web -> hacktivity mapping 2022-02-03 19:48:05 +00:00
thomashaw
1fc034e9ef WebActioner generation update: updated string generation 2022-02-03 19:00:42 +00:00
thomashaw
2fee767b93 WIP - Testing challenger homedir bug... (2) 2022-02-03 15:58:42 +00:00
thomashaw
d86c10cdc4 WIP - Testing challenger homedir bug... (2) 2022-02-03 11:04:57 +00:00
thomashaw
07647250d5 WIP - Testing challenger homedir bug... 2022-02-02 18:59:32 +00:00
thomashaw
d456ee8074 WIP - Testing challenger homedir bug... 2022-02-02 18:38:37 +00:00
thomashaw
af669de939 param accs test scenario 2022-01-31 14:22:32 +00:00
thomashaw
98e75eb4b5 scenarios: hard-coded groups 2022-01-31 13:40:27 +00:00
thomashaw
f4e33d2d17 (wip) adding static flags to test alert trigger -> web request functionality 2021-12-14 22:32:42 +00:00
thomashaw
7f922bf32e experiment_aaa.xml: Moved the location of the flags to the aaa server so that they can be submitted via hacktivity 2021-12-14 20:13:21 +00:00
thomashaw
0d2faf1172 Merge remote-tracking branch 'origin/master' into auto_grading_dev
# Conflicts:
#	lib/helpers/constants.rb
#	lib/templates/Puppetfile.erb
#	secgen.rb
2021-12-14 13:14:20 +00:00
Z. Cliffe Schreuders
ca9172c778 scenario 2021-12-13 15:24:27 +00:00
Z. Cliffe Schreuders
60e855555d nostromo module
Co-Authored-By: Anaas Naveed <Anaas@Naveed>
2021-12-10 16:39:35 +00:00
Z. Cliffe Schreuders
555a1736e6 pachev vuln module and scenarios
Co-Authored-By: Anaas Naveed <Anaas@Naveed>
2021-12-01 12:10:22 +00:00
Z. Cliffe Schreuders
406e65a140 ctf metadata update 2021-11-29 16:20:35 +00:00
Z. Cliffe Schreuders
789d778dd0 lab updates 2021-11-25 16:46:21 +00:00