-
Notifications
You must be signed in to change notification settings - Fork 21
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
13 changed files
with
4,006 additions
and
20 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
10 changes: 10 additions & 0 deletions
10
emulation-system/base_images/docker_files/ovs_base/README.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,10 @@ | ||
# Useful commands | ||
|
||
```bash | ||
ovs-vsctl list-br | ||
ovs-vsctl list-ports <bridge> | ||
ovs-vsctl get-manager <bridge> | ||
ovs-vsctl get-controller <bridge> | ||
ovs-vsctl list <table> | ||
ovsdb-tool show-log | ||
``` |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -47,4 +47,4 @@ Kim Hammar <[email protected]> | |
|
||
Creative Commons | ||
|
||
(C) 2021, Kim Hammar | ||
(C) 2020-2024, Kim Hammar |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,3 @@ | ||
*.zip | ||
*.json | ||
containers |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,13 @@ | ||
|
||
# Installs the configuration in the metastore | ||
install: | ||
python config.py --install | ||
|
||
# Uninstalls the configuration from the metastore | ||
uninstall: | ||
python config.py --uninstall | ||
|
||
# Cleans all configuration files | ||
clean_config: | ||
rm -rf ./config.json | ||
rm -rf ./containers |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,52 @@ | ||
# Level 14 | ||
|
||
An emulation environment with a set of nodes that run common networked services such as SSH, FTP, Telnet, IRC, Kafka, | ||
etc. Some of the services are vulnerable to different network attacks | ||
such as the SambaCry exploit, Shellshock, CVE-2015-1427, CVE-2015-3306, CVE-2016-100033_1,and SQL injection. | ||
Moreover, some nodes are vulnerable to privilege escalation attacks (e.g. CVE-2010-0426 and CVE-2015-5602) | ||
which can be used by the attacker to extend his privileges after compromising the host. | ||
The task of an attacker agent is to identify the vulnerabilities and | ||
exploit them and discover hidden flags | ||
on the nodes. Conversely, the task of the defender is to harden the defense of the nodes and to detect the | ||
attacker. | ||
|
||
- Number of nodes: 17 | ||
- Number of OVS switches: 1 | ||
- Number of SDN controllers: 1 | ||
- IDS: Yes (Snort) | ||
- Traffic generation: Yes | ||
- Number of flags: 12 | ||
- Vulnerabilities: SambaCry, Shellshock, CVE-2015-1427, CVE-2015-3306, CVE-2016-100033_1,and SQL injection., Pengine RCE vulnerability, as well as SSH, FTP, Telnet servers that can be compromised using dictionary attacks | ||
|
||
## Architecture | ||
|
||
<p align="center"> | ||
<img src="env.png" width="600"> | ||
</p> | ||
|
||
## Useful commands | ||
|
||
```bash | ||
make install # Install the emulation in the metastore | ||
make uninstall # Uninstall the emulation from the metastore | ||
make clean_config # Clean config files | ||
docker container ls --all # list all running containers | ||
docker image ls --all # list all images | ||
docker system prune # remove unused images and containers | ||
docker container prune # remove stopped containers | ||
sudo useradd -rm -d /home/csle_admin -s /bin/bash -g root -G sudo -p "$(openssl passwd -1 'csle@admin-pw_191')" csle_admin | ||
docker run --name=iperf3 -d --restart=unless-stopped -p 5201:5201/tcp -p 5201:5201/udp mlabbe/iperf3 # Start the iperf server on the host | ||
iperf3 -R -c <SERVER> # network performance, where <SERVER> is the IP where the iperf server is running e.g. the host 172.31.212.92 | ||
``` | ||
|
||
## Author & Maintainer | ||
|
||
Kim Hammar <[email protected]> | ||
|
||
## Copyright and license | ||
|
||
[LICENSE](../../../../../LICENSE.md) | ||
|
||
Creative Commons | ||
|
||
(C) 2020-2024, Kim Hammar |
Oops, something went wrong.