You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
As a detection lab I think it would be good to add some highly vulnerable systems/applications to the Lab so defenders can verify if they can detect exploitation of those systems/applications.
Given Metasploitable 3 also leverages vagrant and packer it appears it would be achievable.
Hey @forensic65x - I like the idea, but this would be better suited for a fork of DetectionLab. The addition of more VMs slows down an already somewhat slow build process and adds complexity, which makes the lab harder to maintain than it already is. I don't want to get in the business of supporting a VM that I had no hand in creating.
Understood.
Could you provide some guidance on what scripts in the
detectionlab/Vagrant/scripts should be run on an additional Windows VM so
it gets the caldera agent, added to the domain, logs to the WEF server,
etc? I'd like our DetectionLab to have a couple more flavors of Windows
(XP, Win7, 32 and 64bit).
Same for a unix VM so its logging to the Logger/Splunk...
If not, no worries.
Description of the issue:
As a detection lab I think it would be good to add some highly vulnerable systems/applications to the Lab so defenders can verify if they can detect exploitation of those systems/applications.
Given Metasploitable 3 also leverages vagrant and packer it appears it would be achievable.
https://github.com/rapid7/metasploitable3
The text was updated successfully, but these errors were encountered: