Skip to content

Y3GI/OpenBAS_ITPG

Repository files navigation

OpenBAS Adversary Emulation

This project is an adversary emulation scenario for OpenBAS. It simulates a series of attacks that an adversary might perform in a real-world environment.

Documentation

Refer to Full Documentation

Prerequisites

  • A working OpenBAS server on a Linux machine.
  • An Azure environment to host the 2 Windows machines required by the simulation.

Installation Guide

Refer to INSTALL.md

Cyber Kill Chain Coverage

This simulation covers the following stages of the Cyber Kill Chain:

  • Discovery: Computer and SMB share discovery.
  • Delivery: Lateral movement using wmic.exe.
  • Exploitation: Dumping OS passwords (SAM, LSA, SECURITY).
  • Installation: Downloading a custom, PowerShell-based ransomware over HTTP filelessly.
  • Actions on Objective: Executing the downloaded ransomware to encrypt files.

General User Advice

  • The provided ransomware is for simulation purposes only and encrypts bogus files.
  • When configuring the injects, double-check that you have assigned the correct assets and updated target computer's IP address for Inject 2.
  • Ensure that the OpenBAS ip address points to your OpenBAS server in injects 4 and 5.

Resources

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 4

  •  
  •  
  •  
  •