added new Readme
This commit is contained in:
140
README-original.md
Normal file
140
README-original.md
Normal file
@@ -0,0 +1,140 @@
|
||||
# Detection Lab
|
||||

|
||||
|
||||
DetectionLab is tested weekly on Saturdays via a scheduled CircleCI workflow to ensure that builds are passing.
|
||||
|
||||
[](https://circleci.com/gh/clong/DetectionLab/tree/master)
|
||||

|
||||
[](https://github.com/clong/DetectionLab/blob/master/license.md)
|
||||

|
||||
[](https://github.com/clong/DetectionLab/commit/master)
|
||||
[](https://twitter.com/DetectionLab)
|
||||
[](https://join.slack.com/t/detectionlab/shared_invite/zt-mv1qnw9f-3qo2ZrB0IbIKhvinfsgYhg)
|
||||
|
||||
#### Donate to the project:
|
||||
|
||||
All of the infrastructure, building, and testing of DetectionLab is currently funded by myself in my spare time. If you find this project useful, feel free to buy me a coffee using one of the buttons below!
|
||||
|
||||
[](https://github.com/sponsors/clong)
|
||||
[](https://www.paypal.com/paypalme2/clong0)
|
||||
[](https://commerce.coinbase.com/checkout/838ac7a2-7b9d-4d40-b475-fd1015fdaacd)
|
||||
|
||||
## Purpose
|
||||
This lab has been designed with defenders in mind. Its primary purpose is to allow the user to quickly build a Windows domain that comes pre-loaded with security tooling and some best practices when it comes to system logging configurations. It can easily be modified to fit most needs or expanded to include additional hosts.
|
||||
|
||||
Read more about Detection Lab on Medium here: https://medium.com/@clong/introducing-detection-lab-61db34bed6ae
|
||||
|
||||
NOTE: This lab has not been hardened in any way and runs with default vagrant credentials. Please do not connect or bridge it to any networks you care about. This lab is deliberately designed to be insecure; the primary purpose of it is to provide visibility and introspection into each host.
|
||||
|
||||
## Primary Lab Features:
|
||||
* Microsoft Advanced Threat Analytics (https://www.microsoft.com/en-us/cloud-platform/advanced-threat-analytics) is installed on the WEF machine, with the lightweight ATA gateway installed on the DC
|
||||
* A Splunk forwarder is pre-installed and all indexes are pre-created. Technology add-ons are also preconfigured.
|
||||
* A custom Windows auditing configuration is set via GPO to include command line process auditing and additional OS-level logging
|
||||
* [Palantir's Windows Event Forwarding](http://github.com/palantir/windows-event-forwarding) subscriptions and custom channels are implemented
|
||||
* Powershell transcript logging is enabled. All logs are saved to `\\wef\pslogs`
|
||||
* osquery comes installed on each host and is pre-configured to connect to a [Fleet](https://kolide.co/fleet) server via TLS. Fleet is preconfigured with the configuration from [Palantir's osquery Configuration](https://github.com/palantir/osquery-configuration)
|
||||
* Sysmon is installed and configured using [Olaf Hartong's open-sourced Sysmon configuration](https://github.com/olafhartong/sysmon-modular)
|
||||
* All autostart items are logged to Windows Event Logs via [AutorunsToWinEventLog](https://github.com/palantir/windows-event-forwarding/tree/master/AutorunsToWinEventLog)
|
||||
* Zeek and Suricata are pre-configured to monitor and alert on network traffic
|
||||
* Apache Guacamole is installed to easily access all hosts from your local browser
|
||||
|
||||
---
|
||||
|
||||
## Building Detection Lab
|
||||
|
||||
When preparing to build DetectionLab locally, be sure to use the `prepare.[sh|ps1]` scripts inside of the Vagrant folder
|
||||
to ensure your system passes the prerequisite checks for building DetectionLab.
|
||||
|
||||
* [Prerequisites](https://www.detectionlab.network/introduction/prerequisites/)
|
||||
* [MacOS - Virtualbox or VMware Fusion](https://www.detectionlab.network/deployment/macosvm/)
|
||||
* [Windows - Virtualbox or VMware Workstation](https://www.detectionlab.network/deployment/windowsvm/)
|
||||
* [Linux - Virtualbox or VMware Workstation](https://www.detectionlab.network/deployment/linuxvm/)
|
||||
* [AWS via Terraform](https://www.detectionlab.network/deployment/aws/)
|
||||
* [Azure via Terraform & Ansible](https://www.detectionlab.network/deployment/azure/)
|
||||
* [ESXi via Terraform & Ansible](https://www.detectionlab.network/deployment/esxi/)
|
||||
* [HyperV](https://www.detectionlab.network/deployment/hyperv/)
|
||||
* [LibVirt](https://www.detectionlab.network/deployment/libvirt/)
|
||||
|
||||
---
|
||||
|
||||
## DetectionLab Documentation
|
||||
|
||||
The primary documentation site is located at https://detectionlab.network
|
||||
|
||||
* [Basic Vagrant Usage](https://www.detectionlab.network/introduction/basicvagrant/)
|
||||
* [Lab Information & Credentials](https://www.detectionlab.network/introduction/infoandcreds/)
|
||||
* [Troubleshooting and Known Issues](https://www.detectionlab.network/deployment/troubleshooting/)
|
||||
|
||||
---
|
||||
|
||||
## Contributing
|
||||
Please do all of your development in a feature branch on your own fork of DetectionLab.
|
||||
Contribution guidelines can be found here: [CONTRIBUTING.md](./CONTRIBUTING.md)
|
||||
|
||||
## In the Media
|
||||
* [DetectionLab, Chris Long – Paul’s Security Weekly #593](https://securityweekly.com/2019/02/08/detectionlab-chris-long-pauls-security-weekly-593/)
|
||||
* [TaoSecurity - Trying DetectionLab](https://taosecurity.blogspot.com/2019/01/trying-detectionlab.html)
|
||||
* [Setting up Chris Long's DetectionLab](https://www.psattack.com/articles/20171218/setting-up-chris-longs-detectionlab/)
|
||||
* [Detection Lab: Visibility & Introspection for Defenders](https://isc.sans.edu/forums/diary/Detection+Lab+Visibility+Introspection+for+Defenders/23135/)
|
||||
|
||||
## Credits/Resources
|
||||
A sizable percentage of this code was borrowed and adapted from [Stefan Scherer](https://twitter.com/stefscherer)'s [packer-windows](https://github.com/StefanScherer/packer-windows) and [adfs2](https://github.com/StefanScherer/adfs2) Github repos. A huge thanks to him for building the foundation that allowed me to design this lab environment.
|
||||
|
||||
# Acknowledgements
|
||||
* [Microsoft Advanced Threat Analytics](https://www.microsoft.com/en-us/cloud-platform/advanced-threat-analytics)
|
||||
* [Splunk](https://www.splunk.com)
|
||||
* [osquery](https://osquery.io)
|
||||
* [Fleet](https://github.com/fleetdm/fleet)
|
||||
* [Windows Event Forwarding for Network Defense](https://medium.com/@palantir/windows-event-forwarding-for-network-defense-cb208d5ff86f)
|
||||
* [palantir/windows-event-forwarding](http://github.com/palantir/windows-event-forwarding)
|
||||
* [osquery Across the Enterprise](https://medium.com/@palantir/osquery-across-the-enterprise-3c3c9d13ec55)
|
||||
* [palantir/osquery-configuration](https://github.com/palantir/osquery-configuration)
|
||||
* [Configure Event Log Forwarding in Windows Server 2012 R2](https://www.petri.com/configure-event-log-forwarding-windows-server-2012-r2)
|
||||
* [Monitoring what matters — Windows Event Forwarding for everyone](https://blogs.technet.microsoft.com/jepayne/2015/11/23/monitoring-what-matters-windows-event-forwarding-for-everyone-even-if-you-already-have-a-siem/)
|
||||
* [Use Windows Event Forwarding to help with intrusion detection](https://technet.microsoft.com/en-us/itpro/windows/keep-secure/use-windows-event-forwarding-to-assist-in-instrusion-detection)
|
||||
* [The Windows Event Forwarding Survival Guide](https://hackernoon.com/the-windows-event-forwarding-survival-guide-2010db7a68c4)
|
||||
* [PowerShell ♥ the Blue Team](https://blogs.msdn.microsoft.com/powershell/2015/06/09/powershell-the-blue-team/)
|
||||
* [Autoruns](https://www.microsoftpressstore.com/articles/article.aspx?p=2762082)
|
||||
* [TA-microsoft-sysmon](https://github.com/splunk/TA-microsoft-sysmon)
|
||||
* [SwiftOnSecurity - Sysmon Config](https://github.com/SwiftOnSecurity/sysmon-config)
|
||||
* [ThreatHunting](https://github.com/olafhartong/ThreatHunting)
|
||||
* [sysmon-modular](https://github.com/olafhartong/sysmon-modular)
|
||||
* [Atomic Red Team](https://github.com/redcanaryco/atomic-red-team)
|
||||
* [Hunting for Beacons](http://findingbad.blogspot.com/2020/05/hunting-for-beacons-part-2.html)
|
||||
* [Velociraptor](https://github.com/Velocidex/velociraptor)
|
||||
* [BadBlood](https://github.com/davidprowe/BadBlood)
|
||||
* [PurpleSharp](https://github.com/mvelazc0/PurpleSharp)
|
||||
* [EVTX-ATTACK-SAMPLES](https://github.com/sbousseaden/EVTX-ATTACK-SAMPLES)
|
||||
|
||||
# DetectionLab Sponsors
|
||||
#### Last updated: 07/09/2021
|
||||
I would like to extend thanks to the following sponsors for funding DetectionLab development. If you are interested in becoming a sponsor, please visit the [sponsors page](https://github.com/sponsors/clong).
|
||||
|
||||
### Diamond Sponsors:
|
||||
* [Veramine](https://github.com/veramine)
|
||||
* [Thinkst](https://github.com/ThinkstAppliedResearch)
|
||||
* [kungskal](https://github.com/kungskal)
|
||||
* [CyDefUnicorn](https://github.com/CyDefUnicorn)
|
||||
* [olliencc](https://github.com/olliencc)
|
||||
* [snaplabsio](https://github.com/snaplabsio)
|
||||
* [0x0lolbin](https://github.com/0x0lolbin)
|
||||
* [materaj2](https://github.com/materaj2)
|
||||
|
||||
### Premium Sponsors:
|
||||
* [mikeesparza](https://github.com/mikeesparza)
|
||||
* [dlee35](https://github.com/dlee35)
|
||||
* [chrissanders](https://github.com/chrissanders)
|
||||
* [jaredhaight](https://github.com/jaredhaight)
|
||||
* [iamfuntime](https://github.com/iamfuntime)
|
||||
* [Luct0r](https://github.com/Luct0r)
|
||||
* [secdev-01](https://github.com/secdev-01)
|
||||
|
||||
### Standard Sponsors:
|
||||
* [braimee](https://github.com/braimee)
|
||||
* [defensivedepth](https://github.com/defensivedepth)
|
||||
* [kafkaesqu3](https://github.com/kafkaesqu3)
|
||||
* [mdtro](https://github.com/mdtro)
|
||||
* [ealaney](https://github.com/ealaney)
|
||||
* [elreydetoda](https://github.com/elreydetoda)
|
||||
* [DevBits1702](https://github.com/DevBits1702)
|
||||
* +1 private sponsor
|
||||
169
README.md
169
README.md
@@ -1,86 +1,75 @@
|
||||
# Detection Lab
|
||||

|
||||
# DetectionLab
|
||||
|
||||
DetectionLab is tested weekly on Saturdays via a scheduled CircleCI workflow to ensure that builds are passing.
|
||||
## Overview
|
||||
This project is based on the awesome [DetectionLab](https://www.detectionlab.network) project.
|
||||
|
||||
[](https://circleci.com/gh/clong/DetectionLab/tree/master)
|
||||

|
||||
[](https://github.com/clong/DetectionLab/blob/master/license.md)
|
||||

|
||||
[](https://github.com/clong/DetectionLab/commit/master)
|
||||
[](https://twitter.com/DetectionLab)
|
||||
[](https://join.slack.com/t/detectionlab/shared_invite/zt-mv1qnw9f-3qo2ZrB0IbIKhvinfsgYhg)
|
||||
There are only some minor changes to focus on the network analysis. A router was added and the default gateway of the virtual machines have been changed.
|
||||
This enabled network analyzers to inspect Internet traffic from the virtual machines.
|
||||
|
||||
#### Donate to the project:
|
||||
Be aware: This is an unsupported setup as vagrant assumes the first network card is always used for outbound connections and used as the default gateway.
|
||||
Reprovisioning might fail. As it is pretty automated it is easier to destroy a virtual machine and recreate it.
|
||||
|
||||
All of the infrastructure, building, and testing of DetectionLab is currently funded by myself in my spare time. If you find this project useful, feel free to buy me a coffee using one of the buttons below!
|
||||
There are some more optional boxes included in the Vagrant file, but not started by default. You can bring up kali, malcolm, or securityonion if you need them.
|
||||
|
||||
[](https://github.com/sponsors/clong)
|
||||
[](https://www.paypal.com/paypalme2/clong0)
|
||||
[](https://commerce.coinbase.com/checkout/838ac7a2-7b9d-4d40-b475-fd1015fdaacd)
|
||||
## Setup on Windows
|
||||
Run powershell as admin, and execute the following commands:
|
||||
```
|
||||
Set-ExecutionPolicy Bypass -Scope Process -Force; [System.Net.ServicePointManager]::SecurityProtocol = [System.Net.ServicePointManager]::SecurityProtocol -bor 3072; iex ((New-Object System.Net.WebClient).DownloadString('https://community.chocolatey.org/install.ps1'))
|
||||
choco install -y virtualbox vagrant git googlechrome
|
||||
c:
|
||||
cd \
|
||||
mkdir data
|
||||
cd data
|
||||
& 'C:\Program Files\Git\bin\git.exe' clone https://git.trinitor.de/trinitor/DetectionLab.git
|
||||
cd DetectionLab/Vagrant
|
||||
C:\HashiCorp\Vagrant\bin\vagrant.exe plugin install vagrant-reload
|
||||
```
|
||||
|
||||
## Purpose
|
||||
This lab has been designed with defenders in mind. Its primary purpose is to allow the user to quickly build a Windows domain that comes pre-loaded with security tooling and some best practices when it comes to system logging configurations. It can easily be modified to fit most needs or expanded to include additional hosts.
|
||||
## Usage
|
||||
Start router, dc, wef, and win10. This is the default DetectionLab setup.
|
||||
```
|
||||
C:\HashiCorp\Vagrant\bin\vagrant.exe up
|
||||
```
|
||||
You can also choose the virtual machines you want to create.
|
||||
Example: If you do not need the Windows Environment you can get a small network
|
||||
```
|
||||
C:\HashiCorp\Vagrant\bin\vagrant.exe up router malcolm kali
|
||||
```
|
||||
Destroy lab
|
||||
```
|
||||
C:\HashiCorp\Vagrant\bin\vagrant.exe destroy
|
||||
```
|
||||
|
||||
Read more about Detection Lab on Medium here: https://medium.com/@clong/introducing-detection-lab-61db34bed6ae
|
||||
## Information
|
||||
* Domain Name: windomain.local
|
||||
|
||||
NOTE: This lab has not been hardened in any way and runs with default vagrant credentials. Please do not connect or bridge it to any networks you care about. This lab is deliberately designed to be insecure; the primary purpose of it is to provide visibility and introspection into each host.
|
||||
| Hostname | IPs |
|
||||
|--- |--- |
|
||||
|router |192.168.38.2, 192.168.39.2 |
|
||||
|logger |192.168.38.105 |
|
||||
|dc |192.168.38.102 |
|
||||
|wef |192.168.38.103 |
|
||||
|win10 |192.168.38.104 |
|
||||
|kali |192.168.38.30 |
|
||||
|securityonion |192.168.39.10, 192.168.38.10 |
|
||||
|malcolm |192.168.39.11, 192.168.38.11 |
|
||||
|
||||
## Primary Lab Features:
|
||||
* Microsoft Advanced Threat Analytics (https://www.microsoft.com/en-us/cloud-platform/advanced-threat-analytics) is installed on the WEF machine, with the lightweight ATA gateway installed on the DC
|
||||
* A Splunk forwarder is pre-installed and all indexes are pre-created. Technology add-ons are also preconfigured.
|
||||
* A custom Windows auditing configuration is set via GPO to include command line process auditing and additional OS-level logging
|
||||
* [Palantir's Windows Event Forwarding](http://github.com/palantir/windows-event-forwarding) subscriptions and custom channels are implemented
|
||||
* Powershell transcript logging is enabled. All logs are saved to `\\wef\pslogs`
|
||||
* osquery comes installed on each host and is pre-configured to connect to a [Fleet](https://kolide.co/fleet) server via TLS. Fleet is preconfigured with the configuration from [Palantir's osquery Configuration](https://github.com/palantir/osquery-configuration)
|
||||
* Sysmon is installed and configured using [Olaf Hartong's open-sourced Sysmon configuration](https://github.com/olafhartong/sysmon-modular)
|
||||
* All autostart items are logged to Windows Event Logs via [AutorunsToWinEventLog](https://github.com/palantir/windows-event-forwarding/tree/master/AutorunsToWinEventLog)
|
||||
* Zeek and Suricata are pre-configured to monitor and alert on network traffic
|
||||
* Apache Guacamole is installed to easily access all hosts from your local browser
|
||||
|
||||
---
|
||||
|
||||
## Building Detection Lab
|
||||
|
||||
When preparing to build DetectionLab locally, be sure to use the `prepare.[sh|ps1]` scripts inside of the Vagrant folder
|
||||
to ensure your system passes the prerequisite checks for building DetectionLab.
|
||||
|
||||
* [Prerequisites](https://www.detectionlab.network/introduction/prerequisites/)
|
||||
* [MacOS - Virtualbox or VMware Fusion](https://www.detectionlab.network/deployment/macosvm/)
|
||||
* [Windows - Virtualbox or VMware Workstation](https://www.detectionlab.network/deployment/windowsvm/)
|
||||
* [Linux - Virtualbox or VMware Workstation](https://www.detectionlab.network/deployment/linuxvm/)
|
||||
* [AWS via Terraform](https://www.detectionlab.network/deployment/aws/)
|
||||
* [Azure via Terraform & Ansible](https://www.detectionlab.network/deployment/azure/)
|
||||
* [ESXi via Terraform & Ansible](https://www.detectionlab.network/deployment/esxi/)
|
||||
* [HyperV](https://www.detectionlab.network/deployment/hyperv/)
|
||||
* [LibVirt](https://www.detectionlab.network/deployment/libvirt/)
|
||||
|
||||
---
|
||||
|
||||
## DetectionLab Documentation
|
||||
|
||||
The primary documentation site is located at https://detectionlab.network
|
||||
|
||||
* [Basic Vagrant Usage](https://www.detectionlab.network/introduction/basicvagrant/)
|
||||
* [Lab Information & Credentials](https://www.detectionlab.network/introduction/infoandcreds/)
|
||||
* [Troubleshooting and Known Issues](https://www.detectionlab.network/deployment/troubleshooting/)
|
||||
|
||||
---
|
||||
|
||||
## Contributing
|
||||
Please do all of your development in a feature branch on your own fork of DetectionLab.
|
||||
Contribution guidelines can be found here: [CONTRIBUTING.md](./CONTRIBUTING.md)
|
||||
|
||||
## In the Media
|
||||
* [DetectionLab, Chris Long – Paul’s Security Weekly #593](https://securityweekly.com/2019/02/08/detectionlab-chris-long-pauls-security-weekly-593/)
|
||||
* [TaoSecurity - Trying DetectionLab](https://taosecurity.blogspot.com/2019/01/trying-detectionlab.html)
|
||||
* [Setting up Chris Long's DetectionLab](https://www.psattack.com/articles/20171218/setting-up-chris-longs-detectionlab/)
|
||||
* [Detection Lab: Visibility & Introspection for Defenders](https://isc.sans.edu/forums/diary/Detection+Lab+Visibility+Introspection+for+Defenders/23135/)
|
||||
|
||||
## Credits/Resources
|
||||
A sizable percentage of this code was borrowed and adapted from [Stefan Scherer](https://twitter.com/stefscherer)'s [packer-windows](https://github.com/StefanScherer/packer-windows) and [adfs2](https://github.com/StefanScherer/adfs2) Github repos. A huge thanks to him for building the foundation that allowed me to design this lab environment.
|
||||
## Usage
|
||||
| Name | URL | User | Password |
|
||||
|--- |--- |--- |--- |
|
||||
|Domain Admin | |vagrant |vagrant |
|
||||
|Fleet |https://192.168.38.105:8412 |admin |admin123# |
|
||||
|Splunk |https://192.168.38.105:8000 |admin |changeme |
|
||||
|MS ATA |https://192.168.38.103 |wef\vagrant |vagrant |
|
||||
|Guacamole |http://192.168.38.105:8080/guacamole |vagrant |vagrant |
|
||||
|Velociraptor |https://192.168.38.105:9999 |admin |changeme |
|
||||
|Malcolm Arkime |https://192.168.39.11 |vagrant |vagrant |
|
||||
|Malcolm Kibana |https://192.168.39.11/kibana |vagrant |vagrant |
|
||||
|CyberChef |https://192.168.39.10/cyberchef/cyberchef.htm | | |
|
||||
|Squert |https://192.168.39.10/squert/ |vagrant |vagrant |
|
||||
|
||||
# Acknowledgements
|
||||
* [DetectionLab](https://www.detectionlab.network)
|
||||
* [Microsoft Advanced Threat Analytics](https://www.microsoft.com/en-us/cloud-platform/advanced-threat-analytics)
|
||||
* [Splunk](https://www.splunk.com)
|
||||
* [osquery](https://osquery.io)
|
||||
@@ -105,36 +94,6 @@ A sizable percentage of this code was borrowed and adapted from [Stefan Scherer]
|
||||
* [BadBlood](https://github.com/davidprowe/BadBlood)
|
||||
* [PurpleSharp](https://github.com/mvelazc0/PurpleSharp)
|
||||
* [EVTX-ATTACK-SAMPLES](https://github.com/sbousseaden/EVTX-ATTACK-SAMPLES)
|
||||
|
||||
# DetectionLab Sponsors
|
||||
#### Last updated: 07/09/2021
|
||||
I would like to extend thanks to the following sponsors for funding DetectionLab development. If you are interested in becoming a sponsor, please visit the [sponsors page](https://github.com/sponsors/clong).
|
||||
|
||||
### Diamond Sponsors:
|
||||
* [Veramine](https://github.com/veramine)
|
||||
* [Thinkst](https://github.com/ThinkstAppliedResearch)
|
||||
* [kungskal](https://github.com/kungskal)
|
||||
* [CyDefUnicorn](https://github.com/CyDefUnicorn)
|
||||
* [olliencc](https://github.com/olliencc)
|
||||
* [snaplabsio](https://github.com/snaplabsio)
|
||||
* [0x0lolbin](https://github.com/0x0lolbin)
|
||||
* [materaj2](https://github.com/materaj2)
|
||||
|
||||
### Premium Sponsors:
|
||||
* [mikeesparza](https://github.com/mikeesparza)
|
||||
* [dlee35](https://github.com/dlee35)
|
||||
* [chrissanders](https://github.com/chrissanders)
|
||||
* [jaredhaight](https://github.com/jaredhaight)
|
||||
* [iamfuntime](https://github.com/iamfuntime)
|
||||
* [Luct0r](https://github.com/Luct0r)
|
||||
* [secdev-01](https://github.com/secdev-01)
|
||||
|
||||
### Standard Sponsors:
|
||||
* [braimee](https://github.com/braimee)
|
||||
* [defensivedepth](https://github.com/defensivedepth)
|
||||
* [kafkaesqu3](https://github.com/kafkaesqu3)
|
||||
* [mdtro](https://github.com/mdtro)
|
||||
* [ealaney](https://github.com/ealaney)
|
||||
* [elreydetoda](https://github.com/elreydetoda)
|
||||
* [DevBits1702](https://github.com/DevBits1702)
|
||||
* +1 private sponsor
|
||||
* [Malcolm](https://github.com/cisagov/Malcolm)
|
||||
* [SecurityOnion](https://securityonionsolutions.com/)
|
||||
* [Kali](https://kali.org/)
|
||||
Reference in New Issue
Block a user