Merge pull request #150 from clong/donations
Update README hashes, add donation buttons [ci skip]
This commit is contained in:
17
README.md
17
README.md
@@ -1,6 +1,13 @@
|
||||
# Detection Lab
|
||||
CircleCI: [](https://circleci.com/gh/clong/DetectionLab/tree/master)
|
||||
|
||||
#### Donate to the project:
|
||||
|
||||
All of the infrastructure, building, and testing of DetectionLab is currently funded by myself in my spare time. If you find this project useful, feel free to buy me a coffee using one of the buttons below!
|
||||
|
||||
[](paypal.me/clong0)
|
||||
[](https://commerce.coinbase.com/checkout/838ac7a2-7b9d-4d40-b475-fd1015fdaacd)
|
||||
|
||||
## Purpose
|
||||
This lab has been designed with defenders in mind. Its primary purpose is to allow the user to quickly build a Windows domain that comes pre-loaded with security tooling and some best practices when it comes to system logging configurations. It can easily be modified to fit most needs or expanded to include additional hosts.
|
||||
|
||||
@@ -56,10 +63,10 @@ Windows users will want to use the following script:
|
||||
|
||||
Provider | Box | URL | MD5 | Size
|
||||
------------|-----|-----|----|----
|
||||
Virtualbox |Windows 2016 | https://www.detectionlab.network/windows_2016_virtualbox.box | f352c852ed1b849dab18442caef83712 | 6.4GB
|
||||
Virtualbox | Windows 10 | https://www.detectionlab.network/windows_10_virtualbox.box | ad78b3406dd2c0e3418d1dd61e2abc2c | 5.8GB
|
||||
VMware | Windows 2016 | https://www.detectionlab.network/windows_2016_vmware.box | da1111c765b2fdc2ce012b6348cf74e2 | 6.7GB
|
||||
VMware | Windows 10 | https://www.detectionlab.network/windows_10_vmware.box | 14e1c4cc15e1dc47aead906b25c5b3cc | 6.0GB
|
||||
Virtualbox |Windows 2016 | https://www.detectionlab.network/windows_2016_virtualbox.box | 2a0b5dbc432e27a0223da026cc1f378b | 6.4GB
|
||||
Virtualbox | Windows 10 | https://www.detectionlab.network/windows_10_virtualbox.box | 94c1ff7264e67af3d7df6d19275086ac | 5.8GB
|
||||
VMware | Windows 2016 | https://www.detectionlab.network/windows_2016_vmware.box | 634628e04a1c6c94b4036b76d0568948 | 6.7GB
|
||||
VMware | Windows 10 | https://www.detectionlab.network/windows_10_vmware.box | 7d26d3247162dfbf6026fd5bab6a21ee | 6.0GB
|
||||
|
||||
If you choose to download the boxes, you may skip steps 2 and 3. If you don't trust pre-built boxes, I recommend following steps 2 and 3 to build them on your machine.
|
||||
|
||||
@@ -143,7 +150,7 @@ Vagrant commands must be run from the "Vagrant" folder.
|
||||
* Fleet osquery Manager
|
||||
* Mitre's Caldera Server
|
||||
* Bro
|
||||
* Suricata
|
||||
* Suricata
|
||||
|
||||
## Splunk Indexes
|
||||
Index Name | Description
|
||||
|
||||
@@ -180,12 +180,12 @@ function list_providers {
|
||||
function download_boxes {
|
||||
Write-Verbose '[download_boxes] Running..'
|
||||
if ($PackerProvider -eq 'virtualbox') {
|
||||
$win10Hash = 'ad78b3406dd2c0e3418d1dd61e2abc2c'
|
||||
$win2016Hash = 'f352c852ed1b849dab18442caef83712'
|
||||
$win10Hash = '94c1ff7264e67af3d7df6d19275086ac'
|
||||
$win2016Hash = '2a0b5dbc432e27a0223da026cc1f378b'
|
||||
}
|
||||
if ($PackerProvider -eq 'vmware') {
|
||||
$win10Hash = '14e1c4cc15e1dc47aead906b25c5b3cc'
|
||||
$win2016Hash = 'da1111c765b2fdc2ce012b6348cf74e2'
|
||||
$win10Hash = '7d26d3247162dfbf6026fd5bab6a21ee'
|
||||
$win2016Hash = '634628e04a1c6c94b4036b76d0568948'
|
||||
}
|
||||
|
||||
$win10Filename = "windows_10_$PackerProvider.box"
|
||||
|
||||
8
build.sh
8
build.sh
@@ -397,19 +397,19 @@ download_boxes() {
|
||||
fi
|
||||
# Verify hashes of VirtualBox boxes
|
||||
if [ "$PACKER_PROVIDER" == "virtualbox" ]; then
|
||||
if [ "$("$MD5TOOL" "$DL_DIR"/Boxes/windows_10_"$PACKER_PROVIDER".box | cut -d ' ' -f "$CUT_INDEX")" != "ad78b3406dd2c0e3418d1dd61e2abc2c" ]; then
|
||||
if [ "$("$MD5TOOL" "$DL_DIR"/Boxes/windows_10_"$PACKER_PROVIDER".box | cut -d ' ' -f "$CUT_INDEX")" != "94c1ff7264e67af3d7df6d19275086ac" ]; then
|
||||
(echo >&2 "Hash mismatch on windows_10_virtualbox.box")
|
||||
fi
|
||||
if [ "$("$MD5TOOL" "$DL_DIR"/Boxes/windows_2016_"$PACKER_PROVIDER".box | cut -d ' ' -f "$CUT_INDEX")" != "f352c852ed1b849dab18442caef83712" ]; then
|
||||
if [ "$("$MD5TOOL" "$DL_DIR"/Boxes/windows_2016_"$PACKER_PROVIDER".box | cut -d ' ' -f "$CUT_INDEX")" != "2a0b5dbc432e27a0223da026cc1f378b" ]; then
|
||||
(echo >&2 "Hash mismatch on windows_2016_virtualbox.box")
|
||||
fi
|
||||
# Verify hashes of VMware boxes
|
||||
elif [ "$PACKER_PROVIDER" == "vmware" ]; then
|
||||
if [ "$("$MD5TOOL" "$DL_DIR"/Boxes/windows_10_"$PACKER_PROVIDER".box | cut -d ' ' -f "$CUT_INDEX")" != "14e1c4cc15e1dc47aead906b25c5b3cc" ]; then
|
||||
if [ "$("$MD5TOOL" "$DL_DIR"/Boxes/windows_10_"$PACKER_PROVIDER".box | cut -d ' ' -f "$CUT_INDEX")" != "7d26d3247162dfbf6026fd5bab6a21ee" ]; then
|
||||
(echo >&2 "Hash mismatch on windows_10_vmware.box")
|
||||
exit 1
|
||||
fi
|
||||
if [ "$("$MD5TOOL" "$DL_DIR"/Boxes/windows_2016_"$PACKER_PROVIDER".box | cut -d ' ' -f "$CUT_INDEX")" != "da1111c765b2fdc2ce012b6348cf74e2" ]; then
|
||||
if [ "$("$MD5TOOL" "$DL_DIR"/Boxes/windows_2016_"$PACKER_PROVIDER".box | cut -d ' ' -f "$CUT_INDEX")" != "634628e04a1c6c94b4036b76d0568948" ]; then
|
||||
(echo >&2 "Hash mismatch on windows_2016_vmware.box")
|
||||
exit 1
|
||||
fi
|
||||
|
||||
Reference in New Issue
Block a user