A cyber range is a realistic simulation of an organization's network infrastructure, commonly used for cyber security training purposes. It provides a safe environment to assess competencies in both offensive and defensive techniques. An important step during the realization of a cyber range is the generation of vulnerable machines. This step is challenging and requires a laborious manual configuration. Several works aim to reduce this overhead, but the current state-of-the-art focuses on generating network services without considering the effort required to build vulnerable environments for web applications. A cyber range should represent a real system, and nowadays, almost all the companies develop their company site by using WordPress, a common Content Management System (CMS), which is also one of the most critical attackers' entry points. The presented work proposes an approach to automatically create and configure vulnerable WordPress applications by using the information presented in public exploits. Our platform automatically extracts information from the most well-known publicly available exploit database in order to generate and configure vulnerable environments. The container-based virtualization is used to generate lightweight and easily deployable infrastructures. A final evaluation highlights promising results regarding the possibility of automating the generation of vulnerable environments through our approach.
翻译:网络范围是一个组织网络基础设施的现实模拟,通常用于网络安全培训,为评估进攻性和防御性技术的能力提供一个安全的环境; 实现网络范围的一个重要步骤是生成脆弱的机器; 这一步骤具有挑战性,需要人工配置; 几项工作旨在减少这一间接费用,但目前最先进的技术侧重于生成网络服务,而没有考虑为网络应用建立脆弱环境所需的努力; 网络范围应代表一个真正的系统,而现在几乎所有公司都使用WordPress开发公司网站,WordPress是一个共同的内容管理系统(CMS),这也是攻击者最关键的切入点之一; 介绍的工作提出了一个办法,利用公共开发的信息自动创建和配置脆弱的WordPress应用程序; 我们的平台自动从最著名的公开的利用数据库提取信息,以生成和配置脆弱环境; 基于集装箱的虚拟化应用来产生轻量级和易于部署的基础设施; 最后评价强调通过我们的方法实现脆弱环境生成自动化的可能性。