Skip to content

Commit

Permalink
Merge pull request #997 from nasbench/fix-docs-typos
Browse files Browse the repository at this point in the history
fix some typos in the docs
  • Loading branch information
P4T12ICK authored Nov 25, 2024
2 parents b19a182 + 58044dd commit 517cb6e
Show file tree
Hide file tree
Showing 5 changed files with 20 additions and 7 deletions.
2 changes: 1 addition & 1 deletion Dockerfile
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ RUN apt install -y python3.12

RUN apt-get install -y git unzip python3-pip curl vim

RUN curl -s https://releases.hashicorp.com/terraform/1.9.6/terraform_1.9.6_linux_amd64.zip -o terraform.zip && \
RUN curl -s https://releases.hashicorp.com/terraform/1.9.8/terraform_1.9.8_linux_amd64.zip -o terraform.zip && \
unzip terraform.zip && \
mv terraform /usr/local/bin/

Expand Down
9 changes: 7 additions & 2 deletions docs/source/Attack_Range_AWS.md
Original file line number Diff line number Diff line change
Expand Up @@ -47,6 +47,8 @@ Configure Attack Range:
python attack_range.py configure
````

Once the configuration is complete, you can proceed to build and control your range [here](Control_Attack_Range.md)

## Linux
Install the required packages:
````bash
Expand All @@ -56,7 +58,7 @@ apt-get install -y python3.8 git unzip python3-pip curl

Install and configure Terraform:
````bash
curl -s https://releases.hashicorp.com/terraform/1.1.8/terraform_1.1.8_linux_amd64.zip -o terraform.zip && \
curl -s https://releases.hashicorp.com/terraform/1.9.8/terraform_1.9.8_linux_amd64.zip -o terraform.zip && \
unzip terraform.zip && \
mv terraform /usr/local/bin/
````
Expand Down Expand Up @@ -84,5 +86,8 @@ poetry install
python attack_range.py configure
````

Once the configuration is complete, you can proceed to build and control your range [here](Control_Attack_Range.md)

## Windows
We recommend to use the Windows Subsystem for Linux (WSL). You can find a tutorial [here](https://docs.microsoft.com/en-us/windows/wsl/install). After installed WSL, you can follow the steps described in the Linux section.

We recommend using the Windows Subsystem for Linux (WSL). You can find a tutorial [here](https://docs.microsoft.com/en-us/windows/wsl/install). After installing WSL, you can follow the steps described in the [Linux section](#linux).
9 changes: 7 additions & 2 deletions docs/source/Attack_Range_Azure.md
Original file line number Diff line number Diff line change
Expand Up @@ -41,6 +41,8 @@ Configure Attack Range:
python attack_range.py configure
````

Once the configuration is complete, you can proceed to build and control your range [here](Control_Attack_Range.md)

## Linux
Install the required packages:
````bash
Expand All @@ -50,7 +52,7 @@ apt-get install -y python3.8 git unzip python3-pip curl

Install and configure Terraform:
````bash
curl -s https://releases.hashicorp.com/terraform/1.1.8/terraform_1.1.8_linux_amd64.zip -o terraform.zip && \
curl -s https://releases.hashicorp.com/terraform/1.9.8/terraform_1.9.8_linux_amd64.zip -o terraform.zip && \
unzip terraform.zip && \
mv terraform /usr/local/bin/
````
Expand All @@ -73,5 +75,8 @@ Configure Attack Range:
python attack_range.py configure
````

Once the configuration is complete, you can proceed to build and control your range [here](Control_Attack_Range.md)

## Windows
We recommend to use the Windows Subsystem for Linux (WSL). You can find a tutorial [here](https://docs.microsoft.com/en-us/windows/wsl/install). After installed WSL, you can follow the steps described in the Linux section.

We recommend using the Windows Subsystem for Linux (WSL). You can find a tutorial [here](https://docs.microsoft.com/en-us/windows/wsl/install). After installing WSL, you can follow the steps described in the [Linux section](#linux).
4 changes: 2 additions & 2 deletions docs/source/Attack_Range_Config.md
Original file line number Diff line number Diff line change
Expand Up @@ -36,7 +36,7 @@ general:
# See the chapter CrowdStrike Falcon in the docs page Attack Range Features.

carbon_black_cloud: "0"
# Enable/Disable VMWare Carbon Black Cloud log forwarding to Splunkby setting this to 1 or 0.
# Enable/Disable VMWare Carbon Black Cloud log forwarding to Splunk by setting this to 1 or 0.

carbon_black_cloud_company_code: ""
carbon_black_cloud_s3_bucket: ""
Expand Down Expand Up @@ -196,7 +196,7 @@ windows_servers_default:

windows_image: "windows-server-2019"
# Name of the image of the Windows Server.
# allowd values: windows-server-2016, windows-server-2019, windows-server-2022
# allowed values: windows-server-2016, windows-server-2019, windows-server-2022

create_domain: "0"
# Create Domain will turn this Windows Server into a Domain Controller. Enable by setting this to 1.
Expand Down
3 changes: 3 additions & 0 deletions docs/source/Attack_Range_Local.md
Original file line number Diff line number Diff line change
Expand Up @@ -26,6 +26,8 @@ Configure Attack Range:
python attack_range.py configure
````

Once the configuration is complete, you can proceed to build and control your range [here](Control_Attack_Range.md)

## Linux
Clone the [Attack Range]() git repo to your local machine, and open the folder:
````bash
Expand All @@ -52,3 +54,4 @@ Configure Attack Range:
````bash
python attack_range.py configure
````
Once the configuration is complete, you can proceed to build and control your range [here](Control_Attack_Range.md)

0 comments on commit 517cb6e

Please sign in to comment.