diff --git a/Dockerfile b/Dockerfile index 1979b7b8..8b2f0fd4 100644 --- a/Dockerfile +++ b/Dockerfile @@ -10,7 +10,7 @@ RUN apt install -y python3.12 RUN apt-get install -y git unzip python3-pip curl vim -RUN curl -s https://releases.hashicorp.com/terraform/1.9.6/terraform_1.9.6_linux_amd64.zip -o terraform.zip && \ +RUN curl -s https://releases.hashicorp.com/terraform/1.9.8/terraform_1.9.8_linux_amd64.zip -o terraform.zip && \ unzip terraform.zip && \ mv terraform /usr/local/bin/ diff --git a/docs/source/Attack_Range_AWS.md b/docs/source/Attack_Range_AWS.md index 908c1efe..e73a1d6b 100644 --- a/docs/source/Attack_Range_AWS.md +++ b/docs/source/Attack_Range_AWS.md @@ -47,6 +47,8 @@ Configure Attack Range: python attack_range.py configure ```` +Once the configuration is complete, you can proceed to build and control your range [here](Control_Attack_Range.md) + ## Linux Install the required packages: ````bash @@ -56,7 +58,7 @@ apt-get install -y python3.8 git unzip python3-pip curl Install and configure Terraform: ````bash -curl -s https://releases.hashicorp.com/terraform/1.1.8/terraform_1.1.8_linux_amd64.zip -o terraform.zip && \ +curl -s https://releases.hashicorp.com/terraform/1.9.8/terraform_1.9.8_linux_amd64.zip -o terraform.zip && \ unzip terraform.zip && \ mv terraform /usr/local/bin/ ```` @@ -84,5 +86,8 @@ poetry install python attack_range.py configure ```` +Once the configuration is complete, you can proceed to build and control your range [here](Control_Attack_Range.md) + ## Windows -We recommend to use the Windows Subsystem for Linux (WSL). You can find a tutorial [here](https://docs.microsoft.com/en-us/windows/wsl/install). After installed WSL, you can follow the steps described in the Linux section. + +We recommend using the Windows Subsystem for Linux (WSL). You can find a tutorial [here](https://docs.microsoft.com/en-us/windows/wsl/install). After installing WSL, you can follow the steps described in the [Linux section](#linux). diff --git a/docs/source/Attack_Range_Azure.md b/docs/source/Attack_Range_Azure.md index 68e81f31..7f0836e0 100644 --- a/docs/source/Attack_Range_Azure.md +++ b/docs/source/Attack_Range_Azure.md @@ -41,6 +41,8 @@ Configure Attack Range: python attack_range.py configure ```` +Once the configuration is complete, you can proceed to build and control your range [here](Control_Attack_Range.md) + ## Linux Install the required packages: ````bash @@ -50,7 +52,7 @@ apt-get install -y python3.8 git unzip python3-pip curl Install and configure Terraform: ````bash -curl -s https://releases.hashicorp.com/terraform/1.1.8/terraform_1.1.8_linux_amd64.zip -o terraform.zip && \ +curl -s https://releases.hashicorp.com/terraform/1.9.8/terraform_1.9.8_linux_amd64.zip -o terraform.zip && \ unzip terraform.zip && \ mv terraform /usr/local/bin/ ```` @@ -73,5 +75,8 @@ Configure Attack Range: python attack_range.py configure ```` +Once the configuration is complete, you can proceed to build and control your range [here](Control_Attack_Range.md) + ## Windows -We recommend to use the Windows Subsystem for Linux (WSL). You can find a tutorial [here](https://docs.microsoft.com/en-us/windows/wsl/install). After installed WSL, you can follow the steps described in the Linux section. \ No newline at end of file + +We recommend using the Windows Subsystem for Linux (WSL). You can find a tutorial [here](https://docs.microsoft.com/en-us/windows/wsl/install). After installing WSL, you can follow the steps described in the [Linux section](#linux). diff --git a/docs/source/Attack_Range_Config.md b/docs/source/Attack_Range_Config.md index ab53dc75..382e58f5 100644 --- a/docs/source/Attack_Range_Config.md +++ b/docs/source/Attack_Range_Config.md @@ -36,7 +36,7 @@ general: # See the chapter CrowdStrike Falcon in the docs page Attack Range Features. carbon_black_cloud: "0" - # Enable/Disable VMWare Carbon Black Cloud log forwarding to Splunkby setting this to 1 or 0. + # Enable/Disable VMWare Carbon Black Cloud log forwarding to Splunk by setting this to 1 or 0. carbon_black_cloud_company_code: "" carbon_black_cloud_s3_bucket: "" @@ -196,7 +196,7 @@ windows_servers_default: windows_image: "windows-server-2019" # Name of the image of the Windows Server. - # allowd values: windows-server-2016, windows-server-2019, windows-server-2022 + # allowed values: windows-server-2016, windows-server-2019, windows-server-2022 create_domain: "0" # Create Domain will turn this Windows Server into a Domain Controller. Enable by setting this to 1. diff --git a/docs/source/Attack_Range_Local.md b/docs/source/Attack_Range_Local.md index 8b65d54b..c10c9bf9 100644 --- a/docs/source/Attack_Range_Local.md +++ b/docs/source/Attack_Range_Local.md @@ -26,6 +26,8 @@ Configure Attack Range: python attack_range.py configure ```` +Once the configuration is complete, you can proceed to build and control your range [here](Control_Attack_Range.md) + ## Linux Clone the [Attack Range]() git repo to your local machine, and open the folder: ````bash @@ -52,3 +54,4 @@ Configure Attack Range: ````bash python attack_range.py configure ```` +Once the configuration is complete, you can proceed to build and control your range [here](Control_Attack_Range.md)