From a15f901eae2a0510eb3f14dab5fb54093c4630f6 Mon Sep 17 00:00:00 2001 From: TeneBrae93 Date: Tue, 4 Jun 2024 09:01:36 -0500 Subject: [PATCH] Updated README & removed old scenario template --- core/terraform/example-scenario/README.md | 36 ------------- .../cheat_sheet_route_name.md | 19 ------- core/terraform/example-scenario/manifest.yml | 13 ----- core/terraform/example-scenario/start.sh | 2 - .../example-scenario/terraform/outputs.tf | 24 --------- .../example-scenario/terraform/provider.tf | 18 ------- .../example-scenario/terraform/variables.tf | 51 ------------------- scenarios/scenario_template/README.md | 4 +- 8 files changed, 3 insertions(+), 164 deletions(-) delete mode 100644 core/terraform/example-scenario/README.md delete mode 100644 core/terraform/example-scenario/cheat_sheet_route_name.md delete mode 100644 core/terraform/example-scenario/manifest.yml delete mode 100755 core/terraform/example-scenario/start.sh delete mode 100644 core/terraform/example-scenario/terraform/outputs.tf delete mode 100644 core/terraform/example-scenario/terraform/provider.tf delete mode 100644 core/terraform/example-scenario/terraform/variables.tf diff --git a/core/terraform/example-scenario/README.md b/core/terraform/example-scenario/README.md deleted file mode 100644 index 32cce8ca..00000000 --- a/core/terraform/example-scenario/README.md +++ /dev/null @@ -1,36 +0,0 @@ -# Scenario: {{ scenario_name }} - -**Size:** Small / Medium / Large - -**Difficulty:** Easy / Moderate / Hard - -**Command:** `$ ./cloudgoat.py create ` - -## Scenario Resources - -Identify any cloud resources used by this scenario. - -## Scenario Start(s) - -List and number any and all means by which the user may start the scenario. - -## Scenario Goal(s) - -List and number any and all "end goals" present in the scenario. - -## Summary - -A brief summary of the scenario. - -## Exploitation Route(s) - -A flowchart illustrating the routes the attacker may take when completing the scenario. Lucidchart is recommended. - -![Scenario Route(s)](https://rhinosecuritylabs.com/wp-content/uploads/2018/07/cloudgoat-e1533043938802-1140x400.jpg) - - -## Walkthrough - {{ starting_point }} - -1. A step-by-step walkthrough of how an attacker can complete the scenario. - -A cheat sheet for this route is available [here](./cheat_sheet_route_name.md). \ No newline at end of file diff --git a/core/terraform/example-scenario/cheat_sheet_route_name.md b/core/terraform/example-scenario/cheat_sheet_route_name.md deleted file mode 100644 index 16a5bcea..00000000 --- a/core/terraform/example-scenario/cheat_sheet_route_name.md +++ /dev/null @@ -1,19 +0,0 @@ -`Up` - -`Up` - -`Down` - -`Down` - -`Left` - -`Right` - -`Left` - -`Right` - -`B` - -`A` \ No newline at end of file diff --git a/core/terraform/example-scenario/manifest.yml b/core/terraform/example-scenario/manifest.yml deleted file mode 100644 index d02107bc..00000000 --- a/core/terraform/example-scenario/manifest.yml +++ /dev/null @@ -1,13 +0,0 @@ ---- - # The name of the scenario, alpha-numeric characters only, and underscore-separated -- name: {{ scenario_name }} - # The name of the author(s), comma separated -- author: {{ author_name }} - # The version of the scenario, where major versions are breaking changes and minor are small fixes. -- version: {{ scenario_version }} - # Text displayed to the user when they type "{{ scenario_name }} help" -- help: | - {{ scenario_help }} -# Records the date upon which this scenario was last updated, in MM-DD-YYYY format -- last-updated: {{ date_last_updated }} -... \ No newline at end of file diff --git a/core/terraform/example-scenario/start.sh b/core/terraform/example-scenario/start.sh deleted file mode 100755 index c7e8d55b..00000000 --- a/core/terraform/example-scenario/start.sh +++ /dev/null @@ -1,2 +0,0 @@ -#!/bin/bash -ssh-keygen -b 4096 -t rsa -f ./cloudgoat -q -N "" \ No newline at end of file diff --git a/core/terraform/example-scenario/terraform/outputs.tf b/core/terraform/example-scenario/terraform/outputs.tf deleted file mode 100644 index 2ad9a747..00000000 --- a/core/terraform/example-scenario/terraform/outputs.tf +++ /dev/null @@ -1,24 +0,0 @@ -#Required: Always output the AWS Account ID -output "cloudgoat_output_aws_account_id" { - value = data.aws_caller_identity.current.account_id -} - -#Example: IAM User Access Key -output "cloudgoat_output_johnsmith_access_key_id" { - value = aws_iam_access_key.cg_johnsmith.id -} - -#Example: IAM User Secret Key -output "cloudgoat_output_johnsmith_secret_key" { - value = aws_iam_access_key.cg_johnsmith.secret -} - -#Example: output for an SSH key -output "cloudgoat_output_ssh_keyname" { - value = "An SSH key-pair named ${var.ssh_public_key} has been generated stored in this directory." -} - -#Example: Always output any important URLs, IPs, or other such infromation -output "cloudgoat_output_load_balancer_url" { - value = aws_lb.cg_lb.dns_name -} diff --git a/core/terraform/example-scenario/terraform/provider.tf b/core/terraform/example-scenario/terraform/provider.tf deleted file mode 100644 index bdbbfb3a..00000000 --- a/core/terraform/example-scenario/terraform/provider.tf +++ /dev/null @@ -1,18 +0,0 @@ -terraform { - # Minimum Terraform version - required_version = ">= 1.5" - - # Minimum AWS provider version - required_providers { - aws = { - source = "hashicorp/aws" - version = ">= 5.0.0" - } - } -} - -# Specify what region and credentials to use -provider "aws" { - profile = var.profile - region = var.region -} diff --git a/core/terraform/example-scenario/terraform/variables.tf b/core/terraform/example-scenario/terraform/variables.tf deleted file mode 100644 index 70116ddd..00000000 --- a/core/terraform/example-scenario/terraform/variables.tf +++ /dev/null @@ -1,51 +0,0 @@ -#Required -variable "profile" { - description = "The AWS profile to use" - type = string -} - -#Required -variable "region" { - default = "us-east-1" - type = string -} - -#Required -variable "cgid" { - description = "CGID variable for unique naming" - type = string -} - -#Required -variable "cg_whitelist" { - description = "User's public IP address(es)" - type = list(string) -} - -#Example -variable "rds_username" { - description = "RDS PostgreSQL Instance Username" - default = "cgadmin" - type = string -} - -#Example -variable "rds_password" { - description = "RDS PostgreSQL Instance Password" - default = "Purplepwny2029" - type = string -} - -#Example -variable "ssh_public_key" { - description = "SSH Public Key" - default = "../cloudgoat.pub" - type = string -} - -#Example -variable "ssh_private_key" { - description = "SSH Private Key" - default = "../cloudgoat" - type = string -} diff --git a/scenarios/scenario_template/README.md b/scenarios/scenario_template/README.md index 55bbdb0d..42370bca 100644 --- a/scenarios/scenario_template/README.md +++ b/scenarios/scenario_template/README.md @@ -28,7 +28,9 @@ In this scenario, you are given AWS credentials. Your task is to... ## Exploitation Route -Include a Lucid Chart Diagram of the attack path here. +A flowchart illustrating the routes the attacker may take when completing the scenario. Lucidchart is recommended. + +![Scenario Route(s)](https://rhinosecuritylabs.com/wp-content/uploads/2018/07/cloudgoat-e1533043938802-1140x400.jpg) ## Walkthrough - [SERVICE] Secrets