-
Notifications
You must be signed in to change notification settings - Fork 208
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support detonating attack techniques against existing infrastructure #63
Comments
@akingscote @MikeCain21 @wushingmushine thanks for upvoting this issue, can you give more detail as to why you'd be using this? |
Hey @christophetd, rather than attacking/exploiting an existing infra, can't we just simulate an attack and show if their current environment is vulnerable to corresponding technique or not. |
Hey @christophetd , Currently we have some automation in place which takes care of the warmup, revert, and cleanup phases of some short-lived infrastructure used for training. I would love to throw this tool into the mix so that we could simulate the current attack techniques and validate that our users have the knowledge to detect them / find the detections in other tools. |
Thanks for the feedback! The current complexity is about validating prerequisite infrastructure, and making sure it's left in a clean state. |
We won't support this for now as it requires core changes, and adds the need to validate that the provided infrastructure is in a correct state. |
Vote to show interest, and comment with why you'd need to use your own existing infrastructure!
The text was updated successfully, but these errors were encountered: