Skip to content
Find file
Fetching contributors…
Cannot retrieve contributors at this time
113 lines (69 sloc) 3.61 KB

gauntlt Build Status Code Climate

gauntlt is a ruggedization framework

PROJECT STATUS

The gauntlt project is under active development and is not ready for production use but we are looking for community feedback and involvement on the project. Please file issues via github and follow the project on twitter: @gauntlt.

Have questions? Ask us anything on the gauntlt google group or find us on irc at #gauntlt (irc.freenode.net).

GET STARTED

Before you start, please note that gauntlt is tested regularly against ruby 1.9.3. We don't test againt older versions of ruby. Keep in mind that you run gauntlt separately from the application it targets, so it does not matter whether the targeted application uses ruby.

  1. Install the gem

    $ gem install gauntlt
    
  2. Create an attack file and put it anywhere you like

    # nmap.attack
    Feature: nmap attacks
      Background:
        Given "nmap" is installed
        And the target hostname is "google.com"
    
      Scenario: Verify server is available on standard web ports
        When I launch an "nmap" attack with:
          """
          nmap -p 80,443 <hostname>
          """
        Then the output should contain:
          """
          80/tcp  open  http
          443/tcp open  https
          """
    
  3. Run gauntlt to launch the attack defined above

    $ gauntlt attack -n nmap -a nmap.attack
    # general format:
    #  $ gauntlt attack --name <attack_name> --attack-file <path>
    

    For more attack examples, refer to features/attacks.

  4. Other commands

    # list defined attacks
    $ gauntlt attack --list
    
    # get help
    $ gauntlt help
    

For developers

  1. Clone the git repo and get the submodules

    $ git clone --recursive git://github.com/thegauntlet/gauntlt.git
    
  2. Install bundler

    $ gem install bundler
    
  3. Install dependencies

    $ bundle
    # if you get errors, you may need to install curl libs first
    # on ubuntu:
    #   $ sudo apt-get install libcurl4-openssl-dev
    
  4. Run the cucumber features and rspec examples

    $ bundle exec rake
    
  5. Launch attacks with bin/gauntlt

    $ bin/gauntlt attack -n nmap -a my_attack_file.attack
    
  6. Refer to the features directory for usage examples and please write cucumber features for any new functionality you wish to submit.

ROADMAP

We are adding different features into gauntlt rignt now. Please submit issues via github and tag them as enhancements. The core team meets weekly and will divide out the enhancement requests into our monthly releases.

Below are some tools we are targeting but don't let that stop you from adding your favorite hacking tool.

ADD AN ATTACK ADAPTER

See the wiki on how to add an attack adapter to gauntlt. We would love your contributions.

LICENSE

gauntlt is licensed under The MIT License. See the LICENSE file in the repo or visit gauntlt.mit-license.org for details.

Something went wrong with that request. Please try again.