Skip to content

Commit 099d401

Browse files
committed
update README
1 parent 0ae0560 commit 099d401

File tree

3 files changed

+17
-14
lines changed

3 files changed

+17
-14
lines changed

README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ A video walkthrough of the installation process is available [here](https://www.
9191
| Release | Last date of support |
9292
|---------------------------------------------------------------|----------------------|
9393
| [v.0.6.0](https://github.com/Limmen/csle/releases/tag/v0.6.0) | 2024-12-24 |
94-
| [v.0.5.0](https://github.com/Limmen/csle/releases/tag/v0.5.0) | 2024-06-02 |
94+
| [v.0.5.0](https://github.com/Limmen/csle/releases/tag/v0.5.0) | ~~2024-06-02~~ |
9595
| [v.0.4.0](https://github.com/Limmen/csle/releases/tag/v0.4.0) | ~~2024-02-07~~ |
9696
| [v.0.3.0](https://github.com/Limmen/csle/releases/tag/v0.3.0) | ~~2024-01-17~~ |
9797
| [v.0.2.0](https://github.com/Limmen/csle/releases/tag/v0.2.0) | ~~2023-10-30~~ |

emulation-system/base_images/README.MD

+1-1
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ more specific Docker images.
1515
- OS: Debian:10.2.
1616
- Inherits from `debian_10_base`.
1717
- `cve_2015_3306_base` ([cve_2015_3306_base](./docker_files/cve_2015_3306_base)): a base image for csle emulations with the CVE-2015-3306 vulnerability.
18-
- [![Docker Pulls](https://badgen.net/docker/pulls/kimham/csle_cve_2015_3306_base?icon=docker&label=pulls)](https://hub.docker.com/r/kimham/csle_csle_cve_2010_0426_1/
18+
- [![Docker Pulls](https://badgen.net/docker/pulls/kimham/csle_cve_2015_3306_base?icon=docker&label=pulls)](https://hub.docker.com/r/kimham/csle_csle_cve_2010_0426_1/)
1919
- OS: Debian:10.2.
2020
- Inherits from `debian_10_base`.
2121
- `cve_2015_5602_base` ([cve_2015_5602_base](./docker_files/cve_2015_5602_base)): a base image for csle emulations with the CVE-2015-5602 vulnerability.

emulation-system/envs/README.md

+15-12
Original file line numberDiff line numberDiff line change
@@ -3,18 +3,21 @@
33
This folder contains emulation environments.
44

55
- Version: **060** [./060](060):
6-
- *Level 1* [level_1](040/level_1): A simple infrastructure with 6 nodes and weak-password-vulnerabilities
7-
- *Level 2* [level_2](040/level_2): An infrastructure with 12 nodes and weak-password-vulnerabilities
8-
- *Level 3* [level_3](040/level_3): A complex infrastructure with 33 nodes and weak-password-vulnerabilities
9-
- *Level 4* [level_4](040/level_4): A simple infrastructure with 6 nodes and weak-password-vulnerabilities and IDS monitoring
10-
- *Level 5* [level_5](040/level_5): An infrastructure with 12 nodes and weak-password-vulnerabilities and IDS monitoring
11-
- *Level 6* [level_6](040/level_6): A complex infrastructure with 33 nodes and weak-password-vulnerabilities and IDS monitoring
12-
- *Level 7* [level_7](040/level_7): An infrastructure with 15 nodes and several vulnerabilities: SambaCry, Shellshock, CVE-2015-1427, CVE-2015-3306, CVE-2016-100033_1,and SQL injection., as well as SSH, FTP, Telnet servers that can be compromised using dictionary attacks
13-
- *Level 8* [level_8](040/level_8): An infrastructure with 26 nodes and several vulnerabilities: SambaCry, Shellshock, CVE-2015-1427, CVE-2015-3306, CVE-2016-100033_1,and SQL injection., as well as SSH, FTP, Telnet servers that can be compromised using dictionary attacks
14-
- *Level 9* [./level_9](040/level_9): A complex infrastructure with 36 nodes and and several vulnerabilities: SambaCry, Shellshock, CVE-2015-1427, CVE-2015-3306, CVE-2016-100033_1, SQL injection, and brute-force vulnerabilities. Further, the infrastructure has IDS monitoring
15-
- *Level 10* [./level_10](040/level_10): An infrastructure with 16 nodes and several vulnerabilities: SambaCry, Shellshock, CVE-2015-1427, CVE-2015-3306, CVE-2016-100033_1,and SQL injection., Pengine Server RCE Exploit, as well as SSH, FTP, Telnet servers that can be compromised using dictionary attacks
16-
- *Level 11* [./level_11](040/level_11): A complex infrastructure with 36 nodes and and several vulnerabilities: SambaCry, Shellshock, CVE-2015-1427, CVE-2015-3306, CVE-2016-100033_1, SQL injection, and brute-force vulnerabilities. Further, the infrastructure has IDS monitoring
17-
- *Level 12* [./level_12](040/level_12): A simple software-defined networking environment
6+
- *Level 1* [level_1](060/level_1): A simple infrastructure with 6 nodes and weak-password-vulnerabilities
7+
- *Level 2* [level_2](060/level_2): An infrastructure with 12 nodes and weak-password-vulnerabilities
8+
- *Level 3* [level_3](060/level_3): A complex infrastructure with 33 nodes and weak-password-vulnerabilities
9+
- *Level 4* [level_4](060/level_4): A simple infrastructure with 6 nodes and weak-password-vulnerabilities and IDS monitoring
10+
- *Level 5* [level_5](060/level_5): An infrastructure with 12 nodes and weak-password-vulnerabilities and IDS monitoring
11+
- *Level 6* [level_6](060/level_6): A complex infrastructure with 33 nodes and weak-password-vulnerabilities and IDS monitoring
12+
- *Level 7* [level_7](060/level_7): An infrastructure with 15 nodes and several vulnerabilities: SambaCry, Shellshock, CVE-2015-1427, CVE-2015-3306, CVE-2016-100033_1,and SQL injection., as well as SSH, FTP, Telnet servers that can be compromised using dictionary attacks
13+
- *Level 8* [level_8](060/level_8): An infrastructure with 26 nodes and several vulnerabilities: SambaCry, Shellshock, CVE-2015-1427, CVE-2015-3306, CVE-2016-100033_1,and SQL injection., as well as SSH, FTP, Telnet servers that can be compromised using dictionary attacks
14+
- *Level 9* [./level_9](060/level_9): A complex infrastructure with 36 nodes and and several vulnerabilities: SambaCry, Shellshock, CVE-2015-1427, CVE-2015-3306, CVE-2016-100033_1, SQL injection, and brute-force vulnerabilities. Further, the infrastructure has IDS monitoring
15+
- *Level 10* [./level_10](060/level_10): An infrastructure with 16 nodes and several vulnerabilities: SambaCry, Shellshock, CVE-2015-1427, CVE-2015-3306, CVE-2016-100033_1,and SQL injection., Pengine Server RCE Exploit, as well as SSH, FTP, Telnet servers that can be compromised using dictionary attacks
16+
- *Level 11* [./level_11](060/level_11): A complex infrastructure with 36 nodes and and several vulnerabilities: SambaCry, Shellshock, CVE-2015-1427, CVE-2015-3306, CVE-2016-100033_1, SQL injection, and brute-force vulnerabilities. Further, the infrastructure has IDS monitoring
17+
- *Level 12* [./level_12](060/level_12): A simple software-defined networking environment
18+
- *Level 13* [./level_13](060/level_13): A complex infrastructure with 64 nodes and several vulnerabilities: SambaCry, Shellshock, CVE-2015-1427, CVE-2015-3306, CVE-2016-100033_1,and SQL injection., Pengine Server RCE Exploit, as well as SSH, FTP, Telnet servers that can be compromised using dictionary attacks
19+
- *Level 14* [./level_14](060/level_14): An infrastructure with a flat topology and 17 nodes and several vulnerabilities: SambaCry, Shellshock, CVE-2015-1427, CVE-2015-3306, CVE-2016-100033_1,and SQL injection., Pengine Server RCE Exploit, as well as SSH, FTP, Telnet servers that can be compromised using dictionary attacks
20+
- *Level 15* [./level_15](060/level_15): A infrastructure with 4 nodes and weak-password vulnerabilities.
1821

1922
## Useful commands:
2023

0 commit comments

Comments
 (0)