Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/center-for-threat-informed-defense/caldera_pathfinder

Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translating those scans into adversaries for network traversal.
https://github.com/center-for-threat-informed-defense/caldera_pathfinder

adversary-emulation caldera ctid cybersecurity red-team threat-informed-defense

Last synced: about 1 month ago
JSON representation

Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translating those scans into adversaries for network traversal.

Awesome Lists containing this project

README

        

# MITRE Caldera™ Plugin: Pathfinder

## Overview
Pathfinder is a [Caldera](https://github.com/mitre/caldera) plugin developed by the Center for Threat-Informed Defense. Pathfinder extends Caldera's functionality to support automated ingestion of network scanning tool output. By intelligently integrating scan data with an automated adversary emulation platform, Pathfinder will demonstrate how an adversary might use vulnerabilities in an environment to achieve their goals, highlighting a path through a network, and showing the real impact of a vulnerability for Caldera to analyze and execute against.

Pathfinder extends Caldera to do the following:
1. Run a scan of a target network or system
2. Upload the scan results to a running instance of Caldera
3. Use the ingested results to draw out potential attack paths Caldera could notionally take
4. Create workflows so that Caldera can follow the actual attack paths and execute a real attack

More information is provided under [docs](https://github.com/center-for-threat-informed-defense/caldera_pathfinder/tree/master/docs)

## Tutorial Video





## Screenshot

![plugin home](docs/pathfinder.jpg)

###### map vulnerabilities. plan attacks.

## Getting Started

If you want to run scans with nmap directly with the pathfinder plugin make sure to install nmap on your system

Install Caldera (if you don't have it already) and clone down the pathfinder repo into the `caldera/plugins` folder with this command:

`git clone https://github.com/center-for-threat-informed-defense/caldera_pathfinder.git pathfinder --recursive`

Go into `plugins/pathfinder` and run `pip install -r requirements.txt` to install dependencies, and note that you should have nmap installed already.

After that add `pathfinder` to enabled plugins list in the caldera conf file for your environment and you are set to start scanning and path finding!

## Questions and Feedback

Please submit issues for any technical questions/concerns or contact [email protected] directly for more general inquiries.

Also see the guidance for contributors if are interested in [contributing.](https://github.com/center-for-threat-informed-defense/caldera_pathfinder/blob/master/CONTRIBUTING.md)

## Liability / Responsible Usage

This content is only to be used with appropriate prior, explicit authorization for the purposes of assessing security posture and/or research.

## Notice

Copyright 2020 MITRE Engenuity. Approved for public release. Document number CT0007

Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at

http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.