From the root of this project, install the PIP requirements.
pip3 install -r requirements.txt
Before you can start the server we need to change some environment variables:
Edit the /caldera/conf/local.yml and change the following values:
host: 192.168.1.5 - - Make this the IP you wish to hav the caldera agents connect to
port: 8888 - - you should leave this but it can be edited
exfil_dir: /tmp
memory: True
plugins:
stockpile
sandcat
gui
chain
Building Advanced Adversaries
In the caldera/plugins/stockpile/abilities folder you will find various skills grouped by the MITRE ATTACK Framework ( Defense Evasion, Lateral Movement, Credential Access, Etc). You can use the Caldera Workbook to quickly build custom adversaries to test controls:
Atomic-Caldera requires only two parameters to run. The input directory where the Red Canary Atomic Red Team “atomics” folder is located and the path to the MITRE CTI repository. The output folder option and CSV file options are optional, if they are not supplied, Atomic-Caldera will save these files in the current working directory.
Update-AtomicVariables requires only two parameters to run. The input directory containing the abilities YAML files that were generated by the Atomic-Caldera.py script and the path to the CSV file containing the variable values that will be used to populate the abilities YAML files. If the output option is not populated a new “abilities-updated” folder will be created in the same directory where the input source abilities are located.