=====
Firebolt is a DevSecOps project that helps the community collect and enumerate different types of attacks to be used in the Continuous Delivery of software features. The project is intended to provide a library and catalog of attacks to help DevOps teams test and continuously measure baseline drift. Firebolt will provide functionality for cataloging attacks to be included within software to support automated evaluation of attack surface during the preparation and deployment of software. Like quality checks, attacks are intended to help DevOps teams evaluate their software implementation and detect issues quickly so that they can be fixed.
The DevSecOps community is currently focusing on developing the Firebolt platform by understanding the templates used in Gauntlt and AttackIQ. However, as we recieve feedback and contributions we expect the project to develop into a more robust attack sharing platform and intend for DevOps teams to add these checks to there software repositories.
- Gauntlt: http://gauntlt.org/
- nmap: http://nmap.org
- Metasploit Framework: https://github.com/rapid7/metasploit-framework
###NOTE: All firebolt gauntlt attacks use environment variables( thanks wickett!) to set the attack host. This allows for more flexibility than hardcoded targets and can be used to loop through multiple hosts looking for positive attacks. The variables user are:
- TARGET_HOST for setting the host to attack
- TARGET_PORT for setting the port as needed
-
One very easy way to get started is to use Kali Linux. Kali already has the prerequisites installed and working in a nice and easy to use Debian based Linux distro. It's available at: https://www.kali.org/
-
Clone the firebolt github repo:
git clone https://github.com/devsecops/firebolt.git
- Install Gauntlt:
gem install gauntlt
-
Get familiar with Gauntlt and attack files: https://github.com/gauntlt/gauntlt
-
Let's test local host with one of the example attacks:
export TARGET_HOST=127.0.0.1
cd firebolt/gauntlt/attacks
gauntlt open-rmiregistry-server.attack
If everything was set up correctly you should see that the test passes.
##TODO
- Add a Metasploit Attack Adaptor to Gauntlt
- Add more attacks for Gauntlt
- Add initial attacks for AttackIQ
##How to Contribute
- Fork the repo
- Add some attacks
- Submit a Pull Request and we'll review