Releases: fkie-cad/socbed
Releases · fkie-cad/socbed
SOCBED v1.3.7
Fixes:
- Fix DNS configuration on the Internet Router, which occasionally caused internet outages for the entire network
- Fix DNS configuration and expired certificates on the Attacker
- Fix missing requirements on the Attacker preventing the external mail handler from running
- Replace deprecated
ssl.wrap_socket()
calls in thevmconsole
with their modern counterparts - Assign a unique VRDP port to each client clone upon session creation to enable access via VRDP
SOCBED v1.3.6
Fixes:
- Fix filename of file created by screenshot attack not being displayed correctly in the attackconsole
SOCBED v1.3.5
Fixes:
- Fix incomplete setup of environment in GitHub workflow
- Fix bug in
sqlmap_attack
test, which could fail due to incorrect terminal size on monitors >27"
Misc:
- Change minimum Python version to 3.9 and support up to 3.12 at least
- Update several package versions
- Replace deprecated package
smtpd
withaiosmptd
SOCBED v1.3.4
Fixes:
- Update binutils to prevent version conflicts on Attacker VM
SOCBED v1.3.3
Fixes:
- Update deprecating versions for GitHub actions
retry
andcheckout
SOCBED v1.3.2
Fixes:
- Update Ansible script URL due to change in Ansible repositories
- Increase timeout for Ansible task
spark
Misc:
- Use newer Windows 10 version by default (22H2)
- Add tox to CI requirements in docs
SOCBED v1.3.1
Fixes:
- Download Kali public key during setup
- Explicitly set time zone to CET on the Client to fix NTP time sync
- Include nmap attacks in system tests
SOCBED v1.3.0
Features:
- Add nmap attacks
- Add grc (color output)
- Add tab completion for attack options
Fixes:
- Use checkout@v3 instead of v2 to fix pipelines
Misc:
- Upgrade paramiko from 2.10.1 to 2.11.0
- Cleanup code
- Impose PEP 8 in various files
- Remove unused imports in various files
- Use f-string instead of older str.format() syntax where appropriate
SOCBED v1.2.0
Features:
- Add user emulation code to repo (was encapsulated in a hardly editable PEX file before)
- Add support for keyboard interrupt (Ctrl-C) in attackconsole while attacks are running
- Show executed commands in attackconsole
- Change
execute_malware
attack to run exe as current user instead of SYSTEM
Fixes:
- Update deprecated Kali image URL and switch to version 2021.4a (from 2021.4)
- Fix race condition in attacks system test (sometimes resulted in failed tests)
- Fix
kill_reverse_connection
attack to only kill actual meterpreter binaries (not the browser) - Increase system test timeouts
Misc:
- Add Python version to requirements
- Add
longtest
tox marker to unit tests that take >10 seconds to complete - Improve some code formatting and add license where missing
SOCBED v1.1.7
- [attackconsole] Add KeyboardInterrupt propagation to remote host and continuous console output
- [attackconsole] Add more specific output on timeout errors
- [pipeline] Increase certain runner timeout values
- [documentation] Improve description of Windows ISO download