csle_attacker package
Subpackages
- csle_attacker.emulation package
- Subpackages
- Submodules
- csle_attacker.emulation.attacker_stopping_middleware module
- csle_attacker.emulation.emulated_attacker module
- csle_attacker.emulation.exploit_middleware module
ExploitMiddleware
ExploitMiddleware.execute_cassandra_same_user_dictionary()
ExploitMiddleware.execute_cve_2010_0426_exploit()
ExploitMiddleware.execute_cve_2015_1427_exploit()
ExploitMiddleware.execute_cve_2015_3306_exploit()
ExploitMiddleware.execute_cve_2015_5602_exploit()
ExploitMiddleware.execute_cve_2016_10033_exploit()
ExploitMiddleware.execute_dvwa_sql_injection()
ExploitMiddleware.execute_ftp_same_user_dictionary()
ExploitMiddleware.execute_irc_same_user_dictionary()
ExploitMiddleware.execute_mongo_same_user_dictionary()
ExploitMiddleware.execute_mysql_same_user_dictionary()
ExploitMiddleware.execute_postgres_same_user_dictionary()
ExploitMiddleware.execute_sambacry()
ExploitMiddleware.execute_shellshock()
ExploitMiddleware.execute_smtp_same_user_dictionary()
ExploitMiddleware.execute_ssh_same_user_dictionary()
ExploitMiddleware.execute_telnet_same_user_dictionary()
- csle_attacker.emulation.post_exploit_middleware module
- csle_attacker.emulation.recon_middleware module
ReconMiddleware
ReconMiddleware.execute_finger()
ReconMiddleware.execute_firewalk_scan()
ReconMiddleware.execute_http_enum()
ReconMiddleware.execute_http_grep()
ReconMiddleware.execute_masscan_scan()
ReconMiddleware.execute_nikto_web_host_scan()
ReconMiddleware.execute_nmap_vulners()
ReconMiddleware.execute_os_detection_scan()
ReconMiddleware.execute_ping_scan()
ReconMiddleware.execute_tcp_con_stealth_scan()
ReconMiddleware.execute_tcp_fin_scan()
ReconMiddleware.execute_tcp_null_scan()
ReconMiddleware.execute_tcp_syn_stealth_scan()
ReconMiddleware.execute_tcp_xmas_scan()
ReconMiddleware.execute_udp_port_scan()
ReconMiddleware.execute_vulscan()
- Module contents
Submodules
csle_attacker.attacker module
- class csle_attacker.attacker.Attacker[source]
Bases:
object
Represents an automated attacker agent
- static attacker_transition(s: EmulationEnvState, attacker_action: EmulationAttackerAction) EmulationEnvState [source]
Implements an attacker transition of the MDP/Markov Game: (s, a) –> s’
- Parameters
s – the current environment state in the emulation
attacker_action – the attacker action
simulation – boolean flag if it is a simulated transition or an actual transition in the emulation
- Returns
s’ (EmulationEnvState)