Skip to content

Commit 198d5db

Browse files
committed
Update lab-DetectionLab.md
1 parent 03b23a7 commit 198d5db

File tree

1 file changed

+21
-14
lines changed

1 file changed

+21
-14
lines changed

home-lab/blueteam/lab-DetectionLab.md

+21-14
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,7 @@
11
# Detection Lab
22

3+
---
4+
35
## DetectionLab Intro
46

57
_DetectionLab is a repository containing a variety of `Packer`, `Vagrant`, `Powershell`, `Ansible`, and `Terraform` scripts that allow you to automate the process of bringing an ActiveDirectory environment online complete with logging and security tooling using a variety of different platforms. **DetectionLab was built with defenders in mind**._
@@ -29,6 +31,8 @@ Read more about DetectionLab on Medium [here](https://medium.com/@clong/introduc
2931

3032
![Vagrant](.gitbook/assets/vagrant-wiki.png)
3133

34+
---
35+
3236
### Primary Lab Features
3337

3438
> * **Microsoft Advanced Threat Analytics** is installed on the `WEF` machine, with the lightweight ATA gateway installed on the `DC`
@@ -122,20 +126,19 @@ Read more about DetectionLab on Medium [here](https://medium.com/@clong/introduc
122126
> * Velociraptor server
123127
>
124128
> #### Splunk Indexes
125-
126-
| Index Name | Description |
127-
| ------------------------------ | --------------------------------------------------------------------------------------------------------------------- |
128-
| evtx\_attack\_samples | Samples from [https://github.com/sbousseaden/EVTX-ATTACK-SAMPLES](https://github.com/sbousseaden/EVTX-ATTACK-SAMPLES) |
129-
| osquery | osquery/Fleet result logs |
130-
| osquery-status | osquery/fleet INFO/WARN/ERROR logs |
131-
| powershell | Powershell transcription logs |
132-
| suricata | Suricata IDS logs |
133-
| sysmon | Logs from the Sysmon service |
134-
| threathunting | Used for the ThreatHunting app |
135-
| wineventlog | Windows Event Logs |
136-
| zeek | Zeek network traffic logs |
137-
| ### Installed Tools on Windows | |
138-
129+
>
130+
> | Index Name | Description |
131+
> | ------------------------------ | ------------------------------------------------------------ |
132+
> | evtx_attack_samples | Samples from https://github.com/sbousseaden/EVTX-ATTACK-SAMPLES |
133+
> | osquery | osquery/Fleet result logs |
134+
> | osquery-status | osquery/fleet INFO/WARN/ERROR logs |
135+
> | powershell | Powershell transcription logs |
136+
> | suricata | Suricata IDS logs |
137+
> | sysmon | Logs from the Sysmon service |
138+
> | threathunting | Used for the ThreatHunting app |
139+
> | wineventlog | Windows Event Logs |
140+
> | zeek | Zeek network traffic logs |
141+
> | ### Installed Tools on Windows | |
139142
> * Sysmon
140143
> * Velociraptor Agent
141144
> * osquery
@@ -298,6 +301,8 @@ Read more about DetectionLab on Medium [here](https://medium.com/@clong/introduc
298301
* Clone the DetectionLab repo into the dedicated folder
299302

300303
```powershell
304+
cd X:\VIRTUALBOX # in my case
305+
301306
git clone https://github.com/clong/DetectionLab.git
302307
```
303308

@@ -461,6 +466,8 @@ vagrant destroy
461466

462467
* 🔗 Check the [Usage official repo](https://detectionlab.network/usage/)
463468

469+
---
470+
464471
## DetectionLab Customization
465472

466473
* 🔗 Check the [Customization official repo](https://detectionlab.network/customization/)

0 commit comments

Comments
 (0)