Aurora

This projects contains the attack chains generated by Aurora, an semi-automated cyber attack construction framework.

View on GitHub

Introduction

Paper thumbnail

Our paper: From Sands to Mansions: Towards Automated Cyberattack Emulation with Classical Planning and Large Language Models

System Overview

cli output

Aurora’s architecture comprises five components:

Attack Demos

Attack chains

This folder stores attack chains generated by Aurora. Each folder in examples contains an attach chain, which includes the emulation plan details and attack steps.

For more details, please refer to the introduction to attack chains.

Infrastructure Download

Use the generated attack chain YML file and run pull.py to automatically download and deploy the corresponding virtual machine environment (works with VirtualBox; VMware users can manually deploy the downloaded files). Two download modes are supported:

No duplicate downloads: If the file already exists, it will prompt whether to directly proceed with deployment.

Allow duplicate downloads: Files will be automatically renamed to avoid conflicts.

During initial deployment (including repeated deployments), the VM will not start automatically, allowing users to modify configurations.

By default, two network adapters will be configured: one in NAT mode and the other in Host-only mode. Make sure the required network is configured in VirtualBox; otherwise, the VM may fail to start.

## Prohibiting duplicate deployment
python pull.py -p #yml_file_path -d #storage_path -vm #VBoxManage.exe_path --url_table #url_table_path -nr -firewall #yes/no
## Allowing duplicate downloads
python pull.py -p #yml_file_path -d #storage_path -vm #VBoxManage.exe_path --url_table #url_table_path -r -firewall #yes/no

Here detailed multiple victim machine ,you can customize based on your needs.

Emulation Topology

cli output

If you want to set up a more realistic attack environment, this doc outlines a network topology with attacker and victim setups, including firewalls and DNS_servers to better mimic real-world attack scenarios. Just follow the guide to configure your environment! we’ve also got a pre-configured Kali attack machine ready for you! You can download it directly from here.

Script Execution

We’ve generated executable attack scripts with AURORA and placed them in here .Once your environment is configured, simply open the console, run the scripts, and follow the on-screen instructions to execute the attack.

python ../results/execution_xxxx.py

Click the following headings for details:

EXAMPLE-1_execution_keyboard_input_simulated-3 This attack plan uses `Metasploit` and `Sliver` tools to compromise Windows systems. First, a listener is established to capture incoming connections. A malicious `Sliver` payload is then created and delivered by tricking the victim into downloading/running it, granting remote access. Finally, this access is leveraged to deploy a stealthy `Meterpreter` payload via `Sliver` for data exfiltration (`keyboard input simulation`).

cli output

EXAMPLE-2_execution_file_info_known-1 This attack simulation targets Windows systems using `Sliver` and `Metasploit`. It starts by creating a `Sliver` implant (malicious.exe) and tricking the victim into downloading/running it as Administrator. This grants attackers an elevated `Sliver` C2 session. Next, a `Metasploit` listener is set up to catch a reverse HTTPS payload ("meterpreter_reverse_http") deployed through `Sliver`, enabling a stealthy `Meterpreter` session. Finally, attackers use `Meterpreter` to search for sensitive files (like *.txt) on compromised machines.

cli output

Licensing

Distributed under the MIT License. The attack chains are for education, research, and testing purpose. The author does not condone any illegal use. Use as your own risk.