Cyber security

DOLOST – Harnessing Cyber Deception For Strategic Security Deployments

Explore the cutting-edge framework ‘DOLOST,’ designed to innovate the field of cyber deception.

This tool automates the deployment of decoys and deceptive environments, enhancing security strategies.

Learn how DOLOST not only creates but also meticulously designs these operations to outsmart and trap potential threats.

Table Of Contents

  • About
  • Installation
  • Usage
  • Examples
  • Contributing
  • License

About

DOLOST is a framework designed to automate the creation and deployment of decoys and deceptive environments in the context of cyber deception operations.

It also guides the design of deception operations with a deep understanding of engagement strategies.

Installation

  1. Ensure Python and Docker are Installed:Make sure you have Python 3.7 or later installed on your system and Docker installed on your Decoy’s host (it could be the same system you are using right now, just keep it in mind for when you configure DOLOST). You can download and install Python from the official Python website and Docker from the official Docker website.
  2. Install DOLOST Using pip:Run the following command to install the project:
# Python 3.7+ required
$ python3 -m venv .venv
$ source .venv/bin/activate
$ pip install DOLOST

3. Final Checks:Ensure that all required dependencies are installed without any errors.

If you encounter any issues during the installation process, refer to the error messages for troubleshooting steps.

Usage

To use the framework you need to start it with a first definition of the Docker client to connect with.

Here you have an example for DOLOST execution:

import DOLOST

# Available Docker Client configuration:
# - from_env: Will try to use the current environment configuration to reach dockerd.
# - tcp: Will use the provided host and port to reach dockerd.
# - tcp_ssl: Will use the provided host and port + the SSL certificates to reach dockerd using TCP+SSL.
# - socket: Will use the provided socket path to reach dockerd.

# For more detailed information, refer to "Configuring Docker Client" in the Documentation.

dc = {'from_env': True}

# Available Verbosity Levels:
# - TRACE: Provides detailed tracing information.
# - DEBUG: Displays debug messages for troubleshooting.
# - INFO: Provides general information about the execution.
# - WARN: Displays warnings for potential issues.
# - ERROR: Indicates errors that occurred during execution.

# Note: Each verbosity level includes all levels above it. For example,
# setting verbosity to DEBUG will also display INFO, WARN, and ERROR messages.

verbosity = "INFO"
    
if __name__ == "__main__":
 DOLOST.start(verbosity=verbosity, docker_client=dc)

Tamil S

Tamil has a great interest in the fields of Cyber Security, OSINT, and CTF projects. Currently, he is deeply involved in researching and publishing various security tools with Kali Linux Tutorials, which is quite fascinating.

Recent Posts

vArmor : Enhancing Container Security In Cloud-Native Environments

vArmor is a cloud-native container sandbox system. It leverages Linux's AppArmor LSM, BPF LSM and Seccomp technologies to implement enforcers.…

47 seconds ago

LDAP Firewall – Enhancing Security With Advanced Active Directory Protection

LDAP Firewall is an open-source tool for Windows servers that lets you audit and restrict incoming…

50 seconds ago

CVE-2024-36401 : GeoServer Unauthenticated Remote Code Execution In Evaluating Property Name Expressions

GeoServer is an open-source software server written in Java that provides the ability to view,…

51 seconds ago

BetterScan-CE Wiki : Integrating Comprehensive Security Scans Into DevOps

It is a Code and Infrastructure (IaC) and Cloud-native Scanning/SAST/Static Analysis/Linting solution using many tools/Scanners…

38 mins ago

Betterscan – Comprehensive Security Orchestration For Code And Infrastructure

Scan your source code and infra IaC against top security risks Betterscan is a orchestration toolchain that…

1 day ago

SQLRecon – Comprehensive Guide To SQL Server Exploitation And Defense

SQLRecon is a Microsoft SQL Server toolkit that is designed for offensive reconnaissance and post-exploitation.…

1 day ago