Workflows
The current page describes the ideal sequence of steps to use when you want to use Cryton to automate the attacks.
Deployment¶
Once you have your infrastructure, install Cryton onto it:
- Deploy and start Hive
- Deploy and start Worker(s)
- Deploy CLI or Frontend
- Make sure it works:
- To ensure your deployment works, try to perform a successful healthcheck on your Worker(s) using CLI, frontend, or possibly REST API
- Additionally, check the Hive and Worker(s) output if there are any errors
Tips
- In case you are hosting a Cyber defense exercise with an infrastructure for each team, use one Worker per team
Attack planning¶
Every Run can be described by a simple formula:
plan template + inventory = Plan instance
Plan instance + Worker = Plan execution
Plan instance + Workers = Run
Which results in the following steps:
- Design a plan template (scenario)
- Create a Plan instance
- Register the Worker(s)
- Create a Run
- Schedule or execute the Run
- Get the Run report