7 CONCLUSIONS
The number of digital accounts is ever-increasing.
The same is the case with attacks on them, ranging
from brute-force attacks to sophisticated supply chain
attacks targeting active directory environments. In or-
der to train beginners, we designed a series of blue
team scenarios with the topic of brute-force attacks
on authentication in a web application. In the first
step, we evaluated related work. With the help of the
results obtained, three consecutive scenarios for the
cyber range were designed and implemented. These
scenarios each cover a specific part of the learning
content and lay the foundation for beginners and those
interested in protection against brute-force attacks.
Nonetheless, more scenarios are required to train fu-
ture system administrators. Finally, the open-source
scenarios were assessed in a small-scale training and
a discussion.
In future work, we plan to extend the scenarios to
cover different attacks on identities and identity man-
agement systems, such as the more advanced attacks
of Kerberoasting, Golden Ticket, and Golden SAML,
and other OSs, in particular Windows. In addition, we
will evaluate and improve our description language
with these scenarios and discuss it with other experts.
For the brute-force scenarios, regular traffic was gen-
erated with Selenium. We want to investigate other
techniques and represent the traffic more realistically
for a better training setup in future work.
REFERENCES
Adeleke, O. A., Bastin, N., and Gurkan, D. (2022). Network
Traffic Generation: A Survey and Methodology. ACM
Comput. Surv., 55(2).
Adobe (2023). XAMPP Apache + MariaDB + PHP + Perl.
https://www.apachefriends.org/index.html. accessed
January 11, 2023.
Al-Mohannadi, H., Mirza, Q., Namanya, A., Awan, I.,
Cullen, A., and Disso, J. (2016). Cyber-Attack Mod-
eling Analysis Techniques: An Overview. In Proceed-
ings of the 4th International Conference on Future In-
ternet of Things and Cloud Workshops (FiCloudW),
pages 69–76. IEEE.
Arshad, S., Alam, M., Al-Kuwari, S., and Khan, M. H. A.
(2021). Attack Specification Language: Domain
Specific Language for Dynamic Training in Cyber
Range. In Proceedings of the 12th Global Engineering
Education Conference (EDUCON), pages 873–879.
IEEE.
FoxyProxy (2023). FoxyProxy. https://getfoxyproxy.org.
accessed January 11, 2023.
G
´
alikov
´
a, M.,
ˇ
Sv
´
abensk
´
y, V., and Vykopal, J. (2021). To-
ward Guidelines for Designing Cybersecurity Serious
Games. In Proceedings of the 52nd Technical Sympo-
sium on Computer Science Education (SIGCSE), page
1275. Association for Computing Machinery.
Kaschow, R., Hanka, O., Kn
¨
upfer, M., and Eiseler, V.
(2017). Cyber Range: Netzverteidigung trainieren
mittels Simulation. In Proceedings of the D•A•CH Se-
curity 2017, pages 126–137. syssec.
Kn
¨
upfer, M., Bierwirth, T., Stiemert, L., Schopp, M., See-
ber, S., P
¨
ohn, D., and Hillmann, P. (2020). Cyber
Taxi: A Taxonomy of Interactive Cyber Training and
Education Systems. In Hatzivasilis, G. and Ioanni-
dis, S., editors, Model-driven Simulation and Training
Environments for Cybersecurity, pages 3–21, Cham.
Springer International Publishing.
Koutsouris, N., Vassilakis, C., and Kolokotronis, N. (2021).
Cyber-Security Training Evaluation Metrics. In Pro-
ceedings of the 1st International Conference on Cyber
Security and Resilience (CSR), pages 192–197. IEEE.
Lopez-Araiza, C. and Cankaya, E. (2017). A Comprehen-
sive Analysis of Security Tools for Network Foren-
sics. Journal of Medical - Clinical Research & Re-
views, 1(3):1–9.
Lord, N. (2020). Uncovering Password Habits: Are
Users’ Password Security Habits Improving?
https://digitalguardian.com/blog/uncovering-
password-habits-are-users-password-security-
habits-improving-infographic. accessed January 11,
2023.
Masaryk University (2022). KYPO Cyber Range Platform.
https://docs.crp.kypo.muni.cz. accessed January 11,
2023.
Meyer, R. (2021). Detecting Attacks on Web Applications
from Log Files. techreport, SANS Institute.
Mohammed, M. A., Degadzor, A. F., Effrim, B. F., and
Appiah, K. A. (2017). Brute Force Attack detection
and prevention on a network using wireshark analy-
sis. International Journal of Engineering Sciences &
Research Technology, 6(6):26–37.
Nagarajan, A., Allbeck, J. M., Sood, A., and Janssen,
T. L. (2012). Exploring game design for cyberse-
curity training. In Proceedings of the International
Conference on Cyber Technology in Automation, Con-
trol, and Intelligent Systems (CYBER), pages 256–
262. IEEE.
Offensive Security (2023a). All Kali Tools. https://www.
kali.org/tools/all-tools/. accessed January 11, 2023.
Offensive Security (2023b). PEN-103 Modules.
https://portal.offensive-security.com/courses/pen-
103/books-and-videos/modules. accessed January
11, 2023.
Port Swigger (2022). Burp Suite documentation. https:
//portswigger.net/burp/documentation. accessed Jan-
uary 11, 2023.
Ramya, P., Sindhura, V., and Sagar, P. V. (2017). Testing us-
ing selenium web driver. In Proceedings of the 2nd In-
ternational Conference on Electrical, Computer and
Communication Technologies (ICECCT), pages 1–7.
IEEE.
Shin, S., Seto, Y., Kasai, Y., Ka, R., Kuroki, D., Toyoda,
S., Hasegawa, K., and Midorikawa, K. (2019). De-
How to Design a Blue Team Scenario for Beginners on the Example of Brute-Force Attacks on Authentications
483