diff --git a/src/assets/images/xfce-well-bluemenu.png b/src/assets/images/xfce-well-bluemenu.png new file mode 100644 index 0000000..69b4786 Binary files /dev/null and b/src/assets/images/xfce-well-bluemenu.png differ diff --git a/src/assets/images/xfce-well-redmenu.png b/src/assets/images/xfce-well-redmenu.png new file mode 100644 index 0000000..134f900 Binary files /dev/null and b/src/assets/images/xfce-well-redmenu.png differ diff --git a/src/assets/images/xfce-well-secmenu.png b/src/assets/images/xfce-well-secmenu.png index e150196..e49fe5c 100644 Binary files a/src/assets/images/xfce-well-secmenu.png and b/src/assets/images/xfce-well-secmenu.png differ diff --git a/src/content/docs/en/resources/blueteam-menu.mdx b/src/content/docs/en/resources/blueteam-menu.mdx index 165d671..e6869ee 100644 --- a/src/content/docs/en/resources/blueteam-menu.mdx +++ b/src/content/docs/en/resources/blueteam-menu.mdx @@ -5,7 +5,9 @@ description: Details about Blue Team Menu in Athena OS. import ImageComponent from "@components/ImageComponent.astro"; import ThemedImage from '@components/ThemedImage.astro'; -Blue Team Menu is born for organizing in pretty manner the main security defensive tools that users need to start their Blue Team activity. It consists of two levels: +Blue Team Menu is born for organizing in pretty manner the main security defensive tools that users need to start their Blue Team activity. It is deployed in different manner according to the installed environment. + +In GNOME, it consists of two levels: * 1st level containing the [NIST Cybersecurity Framework](https://www.nist.gov/cyberframework) phases * 2nd level consisting of defensive tools deployed for each NIST category @@ -51,6 +53,10 @@ In details: +In other environments, it reflects the classic menu layout in Linux. For example: + +![Blue Team Menu](@assets/images/xfce-well-bluemenu.png) + At the beginning, these tools are not installed to avoid that users would store in the disk space installed tools or services that never use. For users that would like to get these main tools, the **Blue Teamer** role must be chosen on the Welcome App. diff --git a/src/content/docs/en/resources/payload-dock.mdx b/src/content/docs/en/resources/payload-dock.mdx index e026dbb..4da8503 100644 --- a/src/content/docs/en/resources/payload-dock.mdx +++ b/src/content/docs/en/resources/payload-dock.mdx @@ -5,7 +5,9 @@ description: Access to the main payload repositories. import ImageComponent from "@components/ImageComponent.astro"; import ThemedImage from '@components/ThemedImage.astro'; -Payload to Dock is based on [Dash 2 Dock](https://github.com/micheleg/dash-to-dock) and keeps the access to the most famous payload repositories. It allows to get the latest version of payloads and accessing their path directly by the shell. It shows: +Several Athena OS environments offer the so called **Payload to Dock**. It is deployed in GNOME and XFCE Well environments. + +Payload to Dock in GNOME is based on [Dash 2 Dock](https://github.com/micheleg/dash-to-dock) while the on in XFCE comes from the standard XFCE panel. Payload to Dock keeps access to the most famous payload repositories and retrieves the latest version of payloads and lands to their path directly by the shell. It provides: * [Auto Wordlists](https://github.com/carlospolop/Auto_Wordlists) * [FuzzDB](https://github.com/fuzzdb-project/fuzzdb) * [PayloadAllTheThings](https://github.com/swisskyrepo/PayloadsAllTheThings) @@ -14,7 +16,13 @@ Payload to Dock is based on [Dash 2 Dock](https://github.com/micheleg/dash-to-do The Dock contains also links to **Mimikatz** and **Powersploit** resources, and allows to run the **current shell** and **PowerShell**. Furthermore, it offers **CyberChef** access directly on your desktop. -![Payload to Dock](@assets/images/payload-dock.png) +In GNOME: + +![GNOME Payload to Dock](@assets/images/payload-dock.png) + +In XFCE Well: + +![XFCE Payload to Dock](@assets/images/xfce-well-menudock.png) At the beginning, these repositories are not installed, to avoid that users would store in the disk space payload repositories that never use. If you would like to get these repositories, click on the button of the repositories you want to retrieve, or set a [Cyber Security role](/en/resources/athena-welcome/#cyber-security-roles) compliant with these resources. diff --git a/src/content/docs/en/resources/pwnage-menu.mdx b/src/content/docs/en/resources/pwnage-menu.mdx index b3f5244..8548f75 100644 --- a/src/content/docs/en/resources/pwnage-menu.mdx +++ b/src/content/docs/en/resources/pwnage-menu.mdx @@ -11,7 +11,7 @@ import ThemedImage from '@components/ThemedImage.astro'; ![PWNage Menu](@assets/images/pwnage-menu.png) -PWNage menu can be accessed by `CTRL+SHIFT+SPACE`. +PWNage menu can be accessed by `CTRL+SHIFT+SPACE` in GNOME environment. One of the most interesting features of Athena is the deep **integration** with [Hack The Box](https://app.hackthebox.com) platform, accessible by PWNage menu. Athena gives the possibility to play Hack The Box machines directly on the OS environment in a **quick** and **comfortable** manner. It offers: * **Connect/Disconnect** to/from Hack The Box VPN servers diff --git a/src/content/docs/en/resources/redteam-menu.mdx b/src/content/docs/en/resources/redteam-menu.mdx index 927b09c..25681a4 100644 --- a/src/content/docs/en/resources/redteam-menu.mdx +++ b/src/content/docs/en/resources/redteam-menu.mdx @@ -5,7 +5,9 @@ description: Details about Red Team Menu in Athena OS. import ImageComponent from "@components/ImageComponent.astro"; import ThemedImage from '@components/ThemedImage.astro'; -Red Team Menu is born for organizing in pretty manner the main pentesting tools that users need to start their hacking activity. It consists of two levels: +Red Team Menu is born for organizing in pretty manner the main pentesting tools that users need to start their hacking activity. It is deployed in different manner according to the installed environment. + +In GNOME, it consists of two levels: * 1st level containing several hacking categories, plus browser and VSCodium as editor * 2nd level consisting of hacking tools deployed for each hacking category @@ -87,6 +89,10 @@ In details: +In other environments, it reflects the classic menu layout in Linux. For example: + +![Red Team Menu](@assets/images/xfce-well-redmenu.png) + At the beginning, these tools are not installed to avoid that users would store in the disk space installed tools or services that never use. For users that would like to get these main tools, the **Enthusiast Student** role must be chosen on the Welcome App.