|
|
@ -1,4 +1,4 @@ |
|
|
|
# virt-lab |
|
|
|
# virtual-test-environment |
|
|
|
VM lab environment for testing on-path VPN attacks |
|
|
|
|
|
|
|
|
|
|
@ -10,7 +10,7 @@ VM lab environment for testing on-path VPN attacks |
|
|
|
|
|
|
|
### Setup base virtual network |
|
|
|
|
|
|
|
1. Start all 6 VMs (3 routers and 3 edge nodes): `cd virt-lab; ./boot_all.sh` |
|
|
|
1. Start all 6 VMs (3 routers and 3 edge nodes): `cd virtual-test-environment; ./boot_all.sh` |
|
|
|
2. Go do something else cause its gonna take a while.. |
|
|
|
3. ssh to some machine: |
|
|
|
* ssh by port: `ssh -l vagrant localhost -p 22111` |
|
|
@ -23,23 +23,23 @@ VM lab environment for testing on-path VPN attacks |
|
|
|
|
|
|
|
#### Build VPN server |
|
|
|
|
|
|
|
1. Copy setup scripts to vpn server VM: `cd virt-lab/edgers/vpn-server; ./copy_vpn_setup.sh` |
|
|
|
2. Ssh to vpn server VM: `cd virt-lab/edgers/vpn-server; vagrant ssh` |
|
|
|
1. Copy setup scripts to vpn server VM: `cd virtual-test-environment/edgers/vpn-server; ./copy_vpn_setup.sh` |
|
|
|
2. Ssh to vpn server VM: `cd virtual-test-environment/edgers/vpn-server; vagrant ssh` |
|
|
|
3. Run interactive script to setup vm as a OpenVPN server: `./setup_vpn.sh` |
|
|
|
* Keep hitting `Enter` or `y` to leave all default values |
|
|
|
4. Run script to generate client config file: `./make_client_configs.sh` |
|
|
|
|
|
|
|
#### Connect client to VPN server |
|
|
|
|
|
|
|
1. Run script to copy `client1` config file from vpn server to client vm: `cd virt-lab/edgers/client; ./copy_client_config.sh` |
|
|
|
2. Ssh to the client VM: `cd virt-lab/edgers/client; vagrant ssh` |
|
|
|
1. Run script to copy `client1` config file from vpn server to client vm: `cd virtual-test-environment/edgers/client; ./copy_client_config.sh` |
|
|
|
2. Ssh to the client VM: `cd virtual-test-environment/edgers/client; vagrant ssh` |
|
|
|
2. Install OpenVPN on the client vm: `./connect.sh` |
|
|
|
3. Connect to the local vpn server: `sudo openvpn --client --config client1.ovpn &` |
|
|
|
|
|
|
|
#### Setup DNS server on "web-server" node |
|
|
|
|
|
|
|
1. Run script to copy dns setup scripts to vm: `cd virt-lab/edgers/web-server; ./copy_dns_setup.sh` |
|
|
|
2. Ssh to server vm: `cd virt-lab/edgers/web-server; vagrant ssh` |
|
|
|
1. Run script to copy dns setup scripts to vm: `cd virtual-test-environment/edgers/web-server; ./copy_dns_setup.sh` |
|
|
|
2. Ssh to server vm: `cd virtual-test-environment/edgers/web-server; vagrant ssh` |
|
|
|
3. Run docker install script: `./install_docker.sh` |
|
|
|
4. Start the dns bind docker container: `./start_dns.sh` (may need to log back in for new docker permissions) |
|
|
|
5. Check to make sure its alivee: `docker ps` or `docker logs bind` |
|
|
@ -47,8 +47,8 @@ VM lab environment for testing on-path VPN attacks |
|
|
|
|
|
|
|
#### Setup attack router for dns inject attack |
|
|
|
|
|
|
|
1. Start script to copy attacker setup to vm: `cd virt-lab/routers/router1; ./copy_attacker_setup.sh` |
|
|
|
2. Ssh to router vm: `cd virt-lab/routers/router1; vagrant ssh` |
|
|
|
1. Start script to copy attacker setup to vm: `cd virtual-test-environment/routers/router1; ./copy_attacker_setup.sh` |
|
|
|
2. Ssh to router vm: `cd virtual-test-environment/routers/router1; vagrant ssh` |
|
|
|
3. Run the setup script to install spoofing libraries and repo: `./setup_attacker.sh` |
|
|
|
4. Change to dns attack folder: `cd VeepExploit/server-side-attack/dns-sside/full_scan` |
|
|
|
5. Compile the attack script: `make` |
|
|
|