_ _
| | | |
___ _ __ ___ ___ _ __ __ _| |__ | | ___
/ __| '_ \ / _ \ / _ \| '_ \ / _` | '_ \| |/ _ \
\__ \ |_) | (_) | (_) | | | | (_| | |_) | | __/
|___/ .__/ \___/ \___/|_| |_|\__,_|_.__/|_|\___|
| |
|_|
Pentesting environment "On premise" for a workstation - github.com/archidote
Select an option :
0 - windows
1 - linux
2 - applications
3 - Vagrant lab manager
4 - Docker container lab manager
5 - Install/Launch Kali
6 - Update
q - quit
- Virtualbox 6.1
- Vagrant 2.3.4
- Ansible 2.13.4
- Docker 20.10.21
First of all, install on your host the last vagrant version from the official website (apt packages are not synchronize with the last version unfortunatly)
https://developer.hashicorp.com/vagrant/downloads
afterthat, please install the following component with apt :
sudo apt update
sudo apt install virtualbox ansible docker-ce docker-compose
If this is not already the case for virtualbox, configure a dedicated virtual interface with the following name : vboxnet0
Go to File -> Host Network Manager
And then click on create to add the virtual interface vboxnet0. don't forget to enable DHCP server :
WARNING : In order not to have to make too many changes (on the network settings side), choose the following IP range for the vboxnet0 virtual interface:
- IPv4 Adress/Mask : 192.168.56.1/24
- IPv6 Adress/Mask : Leave empty
- DHCP Server : Enabled
Below, here are all the network parameters associated with the vboxnet0 card. Please make sure that the settings are the same on your side to avoid any communication problems especially for windows labs
That's it for the prerequisites
git clone https://github.com/archidote/spoonable
cd spoonable
python3 spoonable.py
chmod u+x run.sh
sudo ln -s "$(pwd)/run.sh" "/usr/local/bin/spoonable"
And then, you can call the spoonable command from everywhere.
cd ~
cd .local/share/applications/
nano spoonable.desktop
[Desktop Entry]
Name=spoonable
Comment=spoonable
Exec=/usr/local/bin/spoonable
Type=Application
Terminal=true
Categories=System;GTK;Utility;
Logout from your session and login back.
spoonable is an open source project that aims to provide different test environments (dedicated applications, operating systems) to easily test and exploit some known vulnerabilities.
Let's take the following case:
If I want to test the pwnkit vulnerability, I just need to perform the following actions:
_ _
| | | |
___ _ __ ___ ___ _ __ __ _| |__ | | ___
/ __| '_ \ / _ \ / _ \| '_ \ / _` | '_ \| |/ _ \
\__ \ |_) | (_) | (_) | | | | (_| | |_) | | __/
|___/ .__/ \___/ \___/|_| |_|\__,_|_.__/|_|\___|
| |
|_|
Pentesting environment "On premise" for a workstation - github.com/archidote
Select an option :
0 - windows
1 - linux
2 - applications
3 - Vagrant lab manager
4 - Docker container lab manager
5 - Install/Launch Kali
6 - Update
q - quit
>> 1
Select your vuln among the following list :
0 - 12years
1 - dare-to-have-rights
2 - docker-host-misconfiguration
3 - docker-host-misconfiguration-2
4 - docker-registry-misconfiguration
5 - dosu
6 - epipytrid
7 - he-should-have-removed-this
8 - siuuuuuud
b - back
>> 0
While the download progresses, check out the file: {ENVIRONMENT}/
pwnkit/README.md
So here the correct path would be: linux/pwnkit/README.md
because we are testing the "pwnkit" vulnerability that impacts the Linux family of open source operating systems.
Post Exploitation only : If you accidentally close your terminal with an SSH session connected to a VM. Here's how to proceed, to reconnect to the target using SSH. For example :
user@ubuntu:~$ cd linux/12years/ user@ubuntu:~$ vagrant ssh vagrant@spoonable-12years:~$ su spoonable
-
Spoonable only needs the internet to retrieve large vulnerable artifacts. Make sure you are on a good wired/wireless network, so you don't lose too much time to start your tests.
-
If you want to take notes about the differents challenge, please use an other directory than spoonable/ in order to avoid problem id you update it.
-
Spoonable doesn't need sudo by défault (only when he manage vulnerable VM). However, when using vulnerable containers, sudo pre-command becomes necessary.
Using the embedded version of kalilinux in spoonable is not mandatory. You can use your own. However, it must be able to communicate with the spoonable lab VMs. (add the vboxnet0 network card).
Otherwise, you can use exegol which is a fully featured hacking environment container.
- Windows
- Web
- Linux
- ?