This is a Wargame VM designed for teaching and challenging people in the basics of Exploitation Development and Reverse Engineering.
I created this to help our growing community of Cyber Security veterans of VetSec learn about Exploitation Development and Reverse Engineering. I intend on having this be open to the public for use by anyone (assuming credit is given if used for purposes other than self learning). It is a work in progress, so please feel free to provide any feedback.
- Set up initial VM with preinstalled tools with tutorial
- Create initial challenges with tutorials
- Work on intermediate challenges without tutorials
- Create intro to linux?
How to use?
- You will need to install the correct version for your Host OS. This is a VM manager that makes it easy to spin up VM's.
- VirtualBox Best if installed directly from virtualbox website, not linux repo
- You will need to install the correct version for your Host OS since the Wargame VM base is VirtualBox.
- Basic Command Line knowledge (Both your Host OS and Linux)
- In Linux, you will need to be able to list files/directories, change directories, execute/run a script/tool
- In your Host OS, you will only need to know how to run
vagrant sshfrom the Wargame root folder.
If any of this seems challenging to you and you might need a little help, I recommend using a little google for now, until my tutorial is complete.
Create the Wargame!
Create the Wargame from scratch
Download the Wargame from Github via git clone or the zip file.
In a terminal/command prompt, navigate to the root folder of the Wargame and run
vagrant up and then
vagrant ssh when it is done provisioning to log in.
Run the pre-configured Wargame
If you would like to save a little time, I provided the Wargame in a portable .box file on my Google Drive.
Simply place the vetsec-wg.box file into a folder and just run
vagrant add vetsec-wg vetsec-wg.box followed by
Then from a terminal/command prompt while inside the directory of the box, run
vagrant ssh to ssh into the box and head to the challenges located in the home directory!
Play the challenges
The challenges are located in the home directory in the folder called 'challenges'. Please read the README for each challenge. For now, there is no tutorial, but it is in the works!
Other useful information
Logging out and tearing down
To log out, just type
logout while in the VM.
Once outside of the VM, while still in the terminal/command prompt, run
vagrant halt to shut down the VM or
vagrant destroy to remove it entirely.
default username: vagrant
default password: vagrant
Please see my blog post about the creation of this VM for other information about the VM and how I created it. There will be more blog posts to follow as I go along!
Common issues and fixes
There is already a VM with this name created
If you ran
vagrant up and tried to run this installation again in another folder on the same computer without running
vagrant destroy, the old vm is lingering with the same name. To remove it, open virtual box and delete the old box, then you should be able to
vagrant up in the new location.
This is likely because you tried to install virtualbox from the apt repositories, which can cause issues. Please follow the instructions located here for your particular OS.
If you would like to help contribute, please feel free to shoot me a message on any of my methods of communication and we can discuss things in need.
I hope you find this to be useful in your endevours. I'm happy to help in any way I can if you reach out to me. Also, please provide credit to me if you intend to use this for any purpose besides your own self teaching.