Skip to content

A small and simple network infrastructure with automated attacks on a VM server documented by tshark

License

Notifications You must be signed in to change notification settings

LeKlex/Attack-simulation-infrastructure

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

42 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Attack simulation infrastructure

What is it?

This is a simple setup with (actual) 3 VMs. One VM is used as companies web appearance / intranet. The second one is its syslog server. The last one is playing the role of an attacker/hacker.

What is it for?

IT IS JUST FOR EDUCATIONAL USE!

I developed this small setup for some courses at the TU Wien (Technical University of Vienna). It is/was used to create networking dumps of several attacks for forensic student tasks.

Anyhow, I think this project can show people

  • how attacks are performed
  • how to find vulnerabilities
  • how to detect them
  • how to do some digital forensics
  • and most important, how to protect yourself.

Used software

Requirements

Usage

First of all you need to install the required software.

Give run.sh execute rights

chmod +x run.sh

Now you just need to run this script

./run.sh

That's it! Now all 3 VMs will be set up. Follow the dialogue to start the attacks.

Be patient, some attacks need time (bruteforce with Hydra). After all is done, you will find attack.log and lanDump.pcap in the projects directory.

ToDos

  • revise Readme (add description of VMs, infrastructure and attacks)
  • add attacks
  • add screenshots & documentation
  • after 3 years... maybe port it to docker?! :)

Disclaimer

Any activities and or actions related to the material contained within this project is solely your responsibility. The misuse of the information in this project can result in criminal charges brought against the persons in question. The contributors will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this project to break the law.

This project contains materials that can be potentially damaging or dangerous. Refer to the laws in your province/country before using, or in any other way utilizing these materials. These materials are for educational and research purposes only. Do not attempt to violate the law with anything contained here.