Skip to content

VetSec/VetSec-Wargame

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

35 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

VetSec-Wargame

This is a Wargame VM designed for teaching and challenging people in the basics of Exploitation Development and Reverse Engineering.

Motivation

I created this to help our growing community of Cyber Security veterans of VetSec learn about Exploitation Development and Reverse Engineering. I intend on having this be open to the public for use by anyone (assuming credit is given if used for purposes other than self learning). It is a work in progress, so please feel free to provide any feedback.

TODO

  • Set up initial VM with preinstalled tools with tutorial
  • Create initial challenges with tutorials
  • Work on intermediate challenges without tutorials
  • Create intro to linux?

How to use?

Prerequisite software/knowledge

  1. Vagrant
  • You will need to install the correct version for your Host OS. This is a VM manager that makes it easy to spin up VM's.
  1. VirtualBox Best if installed directly from virtualbox website, not linux repo
  • You will need to install the correct version for your Host OS since the Wargame VM base is VirtualBox.
  1. Basic Command Line knowledge (Both your Host OS and Linux)
  • In Linux, you will need to be able to list files/directories, change directories, execute/run a script/tool
  • In your Host OS, you will only need to know how to run vagrant up and vagrant ssh from the Wargame root folder.

If any of this seems challenging to you and you might need a little help, I recommend using a little google for now, until my tutorial is complete.

Tutorials

TODO...

Create the Wargame!

Create the Wargame from scratch

Download the Wargame from Github via git clone or the zip file. In a terminal/command prompt, navigate to the root folder of the Wargame and run vagrant up and then vagrant ssh when it is done provisioning to log in.

Run the pre-configured Wargame

If you would like to save a little time, I provided the Wargame in a portable .box file on my Google Drive.
Simply place the vetsec-wg.box file into a folder and just run vagrant add vetsec-wg vetsec-wg.box followed by vagrant up Then from a terminal/command prompt while inside the directory of the box, run vagrant ssh to ssh into the box and head to the challenges located in the home directory!

Play the challenges

The challenges are located in the home directory in the folder called 'challenges'. Please read the README for each challenge. For now, there is no tutorial, but it is in the works!

Other useful information

Logging out and tearing down

To log out, just type logout while in the VM. Once outside of the VM, while still in the terminal/command prompt, run vagrant halt to shut down the VM or vagrant destroy to remove it entirely.

default username: vagrant
default password: vagrant

Please see my blog post about the creation of this VM for other information about the VM and how I created it. There will be more blog posts to follow as I go along!

Common issues and fixes

There is already a VM with this name created

If you ran vagrant up and tried to run this installation again in another folder on the same computer without running vagrant destroy, the old vm is lingering with the same name. To remove it, open virtual box and delete the old box, then you should be able to vagrant up in the new location.

VBoxManage Issues

This is likely because you tried to install virtualbox from the apt repositories, which can cause issues. Please follow the instructions located here for your particular OS.

Contribute

If you would like to help contribute, please feel free to shoot me a message on any of my methods of communication and we can discuss things in need.

Thank you!

I hope you find this to be useful in your endevours. I'm happy to help in any way I can if you reach out to me. Also, please provide credit to me if you intend to use this for any purpose besides your own self teaching.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • C 67.8%
  • Shell 24.8%
  • Makefile 7.4%