This is a Wargame VM designed for teaching and challenging people in the basics of Exploitation Development and Reverse Engineering.
I created this to help our growing community of Cyber Security veterans of VetSec learn about Exploitation Development and Reverse Engineering. I intend on having this be open to the public for use by anyone (assuming credit is given if used for purposes other than self learning). It is a work in progress, so please feel free to provide any feedback.
- Set up initial VM with preinstalled tools with tutorial
- Create initial challenges with tutorials
- Work on intermediate challenges without tutorials
- Create intro to linux?
- You will need to install the correct version for your Host OS. This is a VM manager that makes it easy to spin up VM's.
- VirtualBox Best if installed directly from virtualbox website, not linux repo
- You will need to install the correct version for your Host OS since the Wargame VM base is VirtualBox.
- Basic Command Line knowledge (Both your Host OS and Linux)
- In Linux, you will need to be able to list files/directories, change directories, execute/run a script/tool
- In your Host OS, you will only need to know how to run
vagrant up
andvagrant ssh
from the Wargame root folder.
If any of this seems challenging to you and you might need a little help, I recommend using a little google for now, until my tutorial is complete.
TODO...
Download the Wargame from Github via git clone or the zip file.
In a terminal/command prompt, navigate to the root folder of the Wargame and run vagrant up
and then vagrant ssh
when it is done provisioning to log in.
If you would like to save a little time, I provided the Wargame in a portable .box file on my Google Drive.
Simply place the vetsec-wg.box file into a folder and just run vagrant add vetsec-wg vetsec-wg.box
followed by vagrant up
Then from a terminal/command prompt while inside the directory of the box, run vagrant ssh
to ssh into the box and head to the challenges located in the home directory!
The challenges are located in the home directory in the folder called 'challenges'. Please read the README for each challenge. For now, there is no tutorial, but it is in the works!
To log out, just type logout
while in the VM.
Once outside of the VM, while still in the terminal/command prompt, run vagrant halt
to shut down the VM or vagrant destroy
to remove it entirely.
default username: vagrant
default password: vagrant
Please see my blog post about the creation of this VM for other information about the VM and how I created it. There will be more blog posts to follow as I go along!
If you ran vagrant up
and tried to run this installation again in another folder on the same computer without running vagrant destroy
, the old vm is lingering with the same name. To remove it, open virtual box and delete the old box, then you should be able to vagrant up
in the new location.
This is likely because you tried to install virtualbox from the apt repositories, which can cause issues. Please follow the instructions located here for your particular OS.
If you would like to help contribute, please feel free to shoot me a message on any of my methods of communication and we can discuss things in need.
I hope you find this to be useful in your endevours. I'm happy to help in any way I can if you reach out to me. Also, please provide credit to me if you intend to use this for any purpose besides your own self teaching.