Skip to content

My personal security sandbox environment. For use in CTF events, studying, or security research 🧅☠️🏖️

Notifications You must be signed in to change notification settings

brittonhayes/security-sandbox

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

23 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Security Sandbox 🏖️

My personal sandbox environment for testing out new security tools, vulnerable applications, and using in CTFs. Feel free to use this for your own studying or enjoyment!

Security Sandbox Logo

Requirements

There are only two requirements to get up and running:

Once you've got a virtualization solution setup as well as Hashicorp Vagrant, you're ready to go.

Usage ⚡

Set up the Vagrant box and bootstrap it with my preferred directory structure and workspace environment.

# Clone the repository with the Github CLI
gh repo clone brittonhayes/security-sandbox

# Start up the primary Kali machine
vagrant up

# The login is
username: vagrant
password: vagrant

Help

To view the available helper commands use make help.

❯ make help
Usage:
kali            Build the Kali box
sandbox         Build the whole sandbox
teardown        Tear down the sandbox
destroy         Destroy the sandbox

Red Team Lab Environment (Optional) 🟥

This virtual environment comes with a few testing labs available. Pick your flavor!

Kali

The kali box comes with tor and proxychains setup on boot, so feel free to chain requests through there first.

# Check tor service
systemctl status tor

# Run a port scan against scanme.nmap.org
# through a tor proxy 
proxychains nmap -sT -Pn scanme.nmap.org 

Juiceshop

# Start up juiceshop
vagrant up juiceshop

# Navigate to http://192.168.33.20

Damn Vulnerable Web Application

# Start up DVWA
vagrant up dvwa

# Navigate to http://192.168.33.30

Metasploitable

# Start up Metasploitable
vagrant up metasploitable

# Navigate to http://192.168.33.40

Blue Team Environment (Optional) 🟦

If you're looking for a good blue team environment to pair with this sandbox, I recommend a Detection Lab deployment.

Setup instructions can be found here: Detection Lab Deployment Instructions

Collaborate Online

If you'd like to collaborate with others on any of the vulnerable web applications, you can use vagrant share right in the command line. This will create a URL that you can give to anyone and will route directly into your chosen Vagrant environment.

This utilizes a service called ngrok. For more information, visit ngrok's documentation.

# Install the plugin
vagrant plugin install vagrant-share

# Share your environment
vagrant share

References

OWASP Juiceshop

OWASP Juiceshop CTF

DVWA

Metasploitable

Metasploitable vulnerabilities

About

My personal security sandbox environment. For use in CTF events, studying, or security research 🧅☠️🏖️

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published