In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-16 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)05/31 Report--
How to quickly build the Vulhub penetration range environment, in view of this problem, this article introduces the corresponding analysis and solution in detail, hoping to help more partners who want to solve this problem to find a more simple and feasible method.
Preface
We all know that building a loophole shooting range plays a vital role in the process of learning network security. Reproduce all kinds of loopholes, can better understand the causes of loopholes and improve their learning ability. Next I will demonstrate how to install the vulnerability range Vulhub in detail in kali.
What is vulhub?
Vulhub is a set of vulnerability environment based on docker and docker-compose. Entering the corresponding directory and executing a statement can start a new vulnerability environment, which makes it easier to reproduce vulnerabilities and allows security researchers to focus more on the principle of vulnerabilities. The official address of Vulhub is www.vulhub.org.
I encountered several problems when I was building the shooting range today:
There is a system time problem.
Kali requires a certificate to install docker.
After the kali source is modified, the signature error is displayed (refer to 1 modification time).
Docker installs pip,compose.
Kali cannot stretch the screen on its own in the virtual machine state.
How to update docker feeds
one。 System time problem:
If the preset time is today, it will be 10:00:00 on August 22, 2020.
We will set the date first.
Date-s 20220822 or date-s 08Accord 22 Universe 20
Reschedule
Date-s 10:00:00
It's okay to talk about a machine, but if you have more, you'll get bored. Is there an one-step solution? After several searches, we found that there is!
Date 082210002020 (month, day, hour and year)
This can be done in one step. But! But what, for Linux, this way of writing is too human, too hard to remember. Is there an easier way? After several explorations, I found that there was!
Date-s "2020822 10:00:00"
In this way, it can be achieved in one step, and it is easy to remember. I've been using it for a long time. I don't tell him about ordinary people, Xu.
When the time is set, it will be saved. It's okay if you turn it off normally. The system will be saved once when the system is turned off, but if you may not shut down properly, you can save the settings first.
Hwclock-systohc
Yes, that's what it says. Most of the words on the Internet are
Clock-w
Or
Hwclock-w
If you analyze it carefully, you will know that clock is the soft link of hwclock. The parameter-w is not mentioned at all in hwclock's help and man. I don't know what year-w is written.
Second, install docker
Because Vulhub is a set of vulnerability environments based on docker and docker-compose.
Update softwar
We need to install docker, switch to root users, and symbolically update the software by entering the following command
Apt-get update
Because I already have the update software command in the screenshot of the update system time, I won't take a screenshot here.
Install https protocol, CA certificate apt-get install-y apt-transport-https ca-certificates
Install dockerapt install docker.io
Check the version to see if the installation is successful. Docker-v displays docker running status docker ps
It is not running temporarily, so it is empty.
Install pipapt-get install python3-pip
Install docker-compose
Pip3 install docker-compose
View docker-compose version docker-compose-v
Git vulhubgit clone https://github.com/vulhub/vulhub.git
After the download is successful, go to the vulhub directory (cd vulhub) and view the vulnerability shooting range through the ls command.
Next, enter any directory at random
Cd / Desktop / vulhub/weblogic/CVE-2018-2628 Boot Environment docker-compose build / / optional docker-compose up-d / / automatically generate vulnerability Environment View Startup Environment and find that the port is 7001docker-compose ps
Docker-compose starts the container by default according to the configuration file in the current directory, and needs to be in the corresponding directory when shutting down and removing the environment. After we execute docker-compose up-d, do not leave the current directory. After the vulnerability test, execute the following command to remove the environment:
Docker-compose down III. Install open-vm-toolapt-get install open-vm-tools-desktop fuse IV. Update docker source.
Ali Yun: https://cr.console.aliyun.com/cn-hangzhou/instances/mirrors
To install / upgrade the Docker client, it is recommended to install the Docker client above version 1.10.0. Refer to the documentation docker-ce
Configure the Mirror Accelerator for users with Docker client version greater than 1.10.0
The following https://xxx.mirror.aliyuncs.com, where XXX is my user name, I set it to xxx for privacy, so you have to use your own.
You can use the accelerator by modifying the daemon configuration file / etc/docker/daemon.json
Sudo mkdir-p / etc/dockersudo tee / etc/docker/daemon.json
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.