Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

How to quickly build the environment of Vulhub penetration range

2025-01-16 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)05/31 Report--

How to quickly build the Vulhub penetration range environment, in view of this problem, this article introduces the corresponding analysis and solution in detail, hoping to help more partners who want to solve this problem to find a more simple and feasible method.

Preface

We all know that building a loophole shooting range plays a vital role in the process of learning network security. Reproduce all kinds of loopholes, can better understand the causes of loopholes and improve their learning ability. Next I will demonstrate how to install the vulnerability range Vulhub in detail in kali.

What is vulhub?

Vulhub is a set of vulnerability environment based on docker and docker-compose. Entering the corresponding directory and executing a statement can start a new vulnerability environment, which makes it easier to reproduce vulnerabilities and allows security researchers to focus more on the principle of vulnerabilities. The official address of Vulhub is www.vulhub.org.

I encountered several problems when I was building the shooting range today:

There is a system time problem.

Kali requires a certificate to install docker.

After the kali source is modified, the signature error is displayed (refer to 1 modification time).

Docker installs pip,compose.

Kali cannot stretch the screen on its own in the virtual machine state.

How to update docker feeds

one。 System time problem:

If the preset time is today, it will be 10:00:00 on August 22, 2020.

We will set the date first.

Date-s 20220822 or date-s 08Accord 22 Universe 20

Reschedule

Date-s 10:00:00

It's okay to talk about a machine, but if you have more, you'll get bored. Is there an one-step solution? After several searches, we found that there is!

Date 082210002020 (month, day, hour and year)

This can be done in one step. But! But what, for Linux, this way of writing is too human, too hard to remember. Is there an easier way? After several explorations, I found that there was!

Date-s "2020822 10:00:00"

In this way, it can be achieved in one step, and it is easy to remember. I've been using it for a long time. I don't tell him about ordinary people, Xu.

When the time is set, it will be saved. It's okay if you turn it off normally. The system will be saved once when the system is turned off, but if you may not shut down properly, you can save the settings first.

Hwclock-systohc

Yes, that's what it says. Most of the words on the Internet are

Clock-w

Or

Hwclock-w

If you analyze it carefully, you will know that clock is the soft link of hwclock. The parameter-w is not mentioned at all in hwclock's help and man. I don't know what year-w is written.

Second, install docker

Because Vulhub is a set of vulnerability environments based on docker and docker-compose.

Update softwar

We need to install docker, switch to root users, and symbolically update the software by entering the following command

Apt-get update

Because I already have the update software command in the screenshot of the update system time, I won't take a screenshot here.

Install https protocol, CA certificate apt-get install-y apt-transport-https ca-certificates

Install dockerapt install docker.io

Check the version to see if the installation is successful. Docker-v displays docker running status docker ps

It is not running temporarily, so it is empty.

Install pipapt-get install python3-pip

Install docker-compose

Pip3 install docker-compose

View docker-compose version docker-compose-v

Git vulhubgit clone https://github.com/vulhub/vulhub.git

After the download is successful, go to the vulhub directory (cd vulhub) and view the vulnerability shooting range through the ls command.

Next, enter any directory at random

Cd / Desktop / vulhub/weblogic/CVE-2018-2628 Boot Environment docker-compose build / / optional docker-compose up-d / / automatically generate vulnerability Environment View Startup Environment and find that the port is 7001docker-compose ps

Docker-compose starts the container by default according to the configuration file in the current directory, and needs to be in the corresponding directory when shutting down and removing the environment. After we execute docker-compose up-d, do not leave the current directory. After the vulnerability test, execute the following command to remove the environment:

Docker-compose down III. Install open-vm-toolapt-get install open-vm-tools-desktop fuse IV. Update docker source.

Ali Yun: https://cr.console.aliyun.com/cn-hangzhou/instances/mirrors

To install / upgrade the Docker client, it is recommended to install the Docker client above version 1.10.0. Refer to the documentation docker-ce

Configure the Mirror Accelerator for users with Docker client version greater than 1.10.0

The following https://xxx.mirror.aliyuncs.com, where XXX is my user name, I set it to xxx for privacy, so you have to use your own.

You can use the accelerator by modifying the daemon configuration file / etc/docker/daemon.json

Sudo mkdir-p / etc/dockersudo tee / etc/docker/daemon.json

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report