Difference between revisions of "Main Page"

From Ghost Lab
Jump to: navigation, search
 
(14 intermediate revisions by the same user not shown)
Line 1: Line 1:
Contents
 
1 What is the lab?
 
2 Getting started
 
3 Requesting an Account
 
4 Configuring OpenVPN Access
 
5 Ubuntuk/kali/Debian (via Gnome's Network Manager
 
6 Setting up Pre-loaded VM
 
 
 
==What is the lab?==
 
==What is the lab?==
  
Line 13: Line 5:
 
==Getting started==
 
==Getting started==
  
You can either use your own machine to connect to the VPN and get started, or you can use one of the below virtual machines. From there, register for access using the below link, and once we set you up with credentials you're ready to rock! Certificates in TGZ format Certificates in ZIP format Submit bugs to Bug Submission Email
+
You can either use your own machine to connect to the VPN and get started, or you can use one of the below virtual machines. From there, register for access using the below link, and once we set you up with credentials you're ready to rock!  
 +
 
 +
 
 +
[http://www.gh0st.net/files/certificates.zip Certificates in ZIP format]
 +
 
 +
 
  
 
==Requesting an Account==
 
==Requesting an Account==
  
Please visit our form in order to register for access.
+
Please visit our [http://www.gh0st.net/?page_id=11 form] in order to register for access.
  
 
==Configuring OpenVPN Access==
 
==Configuring OpenVPN Access==
Line 23: Line 20:
 
(We currently have Windows and Ubuntu listed - if you'd like to write a how-to for a specific OS - please let us know!) Windows Download a OpenVPN client here for your specific OS.
 
(We currently have Windows and Ubuntu listed - if you'd like to write a how-to for a specific OS - please let us know!) Windows Download a OpenVPN client here for your specific OS.
  
Then download our prebuilt OpenVPN config here.
+
Then download our prebuilt OpenVPN config [http://www.gh0st.net/files/Openvpn_PenLab.zip here.]
  
 
Next you'll want to extract that folder into your C:\Program Files (x86)\OpenVPN\config folder. (If you are on a 32bit only OS, there will be no (x86) folder, just plain Program Files)
 
Next you'll want to extract that folder into your C:\Program Files (x86)\OpenVPN\config folder. (If you are on a 32bit only OS, there will be no (x86) folder, just plain Program Files)
Line 29: Line 26:
 
After you've placed the files in there, run the OpenVPN client and Right-Click on the taskbar icon. You should see "Gh0st-PenLab" listed. Once you click that a Dialog box will pop up asking for your lab credentials which we have provided for you.
 
After you've placed the files in there, run the OpenVPN client and Right-Click on the taskbar icon. You should see "Gh0st-PenLab" listed. Once you click that a Dialog box will pop up asking for your lab credentials which we have provided for you.
  
==Ubuntu (via Gnome's Network Manager)==
+
==Ubuntu/Kali/Debian (via Gnome's Network Manager)==
  
We chose to list this configuration as it is the one we have currently within our Backtrack downloadable VMs and its a quick way to get setup. This has been tested on 10.04 and newer versions of Ubuntu and should work on older versions, but mileage may vary and please provide any feedback so we can get it in the wiki. First step is to open a terminal and run the following:
+
We chose to list this configuration as it is the one we have currently within our Kali downloadable VMs and its a quick way to get setup. This has been tested on 14.04 and newer versions of Ubuntu and should work on older versions and debian as well, but mileage may vary and please provide any feedback so we can get it in the wiki. First step is to open a terminal and run the following:
  
apt-get install network-manager-gnome network-manager-openvpn
+
*'''apt-get install network-manager-gnome network-manager-openvpn'''
  
 
After that is installed, you'll need to open up a handy editor and edit /etc/network/interfaces Removing or commenting out everything except for 'lo' After you've got network manager setup, locate the the little wired or wireless icon in the upper corner, drop down to "Configure VPN..." like so:
 
After that is installed, you'll need to open up a handy editor and edit /etc/network/interfaces Removing or commenting out everything except for 'lo' After you've got network manager setup, locate the the little wired or wireless icon in the upper corner, drop down to "Configure VPN..." like so:
  
Vpnscreen1.jpg
+
[[File:Vpnscreen1.jpg]]
  
 
Click "add"
 
Click "add"
Line 45: Line 42:
 
Next you'll need to fill in the information for the lab, first giving it whatever name you want, or your can follow the example:
 
Next you'll need to fill in the information for the lab, first giving it whatever name you want, or your can follow the example:
  
02.png
+
[[File:02.png]]
  
  
Line 52: Line 49:
 
Next click Advanced...
 
Next click Advanced...
  
03.png
+
[[File:03.png]]
 +
 
 +
 
 +
Under General, select:
 +
 +
*Use LZO data compression
 +
 
 +
*Use a TAP device
 +
 
 +
Next Click on the TLS Authentication Tab and select:
 +
 
 +
*Key File: The Path to the ta.key file
 +
 
 +
*Key Direction: 1
 +
 
 +
Press OK a bunch and you should be all set.
 +
 
 +
 
  
Under General, select: Use LZO data compression Use a TAP device Next Click on the TLS Authentication Tab and select: Key File: The Path to the ta.key file Key Direction: 1 Press OK a bunch and you should be all set. To connect, click the wired or wireless icon again, select VPN Connections and click on Gh0st Lab (or whatever you named it) Once connected, you should be able to run ifconfig tap0 from a terminal and see a IP address in the 10.1.17.x space. If you are connected, point your browser to the internal web server for the lab located at: http://0.0.0.0 You should see this currently (it'll change as we we develop it out, we are still working on it): 06.png
+
To connect, click the wired or wireless icon again, select VPN Connections and click on Gh0st Lab (or whatever you named it) Once connected, you should be able to run ifconfig tap0 from a terminal and see a IP address in the 10.1.17.x space. If you are connected, give a nmap around to 10.1.17.0/24 and start exploring. We are working on getting internal scoreboards and servers setup now!
  
Select the List Tab and Enjoy! Thanks to g0tm1lk for helping get this tutorial together!
+
Thanks to g0tm1lk for helping get this tutorial together!
  
 
==Setting up Pre-loaded VM==
 
==Setting up Pre-loaded VM==
  
We currently have pre-configured a BackTrack 5 R2 boxes that are already to roll. Both a x86 and x64 version are available. These machines are configured with the OpenVPN client - all that is needed is valid lab credentials to gain access.
+
We currently have pre-configured a Kali boxes that are already to roll. Both a x86 and x64 version are available. These machines are configured with the OpenVPN client - all that is needed is valid lab credentials to gain access.
  
BT5r2 - 32bit
+
[http://www.gh0st.net/files/Kali_32.zip Kali - 32bit]
  
BT5r2 - 64bit
+
[http://www.gh0st.net/files/Kali_64.zip Kali - 64bit]
  
  
 
After you've downloaded the VM of your choice above - you'll need to enter your own unique lab authentication credentials. To do do this, navigate up to the plug in the right corner:
 
After you've downloaded the VM of your choice above - you'll need to enter your own unique lab authentication credentials. To do do this, navigate up to the plug in the right corner:
  
Vpnscreen1.jpg
+
[[File:Vpnscreen1.jpg]]
  
 
If prompted for a keyring password, the default is set to: gh0stlab Feel free to change it. Next, highlight Gh0stLab from the list, and select "edit":
 
If prompted for a keyring password, the default is set to: gh0stlab Feel free to change it. Next, highlight Gh0stLab from the list, and select "edit":
  
Vpnscreen2.jpg
+
[[File:Vpnscreen2.jpg]]
  
 
Finally edit your username and password by inserting your provided ones into the blanks:
 
Finally edit your username and password by inserting your provided ones into the blanks:
  
Vpnscreen3.jpg
+
[[File:Vpnscreen3.jpg]]
  
 
Click Apply - and click the plug again and select Gh0stLab - You should connect right in!
 
Click Apply - and click the plug again and select Gh0stLab - You should connect right in!

Latest revision as of 07:57, 6 March 2019

What is the lab?

The Gh0st lab is a collection of machines and virtual networks created with the goal to promote and facilitate the learning of all aspects of Information Security. This network is a constantly growing entity that was created to provide an outlet for education and experimentation. Think of it as a virtual hackerspace. We encourage user involvement in challenges, CTFs, lab extensions, research and education. To find out what's new or what has been changing, check out the forums.

Getting started

You can either use your own machine to connect to the VPN and get started, or you can use one of the below virtual machines. From there, register for access using the below link, and once we set you up with credentials you're ready to rock!


Certificates in ZIP format


Requesting an Account

Please visit our form in order to register for access.

Configuring OpenVPN Access

(We currently have Windows and Ubuntu listed - if you'd like to write a how-to for a specific OS - please let us know!) Windows Download a OpenVPN client here for your specific OS.

Then download our prebuilt OpenVPN config here.

Next you'll want to extract that folder into your C:\Program Files (x86)\OpenVPN\config folder. (If you are on a 32bit only OS, there will be no (x86) folder, just plain Program Files)

After you've placed the files in there, run the OpenVPN client and Right-Click on the taskbar icon. You should see "Gh0st-PenLab" listed. Once you click that a Dialog box will pop up asking for your lab credentials which we have provided for you.

Ubuntu/Kali/Debian (via Gnome's Network Manager)

We chose to list this configuration as it is the one we have currently within our Kali downloadable VMs and its a quick way to get setup. This has been tested on 14.04 and newer versions of Ubuntu and should work on older versions and debian as well, but mileage may vary and please provide any feedback so we can get it in the wiki. First step is to open a terminal and run the following:

  • apt-get install network-manager-gnome network-manager-openvpn

After that is installed, you'll need to open up a handy editor and edit /etc/network/interfaces Removing or commenting out everything except for 'lo' After you've got network manager setup, locate the the little wired or wireless icon in the upper corner, drop down to "Configure VPN..." like so:

Vpnscreen1.jpg

Click "add"

Then you'll need to select "OpenVPN"

Next you'll need to fill in the information for the lab, first giving it whatever name you want, or your can follow the example:

02.png


Gateway: penlab.gh0st.net Type: Password with Certificates (TLS) Username: Your provided username from registration Password: Your Password User Certificate: The path to the user.crt file CA Certificate: The path to the ca.crt file Private Key: The path to the user.key file Private Key Password: LEAVE BLANK

Next click Advanced...

03.png


Under General, select:

  • Use LZO data compression
  • Use a TAP device

Next Click on the TLS Authentication Tab and select:

  • Key File: The Path to the ta.key file
  • Key Direction: 1

Press OK a bunch and you should be all set.


To connect, click the wired or wireless icon again, select VPN Connections and click on Gh0st Lab (or whatever you named it) Once connected, you should be able to run ifconfig tap0 from a terminal and see a IP address in the 10.1.17.x space. If you are connected, give a nmap around to 10.1.17.0/24 and start exploring. We are working on getting internal scoreboards and servers setup now!

Thanks to g0tm1lk for helping get this tutorial together!

Setting up Pre-loaded VM

We currently have pre-configured a Kali boxes that are already to roll. Both a x86 and x64 version are available. These machines are configured with the OpenVPN client - all that is needed is valid lab credentials to gain access.

Kali - 32bit

Kali - 64bit


After you've downloaded the VM of your choice above - you'll need to enter your own unique lab authentication credentials. To do do this, navigate up to the plug in the right corner:

Vpnscreen1.jpg

If prompted for a keyring password, the default is set to: gh0stlab Feel free to change it. Next, highlight Gh0stLab from the list, and select "edit":

Vpnscreen2.jpg

Finally edit your username and password by inserting your provided ones into the blanks:

Vpnscreen3.jpg

Click Apply - and click the plug again and select Gh0stLab - You should connect right in!