Kali Linux CTF Blueprints
上QQ阅读APP看书,第一时间看更新

Creating a secure network

I realize that some people who like to break stuff haven't had experience in building stuff. In my experience, it should be a longer-term goal for any dedicated tester to get involved in some network architecture design (at the very least), sit through some app or program development, and above all, get scripting. Those of you who have taken time out of your busy, stack-smashing schedule and learned network design can skip ahead. Those who haven't, strap yourself in, grab yourself a router, and prepare to have your mind gently rattled.

Basic requirements

A network needs some basic things to function:

  • A switch/hub
  • More than one networkable device

That's essentially your network right there. Technically speaking, you don't even need more than one device, but that setup would be a little pointless for our purposes.

If you are performing these tests for a single individual, be it yourself or someone you trust with the device you're building these vulnerable builds on, you can just host them on the device through the VM solution.

Setting up a Linux network

To set up networking on a Linux device, perform the following steps:

  1. Plug the device into the hub/switch.
  2. Open a terminal.
  3. Type ifconfig eth0 10.0.0.124 or whichever local subnet you wish to use.
  4. Congratulate yourself on a job well done.

Setting up a Windows network

To set up networking on a Windows device, perform the following steps:

  1. Plug the device into the router/hub/switch.
  2. Open a command line.
  3. Type netsh int ip set address "local area connection" static 10.0.0.2 255.255.255.0 10.0.0.255.
  4. Close all the screens.
  5. Congratulate yourself slightly more than the Linux user; they had it easy.

In order to test the connection, simply open a terminal on either device and ping the other host. For example, ping 10.0.0.2 should respond with a long stream of returns as any good ping should.