Gray Hat Hacking v6 Lab 29 Logo

Gray Hat Hacking v6 Lab 29

0
Free
Visit Website

This directory contains the components to build the labs for Chapter 29. Lab Information: The following VMs will be setup for this lab: Docker Host IP: 10.0.0.50 Docker User: ubuntu Docker Password: SSH key setup with the lab Kali Computer IP: 10.0.0.40 Kali User: kali Kali Password: SSH key setup with the lab. Setting up the Lab: Make sure you have completed all the steps at (https://github.com/GrayHatHacking/GHHv6/tree/main/CloudSetup). Go into the Lab/terraform directory and modify the terraform.tfvars. Edit the file with your favorite text editor and then replace the contents of the key_path variable with the path to your SSH key. An example might look like: key_path="/home/kali/.ssh/id_rsa". Go into the Lab subdirectory and run build.sh to start the environment build. It will ask you are sure you want to create resources. If it does ask type yes. This will create resources that may cost you money. If you want to destroy the lab between uses, run destroy.sh. Answer yes when it asks if you are sure, and the resources will be deleted. Retrieving the IP addresses of the machines: Once the build.sh script is completed, it should print the IP addresses of the hosts.

FEATURES

ALTERNATIVES

Command-line tool for downloading APKs from Appland platform.

A tool to replace query string values with a user-supplied value

A tool for sorting YARA rules based on metadata.

A tool to dump a Git repository from a website

Syntax, indent, and filetype detection for YARA rule files with auto-indenting and error display in quickfix window.

Bastille-Linux is a system hardening program that proactively configures the system for increased security and educates users about security settings.

The OWASP AppSec Europe '16 Conference is a leading gathering in web application security, featuring keynote speakers and in-depth trainings in application security topics.

Social news aggregation and discussion platform for cybersecurity professionals.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved