Well, the second video is up. This one doesn’t really go into much detail, but we are setting up a small hacking lab. This will be focussed on web security to start with, so bear with me. Also, there’s a lot of attempts at trying to get some form of script for these things, but I still end up waffling on…
Anyway, with that all said and done, I now have a workstation and a target in my first ever mini hacking lab. Admitedly it’s not the greatest, but it’s done with things I had laying around and is therefore cheap and cheerful.
As mentioned in the video, I could have done everything on one machine. Since WebGoat is bound to a localhost port, it would also have made things a little easier. However this felt like a more realistic approach. I’m not going to have physical access to some things and in the real world a lot of apps wouldn’t be running in a docker container on my machine. I don’t know… It made sense to me at the time.
This first version of the lab I set up Kali Linux on and old Intel NUC that was originally running Windows 10, and that was as simple as downloading an ISO form Kali’s website, using Balena Etcher to create a bootable USB stick and running that from the boot menu of the NUC. Pretty much kept the defaults and let it do its thing.
The only problem I ran into was the latest version of Balena Etcher not working properly when I tried to load the Kali ISO. A quick search around the internet revealed that rolling back to v1.18.11 would work and, surprisingly, it did.
Setting up the Pi is pretty simple as well. The Raspberry Pi Imager makes it easy to flash the OS to an SD card and, despite the verification failing each time I tried, the Pi booted up alright. From there, I installed Docker through a command line script and pulled the WebGoat image down as well.
Running WebGoat takes ages on that Pi 4… Still, it did eventually run, so that was a relief.
In Kali Linux, I was then able to SSH into the Pi 4 and run docker with WebGoat from there. Again, it took ages to boot up, but it got there eventually.
Burpsuite next. Kali already somes with BurpSuite installed, so just needed to make sure I was on the latest version. The Community Edition will be fine for this. Could also downlaod it from their website, but didn’t need to on this occasion.
With that up and running, switch over to the proxy tab and launch the browser from there (making sure intercept is on). The Chromium browser that loads up is now connected to BurpSuite. Anything I navigate to in there will show in Burp for inspection. Just don’t forget to forward the requests when you’re done inspecting or altering.
And that’s it. That’s the first version of our lab set up. It’s simple. It’s not the fastest. It works. Onwards and upwards! Now I can settle in and learn some exploits before coming back to do another video on what I’ve learned! Can’t wait to share the progress with you all!
There are other electronics projects that I’ve got ready to go, though… But I’ve already bored you with those in another blog post.
If you’re still reading: Thank you very much for dropping by and until the next time, until the next blog post: Catch you later! Bye bye!