Chuyển đến nội dung chính

Hướng Dẫn Thực Hành - Cài Đặt DVL (Damn Vulnerable Linux)

Hướng dẫn cài đặt hệ thống Damn Vulnerable Linux (máy linux có những lỗi bảo mật dùng để tập hack)
{ How to Install DVL }

Section 0. Background Information
  1. What is Damn Vulnerable Linux?
    • Damn Vulnerable Linux (DVL) is everything a good Linux distribution isn't. Its developers have spent hours stuffing it with broken, ill-configured, outdated, and exploitable software that makes it vulnerable to attacks.

    • DVL isn't built to run on your desktop -- it's a learning tool for security students. DVL is a live CD available as a 150MB ISO.

    • It's based on the popular mini-Linux distribution Damn Small Linux (DSL), not only for its minimal size, but also for the fact that DSL uses a 2.4 kernel, which makes it easier to offer vulnerable elements that might not work under the 2.6 kernel.

    • It contains older, easily breakable versions of Apache, MySQL, PHP, and FTP and SSH daemons, as well as several tools available to help you compile, debug, and break applications running on these services, including GCC, GDB, NASM, strace, ELF Shell, DDD, LDasm, LIDa, and more.

    • DVL was initiated by Thorsten Schneider of the International Institute for Training, Assessment, and Certification (IITAC) and Secure Software Engineering (S�e) in cooperation with Kryshaam from the French Reverse Engineering Team. "The main idea behind DVL," says Schneider, "was to build up a training system that I could use for my university lectures." His goal was to design a Linux system that was as vulnerable as possible, to teach topics such as reverse code engineering, buffer overflows, shellcode development, Web exploitation, and SQL injection.

1. Prerequisite
  1. You need to have virtualization software that allows you to create operating system images using either an ISO or installation CD.  For this "how to", I will be using VMware Workstation.  However, you can also use other popular tools, such as, VirtualBox.


2. Download the Damn Vulnerable Linux (DVL) iso
  1. Download DVL
  2. Click Save
  3. Save to C:\VMware ISO's\DVL\
    • In my case, I save it to an external hard drive, hence Hard Drive 2 (E:)

2. Start VMware Workstation
  1. Programs --> VMware --> VMware Workstation.

3. Create VMware Image
  1. Click on New Virtual Machine.
  2. Bring up a FireFox Browser on your DVL machine.
  3. Select Install disc image file (iso)
    • Select the Browse Button
  4. Navigate to where you save the DVL iso.
    • In my case, the iso was saved to E:\VMware ISO's\DVL\
    • Select DVL iso and click open
  5. Select Next
  6. Select the Linux OS, and Other Linux 2.6.x kernel
  7. Naming and Saving Location
    • Virtual machine name: DVL
    • Location: In my case, I save it to my external hard drive at E:\VMware
  8. Specify Disk Capacity
  9. Click on the Customize Hardware...
  10. Select Memory
    • Increase the memory from 256 MB to 512 MB.
    • Click OK.
  11. Click Finish
  12. Press Enter when you see "boot: "

3. Login to DVL
  1. Credentials  (See Below)
    • Login: root
    • Password: toor

3. Partition the disk
  1. Determine what disk to format
    • Command: fdisk -l
    • Note: In my case, the disk is named /dev/sda
  2. Select disk to be partitioned
    • Command: fdisk /dev/sda
    • Input: m
  3. View the partition table
    • Select "p"

    • Note: There is 1044 cylinders
  4. Add a new partition
    • Select "n"
    • Select "p"
    • Select "1"
    • Select the maximum amount of cylinders 1044.
  5. View newly created partition
    • Select "p"
    • Note:  Previously when "p" was selected there was not a partition listed.
  6. Save the new partition
    • Select "w"
  7. Exit out of fdisk
    • Select "q"

4. Format the partition
  1. Format the partition on /dev/sda
    • Command: mkfs.ext3 /dev/sda
    • Proceed: y
  2. Create a folder to mount the partition on.
    • Command: mkdir /mnt/dvl
  3. Mount the hard drive to the /mnt/dvl directory
    • Command: mount /dev/sda /mnt/dvl

3. Copy DVL image to hard drive
  1. startx (See Below)
  2. Change Language to English (See Below)
    • Right Click on DE and click on Configure

    • Highlight Germany, Click on Remove.
    • Highlight Italy, Click on Remove.
    • Only U.S. English should be left.
    • Click Apply
    • Click OK
  3. Start the backlash installer
  4. Configure installer as seen below
    • Note:  If the installer completes in a few seconds, then the installer actually failed.  The installer should take 5 to 10 minutes to complete.  You should see messages like copying /opt with the status bar inching slowly forward.
  5. Click the close button, when you see a status message of "All done! click Close button" and a status bar of 100% complete
  6. Start up a terminal
  7. Install the boot loader
    • Command: lilo -v
  8. Command: poweroff
  9. Edit virtual machine settings
    • VMware Workstation --> File --> Open
    • Navigate to where you created the DVL.vmx image

    • Edit Virtual machine settings
    • Highlight CD/DVD
      • Select the "Use physical drive:" radio button
    • Highlight CD/DVD
      • Select the "Bridged: Connected..." radio button
      • Select OK
  10. Power on this virtual machine
    • Have fun hacking, ethically of course.

Section: Proof of Lab
  1. Have fun hacking, ethically of course.

Bài đăng phổ biến từ blog này

Pentest lab - Metasploitable 2

Today I will walk through different ways of exploiting Metasploitable 2, the newer release of Rapid7’s popular vulnerable machine. First, what is Metasploitable? Metasploitable is an intentionally vulnerable Linux virtual machine. This VM can be used to conduct security training, test security tools, and practice common penetration testing techniques. In my lab environment, the IP of the attacker machine is 192.168.127.159, and the victim machine is 192.168.127.154. Since this is a test lab, I won’t be concerned about stealth. Instead, I will try to get the most information out of the scans. Let’s start by port scanning the target with nmap. I did a full port, aggresive scan against the target. Here are the results. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 ...

Metasploitable 2 vulnerability assessment

A vulnerability assessment is a crucial part in every penetration test and is the process of identifying and assessing vulnerabilities on a target system. In this part of the tutorial we will be assessing the vulnerabilities available on the network side of the Metasploitable 2 virtual machine. We will be assessing the web applications on the Metasploitable 2 machine in a later tutorial. In the previous Metasploit enumeration and fingerprinting tutorial we’ve learned that the Metasploitable 2 machine contains a lot of vulnerabilities. We have collected valuable information about the target system which we will be using to find known vulnerabilities both on- and offline. Exploitation of these vulnerabilities will be demonstrated in the next exploitation tutorial. In this tutorial we will be looking at a few different ways to perform vulnerability analysis. We will be manually searching for exploits, use scanning tools like Nmap with scripts and we will be...

CEH v9 (CEHVIETNAM.COM) - Hacking Metasploitable Lab

CEH v9 : Hacking Metasploitable VM In this guide, I will demonstrate how to root a Metasploitable 2 virtual machine. Metasploitable is an intentionally vulnerable Ubuntu machine. I’ll explore just a few of the many ways Metasploitable can be attacked, from vulnerabilities in common services to little known exploits and web vulnerabilities. I’ve set up Kali Linux and Metasploitable VMs in VirtualBox on the same network (bridged mode). Kali – 192.168.56.101 Metasploitable – 192.168.56.102 - Hãy thay IP của bạn cho thích hợp Contents   1 Footprinting 1.1 Ping 1.2 Traceroute 2 Scanning 2.1 Port Scanning 2.2 OS Fingerprinting 2.2.1 nmap 2.2.2 xprobe2 3 Enumeration 3.1 FTP (TCP 21) Enumeration 3.2 Telnet (TCP 53) Enumeration 3.3 SMTP (TCP 25) Enumeration 3.4 VNC (TCP 5900) Enumeration 3.5 X11 (TCP 6000) Enumeration 3.6 RLogin (TCP 513) Enumeration 3.7 IRC (TCP 6667) Enumeration 4 Exploitation 4.1 FTP Exploit 4.2 VNC Password Cracking 4.3 IRC E...