Giter Club home page Giter Club logo

pentest-env's Introduction

Pentest Environment Deployer | Build Status

This repo provides an easy way to deploy a clean and customized pentesting environment with Kali linux using vagrant and virtualbox.

Requirements

I assume you are familiar with virtualbox and vagrant.

Latest pentest-env release is tested with:

  • Virtualbox (5.1.28)
  • Vagrant (1.8.5)

Current box

Kali 2017.2

Box SHA256
Kali 2017.2 1b6376ee7752a5bb5f7f39c7747b3e8653abdfad5aa8b0c71403b9bb195646f8
Kali 2017.2 Light 0f0c4495d8064ad5f92fd64dca1333569e1228f2c98e2e72a91ebd85dae8f4af
Kali 2017.1 KDE 0a6eda87245935546b255b28bdcdafedd4f3ee074606319598c3e86a26f3db6f
Kali 2017.2 LXDE 16d99b775af8ac3d98d54e375e0bbe189ec705a5c6502b9e7af70ae6638e3fcc
Kali 2017.2 Xfce 8221985317e13cce6c282ac99e86ff71a5a7bf470f51dcc67ec5f593f536db0d
Kali 2017.2 Mate 25ebfd7cf534f38ac403a5ecf6d8a967fc3cca692c0eb3918a1f90bb7a9126e8
Kali 2017.2 E17 e6a1c3fd847fd1fb4e1c0133c2ccdbbe9504c10fe0672ce60a116ae20590711e

See the documentation page about boxes for more details.

Getting started

To get started with pentest-env, clone this repository and run vagrant up inside the directory. This will download and run the Kali instance.

You can customize, add targets, create new targets etc.. inside pentest-env. Some examples are available in the examples/ directory, to use one simply set the PENTESTRC environment variable:

> PENTESTRC=examples/ctf.pentestrc vagrant status
Current machine states:

kali                      running (virtualbox)
metasploitable2           not created (virtualbox)
primer                    not created (virtualbox)

This environment represents multiple VMs. The VMs are all listed
above with their current state. For more information about a specific
VM, run `vagrant status NAME`.

For more details, visit the documentation pages:

  1. Installation
  2. Usage
  3. Docker
  4. Openstack
  5. Customizations
  6. Instances
  7. Targets
  8. Write custom instances and targets
  9. Debugging
  10. Security
  11. About boxes
  12. Known issues

Some configuration examples:

  1. Configure Kali linux with Tor & proxychains
  2. Configure Kali linux with Whonix gateway
  3. Faraday cscan against metasploitable 2 & 3 targets
  4. Configure a Teamserver

About Security

verify checksums

It's recommended to check downloaded box files with provided checksums (SHA256).
See https://raw.githubusercontent.com/Sliim/pentest-env/master/checksums.txt for checksums list.

sshd is running

Provided boxes run the sshd service.
So if you plan to run the Kali linux with a Bridged interface, default setup can be dangerous!

  • root password of kali is toor.
  • SSH private key is not private! Anyone can use this key to connect to your instance.

See the secure the environment page to automatically change these defaults values.

License

See COPYING file

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.