- NS ROOT O (ASN 5, 100.100.0.0/24) is a root DNS nameserver
- NS ROOT P (ASN 6, 100.100.1.0/24) is a root DNS nameserver
- OpenDNS (ASN 7, 100.100.100.0/24) is an open DNS resolver
- TLD milxc (ASN 8, 100.100.20.0/24) is the TLD operator for .milxc
- Target (ASN 10, 100.80.0.0/16, target.milxc) is some cool enterprise to attack
- Ecorp (ASN 11, 100.81.0.0/16, ecorp.milxc) is some evil enterprise used to attack
- MICA (ASN 12, 100.82.0.0/16, mica.milxc) is a CA, ready for ACME (let's encrypt-style)
- Gozilla (ASN 13, 100.83.0.0/16, gozilla.milxc) is a web browser editor (ie, Mozilla), allowed to spread new root CA certificates to browsers
- ISP-A (ASN 20, 100.120.0.0/16, ispa.milxc) is some end-user ISP
- Transit-A (ASN 30, 100.64.0.0/24) is a transit operator
- Transit-B (ASN 31, 100.64.1.0/24) is a transit operator
- target-router
- Firewall for Target
- Suricata, prelude and prewikka preinstalled
- target-dmz :
- smtp, imap for users admin@, sales@
- http on www.target.milxc (weak password)
- certbot pre-installed for ACME with MICA
- OSSEC HIDS
- MISP instance listening on misp.target.milxc ([email protected]/admin)
- target-ldap :
- ldap server
- All hosts simply rely on this centralized authentication (every user can thus connect to any internal host)
- target-filer :
- sshfs file sharing of /home/shared/ (NFS does not work on the current setup)
- network shares are mounted in ~/shared on target-admin, target-sales and target-dev
- target-intranet :
- a web intranet with SQL injections and some bad access rights in /var/www
- target-admin:
- administrator workstation
- claws-mail (for debian user) configured for [email protected]
- target-sales:
- salesman workstation
- claws-mail (for sales user) configured for [email protected]
- target-dev:
- Developer workstation
- Can deploy code on target-intranet (in ~/shared/dev/deploy.sh)
- ecorp-router:
- bird BGP daemon to alter BGP routing
- ecorp-infra:
- http to serve fake/malicious content
- certbot pre-installed for ACME
- This AS is used to impersonate Target
- mica-infra :
- step-cli and step-ca ready to deploy an ACME-compliant CA using Smallstep software suite
- openssl for an old-style CA
- http (allows to share the generated root certificate)
- gozilla-infra :
- addcatofox.sh root.crt to push root.crt to future browser updates
- MISP instance listening on misp.gozilla.milxc ([email protected]/admin)
- isp-a-infra:
- smtp, imap for user [email protected]
- isp-a-home:
- updatefox.sh to simulate a browser update (and updates the root certificates from Gozilla)
- isp-a-hacker:
- some hacking scripts in /home/hacker
- claws-mail (for debian user) configured for [email protected]