Skip to content

Latest commit

 

History

History
78 lines (64 loc) · 2.78 KB

DETAILS.md

File metadata and controls

78 lines (64 loc) · 2.78 KB

Current list of AS

  • NS ROOT O (ASN 5, 100.100.0.0/24) is a root DNS nameserver
  • NS ROOT P (ASN 6, 100.100.1.0/24) is a root DNS nameserver
  • OpenDNS (ASN 7, 100.100.100.0/24) is an open DNS resolver
  • TLD milxc (ASN 8, 100.100.20.0/24) is the TLD operator for .milxc
  • Target (ASN 10, 100.80.0.0/16, target.milxc) is some cool enterprise to attack
  • Ecorp (ASN 11, 100.81.0.0/16, ecorp.milxc) is some evil enterprise used to attack
  • MICA (ASN 12, 100.82.0.0/16, mica.milxc) is a CA, ready for ACME (let's encrypt-style)
  • Gozilla (ASN 13, 100.83.0.0/16, gozilla.milxc) is a web browser editor (ie, Mozilla), allowed to spread new root CA certificates to browsers
  • ISP-A (ASN 20, 100.120.0.0/16, ispa.milxc) is some end-user ISP
  • Transit-A (ASN 30, 100.64.0.0/24) is a transit operator
  • Transit-B (ASN 31, 100.64.1.0/24) is a transit operator

Details of AS

Target

  • target-router
    • Firewall for Target
    • Suricata, prelude and prewikka preinstalled
  • target-dmz :
    • smtp, imap for users admin@, sales@
    • http on www.target.milxc (weak password)
    • certbot pre-installed for ACME with MICA
    • OSSEC HIDS
    • MISP instance listening on misp.target.milxc ([email protected]/admin)
  • target-ldap :
    • ldap server
    • All hosts simply rely on this centralized authentication (every user can thus connect to any internal host)
  • target-filer :
    • sshfs file sharing of /home/shared/ (NFS does not work on the current setup)
    • network shares are mounted in ~/shared on target-admin, target-sales and target-dev
  • target-intranet :
    • a web intranet with SQL injections and some bad access rights in /var/www
  • target-admin:
    • administrator workstation
    • claws-mail (for debian user) configured for [email protected]
  • target-sales:
  • target-dev:
    • Developer workstation
    • Can deploy code on target-intranet (in ~/shared/dev/deploy.sh)

Ecorp

  • ecorp-router:
    • bird BGP daemon to alter BGP routing
  • ecorp-infra:
    • http to serve fake/malicious content
    • certbot pre-installed for ACME
  • This AS is used to impersonate Target

MICA

  • mica-infra :
    • step-cli and step-ca ready to deploy an ACME-compliant CA using Smallstep software suite
    • openssl for an old-style CA
    • http (allows to share the generated root certificate)

Gozilla

  • gozilla-infra :
    • addcatofox.sh root.crt to push root.crt to future browser updates
    • MISP instance listening on misp.gozilla.milxc ([email protected]/admin)

ISP-A

  • isp-a-infra:
  • isp-a-home:
    • updatefox.sh to simulate a browser update (and updates the root certificates from Gozilla)
  • isp-a-hacker:
    • some hacking scripts in /home/hacker
    • claws-mail (for debian user) configured for [email protected]