https://github.com/brittonhayes/security-sandbox
My personal security sandbox environment. For use in CTF events, studying, or security research 🧅☠️🏖️
https://github.com/brittonhayes/security-sandbox
docker juiceshop kali metasploit owasp vagrant
Last synced: 11 months ago
JSON representation
My personal security sandbox environment. For use in CTF events, studying, or security research 🧅☠️🏖️
- Host: GitHub
- URL: https://github.com/brittonhayes/security-sandbox
- Owner: brittonhayes
- Created: 2021-03-12T23:49:04.000Z (almost 5 years ago)
- Default Branch: main
- Last Pushed: 2021-03-19T09:13:39.000Z (almost 5 years ago)
- Last Synced: 2025-02-10T06:11:57.060Z (about 1 year ago)
- Topics: docker, juiceshop, kali, metasploit, owasp, vagrant
- Language: Shell
- Homepage:
- Size: 243 KB
- Stars: 2
- Watchers: 2
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Security Sandbox 🏖️
> My personal sandbox environment for testing out new
> security tools, vulnerable applications, and using in CTFs.
> Feel free to use this for your own studying or enjoyment!

## Requirements
There are only two requirements to
get up and running:
- [Virtual Box](https://www.virtualbox.org/) or [VMWare Workstation](https://www.vmware.com/products/workstation-player/workstation-player-evaluation.html)
- [Hashicorp Vagrant](https://www.vagrantup.com/downloads)
Once you've got a virtualization solution setup as well as Hashicorp Vagrant, you're ready to go.
## Usage ⚡
Set up the Vagrant box and bootstrap it with
my preferred directory structure and workspace environment.
```shell
# Clone the repository with the Github CLI
gh repo clone brittonhayes/security-sandbox
# Start up the primary Kali machine
vagrant up
# The login is
username: vagrant
password: vagrant
```
### Help
To view the available helper commands use `make help`.
```shell
❯ make help
Usage:
kali Build the Kali box
sandbox Build the whole sandbox
teardown Tear down the sandbox
destroy Destroy the sandbox
```
## Red Team Lab Environment (Optional) 🟥
This virtual environment comes with a few testing labs available.
Pick your flavor!
### Kali
The kali box comes with tor and proxychains setup on boot, so feel free to chain requests through there first.
```shell
# Check tor service
systemctl status tor
# Run a port scan against scanme.nmap.org
# through a tor proxy
proxychains nmap -sT -Pn scanme.nmap.org
```
### Juiceshop
```shell
# Start up juiceshop
vagrant up juiceshop
# Navigate to http://192.168.33.20
```
### Damn Vulnerable Web Application
```shell
# Start up DVWA
vagrant up dvwa
# Navigate to http://192.168.33.30
```
### Metasploitable
```shell
# Start up Metasploitable
vagrant up metasploitable
# Navigate to http://192.168.33.40
```
## Blue Team Environment (Optional) 🟦
If you're looking for a good blue team environment to pair with this sandbox, I recommend a [Detection Lab](https://detectionlab.network/) deployment.
Setup instructions can be found here:
[Detection Lab Deployment Instructions](https://detectionlab.network/deployment/)
## Collaborate Online
If you'd like to collaborate with others on any of the vulnerable web applications, you can use [vagrant share](https://www.vagrantup.com/docs/share)
right in the command line. This will create a URL that you can give to anyone and will route directly into your chosen Vagrant environment.
This utilizes a service called [ngrok](https://ngrok.com). For more information, visit ngrok's documentation.
```shell
# Install the plugin
vagrant plugin install vagrant-share
# Share your environment
vagrant share
```
---
## References
[OWASP Juiceshop](https://owasp.org/www-project-juice-shop/)
[OWASP Juiceshop CTF](https://github.com/bkimminich/juice-shop-ctf)
[DVWA](https://dvwa.co.uk/)
[Metasploitable](https://github.com/rapid7/metasploitable3)
[Metasploitable vulnerabilities](https://github.com/rapid7/metasploitable3/wiki/Vulnerabilities)