Difference between revisions of "Main Page"

From Ghost Lab
Jump to: navigation, search
Line 6: Line 6:
  
 
You can either use your own machine to connect to the VPN and get started, or you can use one of the below virtual machines. From there, register for access using the below link, and once we set you up with credentials you're ready to rock!  
 
You can either use your own machine to connect to the VPN and get started, or you can use one of the below virtual machines. From there, register for access using the below link, and once we set you up with credentials you're ready to rock!  
[Certificates in TGZ format]http://www.gh0st.net/files/certificates.tgz  
+
[Certificates in TGZ format http://www.gh0st.net/files/certificates.tgz]
 
[Certificates in ZIP format]http://www.gh0st.net/files/certificates.zip
 
[Certificates in ZIP format]http://www.gh0st.net/files/certificates.zip
  

Revision as of 12:20, 5 August 2015

What is the lab?

The Gh0st lab is a collection of machines and virtual networks created with the goal to promote and facilitate the learning of all aspects of Information Security. This network is a constantly growing entity that was created to provide an outlet for education and experimentation. Think of it as a virtual hackerspace. We encourage user involvement in challenges, CTFs, lab extensions, research and education. To find out what's new or what has been changing, check out the forums.

Getting started

You can either use your own machine to connect to the VPN and get started, or you can use one of the below virtual machines. From there, register for access using the below link, and once we set you up with credentials you're ready to rock! [Certificates in TGZ format http://www.gh0st.net/files/certificates.tgz] [Certificates in ZIP format]http://www.gh0st.net/files/certificates.zip

Submit bugs to Bug Submission Email

Requesting an Account

Please visit our form in order to register for access.

Configuring OpenVPN Access

(We currently have Windows and Ubuntu listed - if you'd like to write a how-to for a specific OS - please let us know!) Windows Download a OpenVPN client here for your specific OS.

Then download our prebuilt OpenVPN config here.

Next you'll want to extract that folder into your C:\Program Files (x86)\OpenVPN\config folder. (If you are on a 32bit only OS, there will be no (x86) folder, just plain Program Files)

After you've placed the files in there, run the OpenVPN client and Right-Click on the taskbar icon. You should see "Gh0st-PenLab" listed. Once you click that a Dialog box will pop up asking for your lab credentials which we have provided for you.

Ubuntu (via Gnome's Network Manager)

We chose to list this configuration as it is the one we have currently within our Backtrack downloadable VMs and its a quick way to get setup. This has been tested on 10.04 and newer versions of Ubuntu and should work on older versions, but mileage may vary and please provide any feedback so we can get it in the wiki. First step is to open a terminal and run the following:

apt-get install network-manager-gnome network-manager-openvpn

After that is installed, you'll need to open up a handy editor and edit /etc/network/interfaces Removing or commenting out everything except for 'lo' After you've got network manager setup, locate the the little wired or wireless icon in the upper corner, drop down to "Configure VPN..." like so:

Vpnscreen1.jpg

Click "add"

Then you'll need to select "OpenVPN"

Next you'll need to fill in the information for the lab, first giving it whatever name you want, or your can follow the example:

02.png


Gateway: penlab.gh0st.net Type: Password with Certificates (TLS) Username: Your provided username from registration Password: Your Password User Certificate: The path to the user.crt file CA Certificate: The path to the ca.crt file Private Key: The path to the user.key file Private Key Password: LEAVE BLANK

Next click Advanced...

03.png

Under General, select: Use LZO data compression Use a TAP device Next Click on the TLS Authentication Tab and select: Key File: The Path to the ta.key file Key Direction: 1 Press OK a bunch and you should be all set. To connect, click the wired or wireless icon again, select VPN Connections and click on Gh0st Lab (or whatever you named it) Once connected, you should be able to run ifconfig tap0 from a terminal and see a IP address in the 10.1.17.x space. If you are connected, point your browser to the internal web server for the lab located at: http://0.0.0.0 You should see this currently (it'll change as we we develop it out, we are still working on it): 06.png

Select the List Tab and Enjoy! Thanks to g0tm1lk for helping get this tutorial together!

Setting up Pre-loaded VM

We currently have pre-configured a BackTrack 5 R2 boxes that are already to roll. Both a x86 and x64 version are available. These machines are configured with the OpenVPN client - all that is needed is valid lab credentials to gain access.

BT5r2 - 32bit

BT5r2 - 64bit


After you've downloaded the VM of your choice above - you'll need to enter your own unique lab authentication credentials. To do do this, navigate up to the plug in the right corner:

Vpnscreen1.jpg

If prompted for a keyring password, the default is set to: gh0stlab Feel free to change it. Next, highlight Gh0stLab from the list, and select "edit":

Vpnscreen2.jpg

Finally edit your username and password by inserting your provided ones into the blanks:

Vpnscreen3.jpg

Click Apply - and click the plug again and select Gh0stLab - You should connect right in!