Main Page

From Ghost Lab
Revision as of 06:57, 6 March 2019 by Liquid (Talk | contribs)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

What is the lab?

The Gh0st lab is a collection of machines and virtual networks created with the goal to promote and facilitate the learning of all aspects of Information Security. This network is a constantly growing entity that was created to provide an outlet for education and experimentation. Think of it as a virtual hackerspace. We encourage user involvement in challenges, CTFs, lab extensions, research and education. To find out what's new or what has been changing, check out the forums.

Getting started

You can either use your own machine to connect to the VPN and get started, or you can use one of the below virtual machines. From there, register for access using the below link, and once we set you up with credentials you're ready to rock!


Certificates in ZIP format


Requesting an Account

Please visit our form in order to register for access.

Configuring OpenVPN Access

(We currently have Windows and Ubuntu listed - if you'd like to write a how-to for a specific OS - please let us know!) Windows Download a OpenVPN client here for your specific OS.

Then download our prebuilt OpenVPN config here.

Next you'll want to extract that folder into your C:\Program Files (x86)\OpenVPN\config folder. (If you are on a 32bit only OS, there will be no (x86) folder, just plain Program Files)

After you've placed the files in there, run the OpenVPN client and Right-Click on the taskbar icon. You should see "Gh0st-PenLab" listed. Once you click that a Dialog box will pop up asking for your lab credentials which we have provided for you.

Ubuntu/Kali/Debian (via Gnome's Network Manager)

We chose to list this configuration as it is the one we have currently within our Kali downloadable VMs and its a quick way to get setup. This has been tested on 14.04 and newer versions of Ubuntu and should work on older versions and debian as well, but mileage may vary and please provide any feedback so we can get it in the wiki. First step is to open a terminal and run the following:

  • apt-get install network-manager-gnome network-manager-openvpn

After that is installed, you'll need to open up a handy editor and edit /etc/network/interfaces Removing or commenting out everything except for 'lo' After you've got network manager setup, locate the the little wired or wireless icon in the upper corner, drop down to "Configure VPN..." like so:

Vpnscreen1.jpg

Click "add"

Then you'll need to select "OpenVPN"

Next you'll need to fill in the information for the lab, first giving it whatever name you want, or your can follow the example:

02.png


Gateway: penlab.gh0st.net Type: Password with Certificates (TLS) Username: Your provided username from registration Password: Your Password User Certificate: The path to the user.crt file CA Certificate: The path to the ca.crt file Private Key: The path to the user.key file Private Key Password: LEAVE BLANK

Next click Advanced...

03.png


Under General, select:

  • Use LZO data compression
  • Use a TAP device

Next Click on the TLS Authentication Tab and select:

  • Key File: The Path to the ta.key file
  • Key Direction: 1

Press OK a bunch and you should be all set.


To connect, click the wired or wireless icon again, select VPN Connections and click on Gh0st Lab (or whatever you named it) Once connected, you should be able to run ifconfig tap0 from a terminal and see a IP address in the 10.1.17.x space. If you are connected, give a nmap around to 10.1.17.0/24 and start exploring. We are working on getting internal scoreboards and servers setup now!

Thanks to g0tm1lk for helping get this tutorial together!

Setting up Pre-loaded VM

We currently have pre-configured a Kali boxes that are already to roll. Both a x86 and x64 version are available. These machines are configured with the OpenVPN client - all that is needed is valid lab credentials to gain access.

Kali - 32bit

Kali - 64bit


After you've downloaded the VM of your choice above - you'll need to enter your own unique lab authentication credentials. To do do this, navigate up to the plug in the right corner:

Vpnscreen1.jpg

If prompted for a keyring password, the default is set to: gh0stlab Feel free to change it. Next, highlight Gh0stLab from the list, and select "edit":

Vpnscreen2.jpg

Finally edit your username and password by inserting your provided ones into the blanks:

Vpnscreen3.jpg

Click Apply - and click the plug again and select Gh0stLab - You should connect right in!