Hacking My Own Environment

Network Configuration

GNS3 — Network software emulator

The network topology was set up and configured using the Graphical Network Simulator 3 (GNS3) application. Using GNS3, networking devices can be emulated to create complex networks. Many corporations such as Walmart, AT&T, and NASA use GNS3 for testing network configurations before applying them in the real world. It is open-source and available at gns3.com.

Appliances

Each device in GNS3 is known as an appliance — representing the virtual devices running in the topology:

IP address scheme

DeviceIP / Interface 1IP / Interface 2IP / Interface 3
Attacker's NetworkG0/0: 172.16.16.6/30G0/1: 10.1.1.1/24N/A
ISP RouterG0/0: 172.16.16.5/30G0/1: 172.16.16.1/30N/A
Target NetworkG0/0.10: 192.168.10.1/24G0/0.20: 192.168.20.1/24G0/1: 172.16.16.2/30
SwitchG0/1: VLAN 10G1/0: VLAN 20N/A
VLAN 10192.168.10.0/24N/AN/A
VLAN 20192.168.20.0/24N/AN/A
Kali Linux (PC – A)10.1.1.10/24N/AN/A
Ubuntu Desktop (PC – B)192.168.20.20/24N/AN/A
Ubuntu Server (PC – C)192.168.10.10/24N/AN/A

Device configuration

Cisco Routers

Interfaces were configured per the IP addressing scheme. Unused ports were shut down. Banners were applied to enforce unauthorized access policies. An admin user was created with passwords encrypted using the scrypt hashing algorithm. A domain name of SnrProj.com was set and SSH access configured. OSPF was implemented as the routing protocol using area ID 0 with authentication enabled.

Cisco Switch

VLANs were configured per the IP scheme. All unused ports were shut down and switchport port-security was implemented on each active interface — limited to 1 MAC address, set to shut down immediately on a policy violation.

Ubuntu Server (PC – C)

Updated via temporary internet access, then statically assigned and connected to G0/1 on the switch in VLAN 10. Apache2 was installed to host web services. A domain name was configured to simulate a real-world environment. VSFTPD version 2.3.4 was specifically installed as the Metasploit exploit target.

Ubuntu Desktop (PC – B)

Updated and statically assigned per the IP scheme, connected to G1/0 on the switch in VLAN 20. An FTP user was created and VSFTPD version 3.0.3 was installed. The host file was modified to resolve the Ubuntu server's domain name.

Kali Linux (PC – A)

Statically assigned per the IP scheme and connected directly to the attack router on G0/1. All penetration testing tools came pre-installed. The host file was modified to resolve the Ubuntu server's domain name.

Network topology

GNS3 network topology diagram