Offsec Lab Connectivity Guide
Offsec Lab Connectivity Guide
Security
Lab
Connectivity
Guide
v.3.8.1
Mati
Aharoni
MCT,
MCSE
+
Security,
CCNA,
CCSA,
HPOV,
CISSP
Rules
of
Behavior
As
opposed
to
a
normal
network,
our
aim
is
to
allow
you
to
succeed
in
hacking
our
systems.
In
fact,
we
expect
the
students
to
acquire
administrative
privileges
on
almost
all
the
systems
in
the
lab!
The
labs
are
shared
with
other
students;
therefore,
we
request
that
you
do
not
alter
the
configurations
of
machines
you
hack.
Although
every
machine
in
the
lab
is
backed
up
and
restorable
in
less
than
20
seconds,
configuration
changes
are
a
nuisance
for
your
fellow
students
please
be
courteous
to
them.
The
lab
runs
several
monitoring
and
logging
systems.
Users
disregarding
these
rules
will
be
removed
from
the
labs
and
their
lab
sessions
will
be
terminated.
Any
configuration
change
on
a
machine
will
result
in
an
immediate
revert
of
the
machine
to
its
original
state.
Please
be
responsible
in
your
lab
usage.
The
machines
you
should
be
targeting
(depending
on
your
lab
assignment)
are:
LAB
1
-
192.168.11.200
-
192.168.11.254
LAB
2
-
192.168.13.200
-
192.168.13.254
LAB
3
-
192.168.15.200
-
192.168.15.254
LAB
4
-
192.168.17.200
-
192.168.17.254
LAB
5
-
192.168.19.200
-
192.168.19.254
LAB
6
-
192.168.31.200
-
192.168.31.254
PLEASE
DO
NOT
SCAN
OR
ATTACK
MACHINES
OUTSIDE
THIS
RANGE.
Enter Auth Username: OS-xxxx
Enter Auth Password: XXXXXXXXXX
Thu Mar 18 21:22:06 2010 WARNING: No server certificate verification method has been enabled.
See http://openvpn.net/howto.html#mitm for more info.
Thu Mar 18 21:22:06 2010 LZO compression initialized
Thu Mar 18 21:22:06 2010 UDPv4 link local: [undef]
Thu Mar 18 21:22:06 2010 UDPv4 link remote: 208.88.120.4:1194
Thu Mar 18 WARNING: this configuration may cache passwords in memory
Thu Mar 18 [127.0.0.1] Peer Connection Initiated with 208.88.120.4:1194
Thu Mar 18 21:22:07 2010 TUN/TAP device tap0 opened
Thu Mar 18 /sbin/ifconfig tap0 192.168.10.3 netmask 255.255.254.0 mtu 1500
Thu Mar 18 21:22:07 2010 Initialization Sequence Completed
2) Once
connected,
leave
that
window
open.
In
a
new
shell,
determine
the
IP
address
that
you
have
been
assigned
as
follows:
root@kali:~# ifconfig tap0
3) You
will
be
assigned
to
one
of
our
labs
as
outlined
above.
Note
that
the
subnet
is
a
/23
and
not
a
/24.
Based
upon
the
IP
address
you
are
assigned,
you
will
be
able
to
ping
one
of
the
following
lab
machines:
192.168.11.220,
192.168.13.220,
192.168.15.220,
192.168.17.220,
192.168.19.220,
or
192.168.31.220.
Maintain
this
connection
for
a
while
to
verify
its
stability.
Once
you
are
satisfied
with
the
ping
response
time,
your
connectivity
test
is
complete.
Hazards
Please
read
this
part
extremely
carefully.
By
joining
the
Offensive
Security
VPN,
you
will
be
connecting
to
a
potentially
hostile
environment.
Although
no
traffic
is
directly
allowed
between
student
machines
(by
design),
you
must
be
vigilant
at
all
times.
This
is
true
even
if
you
are
located
behind
a
NAT
device.
Please
take
the
proper
precautions
to
protect
your
client
computer.
Make
sure
to
change
your
root
password!
Please
do
not
scan
the
internal
network
once
connected.
Technical
Problems
If
you're
having
connectivity
problems
or
other
non-training
related
issues,
you
can
contact
us
in
several
ways
and
we
will
try
to
help
you
to
the
best
of
our
abilities.
IRC
We
have
an
active
IRC
channel
on
irc.freenode.net
in
the
#offsec
channel.
You
will
usually
find
a
member
of
our
staff
there
along
with
other
students
participating
in
the
course.
If
you
are
new
to
IRC,
check
out
our
quick
guide
at
the
following
URL:
http://www.offensive-security.com/irc-guide.pdf
Jabber
You
can
contact
us
on
the
Jabber
network
at
the
following
address:
[email protected].
EMAIL
You
can
email
us
at
[email protected].
We
wish
you
a
productive
and
enjoyable
time
in
our
labs!
The
Offensive
Security
Team