Differences between revisions 2 and 6 (spanning 4 versions)
Revision 2 as of 2017-01-19 20:24:42
Size: 509
Editor: scot
Comment:
Revision 6 as of 2017-01-20 18:03:39
Size: 2046
Editor: scot
Comment:
Deletions are marked like this. Additions are marked like this.
Line 5: Line 5:
 1. DHCP Reservations - sudo static IPs
 1. Firewall rules - blocking input
 1. NAT rules to access your machines.
 1. DHCP Reservations - We'll create sudo static IPs using DHCP reservations.
 1. Firewall rules - Metasploitable 3 is something we shouldn't allow access to the internet. Consequently we'll be blocking internet access to that particular VM.
 1. Lastly, we'll provide a NAT rule to access the Windows 10 VM via RDP and enable remote desktop access for the Windows 10 VM.

Completing the Lab:

The best approach completes the three items above in order. From networking class, you should know how DHCP works.

 1. You will need the MAC address of each VM. Go and get them and write them down.
 1. In the service menu, click on DCHP server and make sure the LAN is selected at the top.
 1. At the bottom of the page add "DHCP Static Mappings for this Interface" for each VM. I did them as follows:
    1. Windows 10 --> 192.168.1.2
    1. Windows 2016 --> 192.168.1.3
    1. Kali --> 192.168.1.4
    1. Metasploitable 3 --> 192.168.1.5

The result looks like the:

{{http://db2.cs.southern.edu/videos/images/CPTR427/Lab02/dhcpmap.png}}

Next, create a blocking rule for the Metasploitable 3 VM blocking all access to/from the internet. This can be done from the Firewall Menu, item Rules.

{{http://db2.cs.southern.edu/videos/images/CPTR427/Lab02/firewallrule.png}}

Finally, select NAT from the Firewall menu and add a NAT rule that allows you to access your Windows 10 machine using RDP by connecting to the public IP side of your pfSense box.

{{http://db2.cs.southern.edu/videos/images/CPTR427/Lab02/nat.png}}
Line 11: Line 35:
 1. Remote into your Windows 10 VM.
Line 12: Line 37:
 1. Create a rule to block all outgoing and incoming packets to the metasploitable 3 computer.
 1. Write NAT rule to allow remote desktop to your Windows 10 Machine. Make sure you allow remote access to your windows 10 and windows 2016 machine.
 1. Show me that the rule to block all outgoing and incoming packets to the metasploitable 3 VM actually works
 1. Show me that you can remote desktop to your other windows machines (Windows 2016, Metasploitable)
 1. Show me that you can access your Kali machine. (GUI would be nice, but SSH will get you a pass for now).

Lab 02: NAT and firewall setup

Concepts:

  1. DHCP Reservations - We'll create sudo static IPs using DHCP reservations.
  2. Firewall rules - Metasploitable 3 is something we shouldn't allow access to the internet. Consequently we'll be blocking internet access to that particular VM.
  3. Lastly, we'll provide a NAT rule to access the Windows 10 VM via RDP and enable remote desktop access for the Windows 10 VM.

Completing the Lab:

The best approach completes the three items above in order. From networking class, you should know how DHCP works.

  1. You will need the MAC address of each VM. Go and get them and write them down.
  2. In the service menu, click on DCHP server and make sure the LAN is selected at the top.
  3. At the bottom of the page add "DHCP Static Mappings for this Interface" for each VM. I did them as follows:
    1. Windows 10 --> 192.168.1.2

    2. Windows 2016 --> 192.168.1.3

    3. Kali --> 192.168.1.4

    4. Metasploitable 3 --> 192.168.1.5

The result looks like the:

http://db2.cs.southern.edu/videos/images/CPTR427/Lab02/dhcpmap.png

Next, create a blocking rule for the Metasploitable 3 VM blocking all access to/from the internet. This can be done from the Firewall Menu, item Rules.

http://db2.cs.southern.edu/videos/images/CPTR427/Lab02/firewallrule.png

Finally, select NAT from the Firewall menu and add a NAT rule that allows you to access your Windows 10 machine using RDP by connecting to the public IP side of your pfSense box.

http://db2.cs.southern.edu/videos/images/CPTR427/Lab02/nat.png

Show Me:

  1. Remote into your Windows 10 VM.
  2. Show me that you have DHCP reservations for each of your four computers
  3. Show me that the rule to block all outgoing and incoming packets to the metasploitable 3 VM actually works
  4. Show me that you can remote desktop to your other windows machines (Windows 2016, Metasploitable)
  5. Show me that you can access your Kali machine. (GUI would be nice, but SSH will get you a pass for now).

NetworkSecurity/Lab/Lab02 (last edited 2021-02-03 19:34:19 by scot)