mirror of
https://github.com/aljazceru/securedorg.github.io.git
synced 2025-12-21 07:54:20 +01:00
71 lines
2.9 KiB
Markdown
71 lines
2.9 KiB
Markdown
---
|
|
layout: default
|
|
permalink: /RE101/section1/
|
|
title: Fundamentals
|
|
---
|
|
[Go Back to Reverse Engineering Malware 101](https://securedorg.github.io/RE101/)
|
|
|
|
# Section 1: Fundamentals #
|
|
|
|
## Enviroment Setup ##
|
|
|
|
### Installing VirtualBox ###
|
|
|
|
For windows and osx, follow the instructions in the install binary.
|
|
|
|
| Windows | Mac OSX | Linux |
|
|
| --- | --- | --- |
|
|
| [](http://download.virtualbox.org/virtualbox/5.1.14/VirtualBox-5.1.14-112924-Win.exe) | [](http://download.virtualbox.org/virtualbox/5.1.14/VirtualBox-5.1.14-112924-OSX.dmg) | [](https://www.virtualbox.org/wiki/Linux_Downloads) |
|
|
|
|
### Download Victim and Sniffer VMs ###
|
|
|
|
Unzip the files below and open the .ovf file with VirtualBox
|
|
|
|
[Victim VM](https://securedorg.github.io/RE101/section1)
|
|
|
|
* OS: Windows 7 Service Pack 1
|
|
* Architecture: Intel 32bit
|
|
* Username: IEUser
|
|
* Password: Passw0rd!
|
|
* IP Address: 192.168.0.2
|
|
* Gateway: 192.168.0.1
|
|
|
|
[Sniffer VM](https://securedorg.github.io/RE101/section1)
|
|
|
|
* OS: Ubuntu 16.04.2 LTS Desktop
|
|
* Architecture: Intel 64bit
|
|
* Username: Sniffer
|
|
* password re1012017
|
|
* IP Address: 192.168.0.1
|
|
* Gateway: 192.168.0.1
|
|
|
|
---
|
|
|
|
### Post Install Instructions ###
|
|
|
|
1. Install VirtualBox CD on both VMs: Devices->Insert Guest Additions CD Image
|
|
* If it doesn't auto appear, navigate to the CD Drive to install
|
|
* Follow install directions from the Guest Additions Dialog
|
|
* Note: it will require install privileges so insert passwords for each VM
|
|
2. Victim VM: Devices->Drag and Drop->Bidrectional
|
|
3. Victim VM: Devices->Shared Clipboard->Bidirectional
|
|
4. Both VMs: Devices->Network->Network Settings
|
|
* Select Attached to `Internal Network`
|
|
* Name should mirror both VMs. Default is `intnet`
|
|
5. Run/Play both VMs to verify network connectivity
|
|
6. Sniffer VM: Ensure `inetsim` is running
|
|
* Open terminal and run: `ps -ef | grep inetsim`
|
|
* If no output, run: `/etc/init.d/inetsim start`
|
|
* Run the ps command again to confirm it's running.
|
|
* Expected output: 
|
|
7. Victim VM: test connection to Sniffer VM
|
|
* In the search bar, type `cmd.exe` to open terminal
|
|
* Run command: `ping 192.168.0.1`
|
|
* Expected output: 
|
|
6. Sniffer VM: Devices->Shared Folders->Shared Folders Settings
|
|
* On your Host, create a folder called `sniffershare`
|
|
* In virtual box select Add New Shared Folder icon and navigate to the folder you just created (sniffershare)
|
|
* In Sniffer VM, open the terminal and run command:`sudo mount -t vboxsf -o uid=$UID,gid=$(id -g) share ~/host`
|
|
|
|
[Intro <- Back](https://securedorg.github.io/RE101/intro) | [Next -> Anatomy of PE](https://securedorg.github.io/RE101/section1.2)
|