Files
securedorg.github.io/fundamentals.md
Amanda Rousseau c98a2b7ce2 fixing bullets
2017-03-08 11:55:35 -08:00

79 lines
2.7 KiB
Markdown

---
layout: default
permalink: /RE101/section1/
title: Fundamentals
---
[Go Back to Reverse Engineering Malware 101](https://securedorg.github.io/RE101/)
# Section 1: Fundamentals #
## Enviroment Setup ##
### Installing VirtualBox ###
For windows and osx, follow the instructions in the install binary.
#### Windows ####
![alt text](https://github.com/securedorg/securedorg.github.io/blob/master/images/VBwin.png "Windows Virualbox")
#### Mac OSX ####
![alt text](https://github.com/securedorg/securedorg.github.io/blob/master/images/VBmac.png "OSX Virtualbox")
#### Linux ####
![alt text](https://github.com/securedorg/securedorg.github.io/blob/master/images/Vblinux.png "Linux Virtualbox")
---
### Download Victim and Sniffer VMs ###
Unzip the files below and open the .ovf file with VirtualBox
[Victim VM](https://securedorg.github.io/RE101/section1)
* OS: Windows 7 Service Pack 1
* Architecture: Intel 32bit
* Username: IEUser
* Password: Passw0rd!
* IP Address: 192.168.0.2
* Gateway: 192.168.0.1
[Sniffer VM](https://securedorg.github.io/RE101/section1)
* OS: Ubuntu 16.04.2 LTS Desktop
* Architecture: Intel 64bit
* Username: Sniffer
* password re1012017
* IP Address: 192.168.0.1
* Gateway: 192.168.0.1
### Post Install Instructions ###
1. Install VirtualBox CD on both VMs: Devices->Insert Guest Additions CD Image
⋅⋅* If it doesn't auto appear, navigate to the CD Drive to install
⋅⋅* Follow install directions
⋅⋅* Note: it will require install privileges so insert passwords for each VM
2. Victim VM: Devices->Drag and Drop->Bidrectional
3. Victim VM: Devices->Shared Clipboard->Bidirectional
4. Both VMs: Devices->Network->Network Settings
⋅⋅* Select Attached to `Interal Network`
⋅⋅* Name should mirror both VMs. Default is `intnet`
5. Run/Play both VMs to verify network connectivity
⋅⋅* Sniffer VM: Ensure `inetsim` is running
⋅⋅⋅* Open terminal and run: `ps -ef | grep inetsim`
⋅⋅⋅* If no output, run: `/etc/init.d/inetsim start`
⋅⋅⋅* Run the ps command again to confirm it's running. See output below
⋅⋅* Victim VM: test connection to Sniffer VM
⋅⋅⋅* In the search bar, type `cmd.exe` to open terminal
⋅⋅⋅* Run command: `ping 192.168.0.1`
⋅⋅⋅* Expected output:
6. Sniffer VM: Devices->Shared Folders->Shared Folders Settings
..* On your Host, create a folder called `sniffershare`
..* In virtual box select Add New Shared Folder icon and navigate to the folder you just created (sniffershare)
..* In Sniffer VM, open the terminal and run command:
`sudo mount -t vboxsf -o uid=$UID,gid=$(id -g) share ~/host`
[Intro <- Back](https://securedorg.github.io/RE101/intro)[Next -> Anatomy of PE](https://securedorg.github.io/RE101/section1.2)