# -*- mode: ruby -*- # vi: set ft=ruby : Vagrant.configure("2") do |config| # Base configuration for the VM and provisioner config.vm.box = "metasploitable3" config.vm.hostname = "metasploitable3" config.vm.communicator = "winrm" # Install Chocolatey config.vm.provision :shell, path: "scripts/installs/chocolatey.cmd" config.vm.provision :reload # Hack to reset environment variables # Install BoxStarter config.vm.provision :shell, path: "scripts/installs/install_boxstarter.bat" config.vm.provision :shell, inline: "rm C:\\tmp\\vagrant-shell.bat" # Hack for this bug: https://github.com/mitchellh/vagrant/issues/7614 # Install 7zip config.vm.provision :shell, path: "scripts/chocolatey_installs/7zip.bat" config.vm.provision :shell, inline: "rm C:\\tmp\\vagrant-shell.bat" # Hack for this bug: https://github.com/mitchellh/vagrant/issues/7614 # Adjust password policy config.vm.provision :shell, path: "scripts/configs/apply_password_settings.bat" config.vm.provision :shell, inline: "rm C:\\tmp\\vagrant-shell.bat" # Hack for this bug: https://github.com/mitchellh/vagrant/issues/7614 # Add users and add to groups config.vm.provision :shell, path: "scripts/configs/create_users.bat" config.vm.provision :shell, inline: "rm C:\\tmp\\vagrant-shell.bat" # Hack for this bug: https://github.com/mitchellh/vagrant/issues/7614 # Vulnerability - Unpatched IIS config.vm.provision :shell, path: "scripts/installs/setup_iis.bat" config.vm.provision :shell, inline: "rm C:\\tmp\\vagrant-shell.bat" # Hack for this bug: https://github.com/mitchellh/vagrant/issues/7614 # Vulnerability - Chinese caidao.asp backdoor config.vm.provision :shell, path: "scripts/installs/setup_caidao.bat" config.vm.provision :shell, inline: "rm C:\\tmp\\vagrant-shell.bat" # Hack for this bug: https://github.com/mitchellh/vagrant/issues/7614 # Vulnerability - Setup for Apache Struts config.vm.provision :shell, path: "scripts/chocolatey_installs/java.bat" config.vm.provision :shell, inline: "rm C:\\tmp\\vagrant-shell.bat" # Hack for this bug: https://github.com/mitchellh/vagrant/issues/7614 config.vm.provision :shell, path: "scripts/chocolatey_installs/tomcat.bat" config.vm.provision :shell, inline: "rm C:\\tmp\\vagrant-shell.bat" # Hack for this bug: https://github.com/mitchellh/vagrant/issues/7614 config.vm.provision :reload # Hack to reset environment variables config.vm.provision :shell, path: "scripts/installs/setup_apache_struts.bat" config.vm.provision :shell, inline: "rm C:\\tmp\\vagrant-shell.bat" # Hack for this bug: https://github.com/mitchellh/vagrant/issues/7614 # Vulnerability - Setup for Glassfish config.vm.provision :shell, path: "scripts/installs/setup_glassfish.bat" config.vm.provision :shell, inline: "rm C:\\tmp\\vagrant-shell.bat" # Hack for this bug: https://github.com/mitchellh/vagrant/issues/7614 # Vulnerability - Jenkins (1.8) config.vm.provision :shell, path: "scripts/installs/setup_jenkins.bat" config.vm.provision :shell, inline: "rm C:\\tmp\\vagrant-shell.bat" # Hack for this bug: https://github.com/mitchellh/vagrant/issues/7614 # Configure Firewall to open up vulnerable services config.vm.provision :shell, path: "scripts/configs/configure_firewall.bat" config.vm.provision :shell, inline: "rm C:\\tmp\\vagrant-shell.bat" # Hack for this bug: https://github.com/mitchellh/vagrant/issues/7614 end