mirror of
https://github.com/rapid7/metasploitable3.git
synced 2024-09-21 00:01:14 +02:00
72dc282aa0
Tweaks to the recipes to avoid repetition of work, and ub1404 dev, * let apt cookbook handle apt-update globally * do not download, configure, make, make install if the package is already installed * add guards for file deletion to first check whether file is present * use docker cookbook for image building and running, to only build if not alrady built and only run if not already running * drop mysql table and recreate each time Also, * bump Docker cookbook to 4.9.3 * bump mysql cookbook to 8.5.1 * add apt cookbook for better apt-update management * bump depends versions and add apt * modify readme with customization instructions * modify all chef runlists to call apt first in the runlist * add a vagrantfile for dev of ub1404
78 lines
2.8 KiB
Ruby
78 lines
2.8 KiB
Ruby
# -*- mode: ruby -*-
|
|
# vi: set ft=ruby :
|
|
|
|
Vagrant.configure("2") do |config|
|
|
config.vm.define "win2k8" do |win2k8|
|
|
# Base configuration for the VM and provisioner
|
|
win2k8.vm.box = "metasploitable3-win2k8-pro"
|
|
win2k8.vm.hostname = "metasploitable3-win2k8"
|
|
win2k8.vm.communicator = "winrm"
|
|
win2k8.winrm.retry_limit = 60
|
|
win2k8.winrm.retry_delay = 10
|
|
|
|
win2k8.vm.network "private_network", type: "dhcp"
|
|
|
|
# Configure Firewall to open up vulnerable services
|
|
case ENV['MS3_DIFFICULTY']
|
|
when 'easy'
|
|
config.vm.provision :shell, path: "scripts/configs/disable_firewall.bat"
|
|
else
|
|
win2k8.vm.provision :shell, path: "scripts/configs/enable_firewall.bat"
|
|
win2k8.vm.provision :shell, path: "scripts/configs/configure_firewall.bat"
|
|
end
|
|
|
|
# Insecure share from the Linux machine
|
|
win2k8.vm.provision :shell, path: "scripts/installs/install_share_autorun.bat"
|
|
win2k8.vm.provision :shell, inline: "rm C:\\tmp\\vagrant-shell.bat" # Hack for this bug: https://github.com/mitchellh/vagrant/issues/7614
|
|
win2k8.vm.provision :shell, path: "scripts/installs/setup_linux_share.bat"
|
|
win2k8.vm.provision :shell, inline: "rm C:\\tmp\\vagrant-shell.bat" # Hack for this bug: https://github.com/mitchellh/vagrant/issues/7614
|
|
end
|
|
|
|
config.vm.define "ub1404" do |ub1404|
|
|
ub1404.vm.box = "metasploitable-ub1404-pro"
|
|
ub1404.vm.hostname = "metasploitable-ub1404"
|
|
|
|
ub1404.vm.network "private_network", ip: '172.28.128.3'
|
|
|
|
ub1404.vm.provider "virtualbox" do |v|
|
|
v.name = "Metasploitable-ub1404"
|
|
v.memory = 2048
|
|
end
|
|
|
|
config.omnibus.chef_version = :latest
|
|
|
|
# Provision with Chef Solo
|
|
#
|
|
config.vm.provision :chef_solo do |chef|
|
|
chef.cookbooks_path = [ 'chef/cookbooks' ]
|
|
|
|
chef.json = { 'metasploitable' => {
|
|
# Customizations here
|
|
}
|
|
}
|
|
|
|
chef.add_recipe "apt::default"
|
|
chef.add_recipe "metasploitable::mysql"
|
|
chef.add_recipe "metasploitable::apache_continuum"
|
|
chef.add_recipe "metasploitable::apache"
|
|
chef.add_recipe "metasploitable::php_545"
|
|
chef.add_recipe "metasploitable::phpmyadmin"
|
|
chef.add_recipe "metasploitable::proftpd"
|
|
chef.add_recipe "metasploitable::users"
|
|
chef.add_recipe "metasploitable::docker"
|
|
chef.add_recipe "metasploitable::samba"
|
|
chef.add_recipe "metasploitable::sinatra"
|
|
chef.add_recipe "metasploitable::unrealircd"
|
|
chef.add_recipe "metasploitable::chatbot"
|
|
chef.add_recipe "metasploitable::payroll_app"
|
|
chef.add_recipe "metasploitable::readme_app"
|
|
chef.add_recipe "metasploitable::cups"
|
|
chef.add_recipe "metasploitable::drupal"
|
|
chef.add_recipe "metasploitable::knockd"
|
|
chef.add_recipe "metasploitable::iptables"
|
|
chef.add_recipe "metasploitable::flags"
|
|
chef.add_recipe "metasploitable::clear_cache"
|
|
end
|
|
end
|
|
end
|