<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://lms.onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Stealth%3A_Penyiapan_Infrastruktur_untuk_Latihan_Serangan</id>
	<title>Stealth: Penyiapan Infrastruktur untuk Latihan Serangan - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://lms.onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Stealth%3A_Penyiapan_Infrastruktur_untuk_Latihan_Serangan"/>
	<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Stealth:_Penyiapan_Infrastruktur_untuk_Latihan_Serangan&amp;action=history"/>
	<updated>2026-04-21T01:26:57Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Stealth:_Penyiapan_Infrastruktur_untuk_Latihan_Serangan&amp;diff=51143&amp;oldid=prev</id>
		<title>Onnowpurbo: Created page with &quot;   Lab preparation To follow along with the examples in this chapter, a bit of lab preparation will be necessary. Throughout this book, there has been a strong focus on being...&quot;</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Stealth:_Penyiapan_Infrastruktur_untuk_Latihan_Serangan&amp;diff=51143&amp;oldid=prev"/>
		<updated>2018-05-27T04:30:13Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;   Lab preparation To follow along with the examples in this chapter, a bit of lab preparation will be necessary. Throughout this book, there has been a strong focus on being...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Lab preparation&lt;br /&gt;
To follow along with the examples in this chapter, a bit of lab preparation will&lt;br /&gt;
be necessary.&lt;br /&gt;
Throughout this book, there has been a strong focus on being able to&lt;br /&gt;
emulate a target network. This is critical to being able to learn and&lt;br /&gt;
practice the latest and greatest techniques as the excellent minds in the&lt;br /&gt;
security research field continue to surprise us with new vulnerabilities&lt;br /&gt;
and possible attack vectors. This book cannot cover every possible&lt;br /&gt;
method of testing a network, but building the labs is an attempt at adding&lt;br /&gt;
long-lasting value that will hopefully lead to a lifetime of the &amp;quot;hacker&lt;br /&gt;
mentality.&amp;quot; If you continue to build your personal lab and increase the&lt;br /&gt;
difficulty of the practice challenges that you set for yourself, you will&lt;br /&gt;
quickly become comfortable with testing any sort of environment.&lt;br /&gt;
An example of the machines we&amp;#039;ll be using is shown in the following figure:&lt;br /&gt;
We have to make a number of configuration changes in preparing for the exercises.&lt;br /&gt;
Kali guest machine&lt;br /&gt;
This machine will need to be connected to the 192.168.75.0/24 subnet. Ensure&lt;br /&gt;
that only one network adapter is enabled. The adapter should use the VMnet8 NAT&lt;br /&gt;
network option. An example of this is shown in the following screenshot:&lt;br /&gt;
[ 320 ]Chapter 10&lt;br /&gt;
We can assign the IP address ( 192.168.75.10 , in this case) to an Ethernet adapter&lt;br /&gt;
( eth0 ) from within Kali by typing the following command into a terminal:&lt;br /&gt;
# ifconfig eth0 192.168.75.20 netmask 255.255.255.0 broadcast&lt;br /&gt;
192.168.75.255 promisc&lt;br /&gt;
As the pfSense machine will need to be our router as well, we need to set it up as the&lt;br /&gt;
default gateway. This can be accomplished as follows:&lt;br /&gt;
# route add default gw 192.168.75.10&lt;br /&gt;
[ 321 ]Stealth Techniques&lt;br /&gt;
Ubuntu guest machine&lt;br /&gt;
The Ubuntu machine will be used as the target. It needs to be configured to connect&lt;br /&gt;
to VMnet3 , which is a new internal network we have not used before. Your settings&lt;br /&gt;
should be similar to the following:&lt;br /&gt;
The pfSense guest machine configuration&lt;br /&gt;
Configuring our firewall involves a bit more work. It needs to be able to route&lt;br /&gt;
restrictive traffic from the VMnet8 (NAT) network to the VMnet3 subnet. There are&lt;br /&gt;
several configuration changes we will need to make to ensure this works properly.&lt;br /&gt;
[ 322 ]Chapter 10&lt;br /&gt;
pfSense offers the option to reset to factory defaults from the configurations&lt;br /&gt;
menu. Be aware that the adapters will have to be reconfigured if this option&lt;br /&gt;
is chosen. This is not difficult, but all previous settings will be lost. Be sure&lt;br /&gt;
to make a copy/snapshot of your pfSense machine if you are concerned&lt;br /&gt;
about losing the previous configuration.&lt;br /&gt;
The pfSense network setup&lt;br /&gt;
Our firewall guest machine will use two network adapters. One will be used for the&lt;br /&gt;
VMnet8 (NAT) segment and the other for the VMnet3 segment. VMnet8 (NAT) will be&lt;br /&gt;
treated as an untrusted wide area network for the examples within this chapter. An&lt;br /&gt;
example of this is shown in the following screenshot:&lt;br /&gt;
[ 323 ]Stealth Techniques&lt;br /&gt;
WAN IP configuration&lt;br /&gt;
The remaining networking setup will need to be performed from within the guest&lt;br /&gt;
machine:&lt;br /&gt;
1.	 Boot up your pfSense virtual instance. There may be an additional delay as&lt;br /&gt;
pfSense attempts to configure the WAN adapter. Allow it to fully load until&lt;br /&gt;
you see the following menu:&lt;br /&gt;
2.	 The WAN and LAN interfaces will need to be configured properly. Select&lt;br /&gt;
option 2) Set interface(s) IP address.&lt;br /&gt;
[ 324 ]Chapter 10&lt;br /&gt;
3.	 Select option 1 – WAN (em0 - dhcp, dhcp6).&lt;br /&gt;
4.	 When asked to configure the WAN interface via DHCP press N for no.&lt;br /&gt;
5.	 The IP for the WAN adapter should be 192.168.75.10 .&lt;br /&gt;
6.	 Subnet bit count should be set to 24. Type 24 and press Enter.&lt;br /&gt;
7.	 Press Enter to return to the configuration menu.&lt;br /&gt;
8.	 Press N as required to the prompts for configuring IPv6; we are not using it&lt;br /&gt;
in our architecture.&lt;br /&gt;
9.	 After the IPv6 configuration, press N to revert to HTTP.&lt;br /&gt;
An example of these settings is shown in the following screenshot:&lt;br /&gt;
[ 325 ]Stealth Techniques&lt;br /&gt;
After the configuration has been completed, press Enter to continue. This will return&lt;br /&gt;
you to the main menu. The next thing we want to do is disable the VMware DHCP&lt;br /&gt;
server that is connected to our VMnet3 switch; we are doing this because we want to&lt;br /&gt;
use the DHCP server on pfSense. To disable the VMware DHCP server, in VMware&lt;br /&gt;
Workstation, click on Edit | Virtual Network Editor | VMnet3 and remove the&lt;br /&gt;
check mark in the DHCP section. As a reference, refer to the following screenshot:&lt;br /&gt;
[ 326 ]Chapter 10&lt;br /&gt;
LAN IP configuration&lt;br /&gt;
We can set up the LAN IP information from the configuration menu as well. One&lt;br /&gt;
benefit of configuring the LAN here is that we can have a DHCP server configured&lt;br /&gt;
for VMnet3 at the same time.&lt;br /&gt;
1.	 Select option 2 from the configuration menu to start the LAN IP&lt;br /&gt;
configuration module.&lt;br /&gt;
2.	 Choose the LAN interface (option 2 ).&lt;br /&gt;
3.	 When prompted to enter the IP address, type 192.168.101.10 .&lt;br /&gt;
4.	 The bit count should be set to 24 .&lt;br /&gt;
5.	 When asked if you would like a DHCP server to be enabled on the LAN,&lt;br /&gt;
press Y for yes.&lt;br /&gt;
6.	 The DHCP Client IP range start will be 192.168.101.100 .&lt;br /&gt;
7.	 The DHCP Client IP range stop will be 192.168.101.110 .&lt;br /&gt;
8.	 Press Enter.&lt;br /&gt;
9.	 Press Enter again to return to the configuration menu.&lt;br /&gt;
[ 327 ]Stealth Techniques&lt;br /&gt;
Your LAN and WAN IP ranges should match the following:&lt;br /&gt;
Firewall configuration&lt;br /&gt;
pfSense can be configured using its intuitive web interface. Boot up the Ubuntu&lt;br /&gt;
machine, open a terminal, and perform sudo dhclient to pick up an address from&lt;br /&gt;
the pfSense DHCP server on VMnet3 ( 192.168.101.0/24 ). In a web browser on the&lt;br /&gt;
Ubuntu machine, type http://192.168.101.10/ to access the configuration panel.&lt;br /&gt;
If you have to reset the factory defaults, you will need to step through the wizard to&lt;br /&gt;
get to the standard console.&lt;br /&gt;
The default username and password combination for pfSense&lt;br /&gt;
is admin/pfsense.&lt;br /&gt;
To view the current firewall rules, choose Firewall | Rules and review the current&lt;br /&gt;
configuration. By default, the WAN interface should be blocked from connecting&lt;br /&gt;
internally as there are no pre-established rules that allow any traffic through. An&lt;br /&gt;
example of this is shown in the following screenshot:&lt;br /&gt;
[ 328 ]Chapter 10&lt;br /&gt;
For testing purpose, we will enable ports 80 , 443 , 21 and allow ICMP. Add the rules&lt;br /&gt;
as follows:&lt;br /&gt;
1.	 Click on the add a new rule button displayed in the preceding screenshot.&lt;br /&gt;
2.	 Use the following rule settings to enable ICMP pass-through:&lt;br /&gt;
° ° Action: Pass&lt;br /&gt;
° ° Interface: WAN&lt;br /&gt;
° ° Protocol: ICMP&lt;br /&gt;
° ° All others: Defaults&lt;br /&gt;
° ° Click on the Save button at the bottom of the screen&lt;br /&gt;
° ° Click on the Apply Changes button at the top of the screen&lt;br /&gt;
3.	 Use the Interface | WAN navigation menu to enter the WAN interface&lt;br /&gt;
configuration menu and uncheck Block private networks. Apply the changes&lt;br /&gt;
and return to Firewall | Rules.&lt;br /&gt;
4.	 Click on the add new rule button. An example of this is shown in the&lt;br /&gt;
following image:&lt;br /&gt;
5.	 Use the following rule settings to enable HTTP pass-through:&lt;br /&gt;
° ° Action: Pass&lt;br /&gt;
° ° Interface: WAN&lt;br /&gt;
° ° Protocol: TCP&lt;br /&gt;
° ° Destination port range as follows:&lt;br /&gt;
° ° From: HTTP (80)&lt;br /&gt;
° ° To: HTTP (80)&lt;br /&gt;
[ 329 ]Stealth Techniques&lt;br /&gt;
6.	 Continue adding ports until the configuration matches the following:&lt;br /&gt;
At this point, any machine connected to VMnet8 (NAT) can communicate through&lt;br /&gt;
the open ports and can ping machines on the VMnet3 segment, as can be seen in the&lt;br /&gt;
following image (this system running the scan is at 192.168.75.20 ):&lt;br /&gt;
[ 330 ]&lt;/div&gt;</summary>
		<author><name>Onnowpurbo</name></author>
	</entry>
</feed>