Browse Source

Update 'project-sec.adoc'

master
cse44742 4 years ago
parent
commit
19f5fe71ff
  1. 8
      project-sec.adoc

8
project-sec.adoc

@ -154,7 +154,7 @@ User password: docker
Sudo password: docker
== Inside on Docker Master
First of all, type ifconfig to see your ip address. Then, create an inventory.yml with the IPs using nmap -sP 172.19.0.* | grep Nmap | cut -d' ' -f5-6
First of all, type ifconfig to see your ip address. Then, create an inventory.yml with the IPs using nmap -sP 172.27.0.* | grep Nmap | cut -d' ' -f5-6
```
[service]
@ -253,7 +253,7 @@ Firstly, connect to the worker that you wish to do the attack. Inside the worker
sudo apt update
sudo apt install hping3 -y
#syn_flood_attack_with_hping3_on_docker_master_with_IP_172.19.0.2
#syn_flood_attack_with_hping3_on_docker_master_with_IP_172.27.0.2
#hping3 -i u1 -S -p 80 172.27.0.2
#hping3 172.27.0.2 -q -n -d 120 -S -p 80 --flood
hping3 -S -p 80 172.127.0.2
@ -657,7 +657,7 @@ Don't close the window or do not stop the execution. Open a new window and conne
Now connect to an other worker, for instance worker_1. You have to do the same thing in every worker.
```
ssh docker@@172.27.0.3
ssh docker@172.27.0.3
sudo apt update
sudo apt install openvpn
@ -691,7 +691,7 @@ ping 10.80.0.2 #this is the new IP of master of tun0
You are ready!
== VPN
== REMOTE/LOCAL SSH FORWARDING
{empty} +
Here is a video about how you can do ssh local and remote forwarding.

Loading…
Cancel
Save