diff --git a/project-sec.adoc b/project-sec.adoc index 19b6d8c..ff48a2b 100644 --- a/project-sec.adoc +++ b/project-sec.adoc @@ -154,7 +154,7 @@ User password: docker Sudo password: docker == Inside on Docker Master -First of all, type ifconfig to see your ip address. Then, create an inventory.yml with the IPs using nmap -sP 172.19.0.* | grep Nmap | cut -d' ' -f5-6 +First of all, type ifconfig to see your ip address. Then, create an inventory.yml with the IPs using nmap -sP 172.27.0.* | grep Nmap | cut -d' ' -f5-6 ``` [service] @@ -253,7 +253,7 @@ Firstly, connect to the worker that you wish to do the attack. Inside the worker sudo apt update sudo apt install hping3 -y -#syn_flood_attack_with_hping3_on_docker_master_with_IP_172.19.0.2 +#syn_flood_attack_with_hping3_on_docker_master_with_IP_172.27.0.2 #hping3 -i u1 -S -p 80 172.27.0.2 #hping3 172.27.0.2 -q -n -d 120 -S -p 80 --flood hping3 -S -p 80 172.127.0.2 @@ -657,7 +657,7 @@ Don't close the window or do not stop the execution. Open a new window and conne Now connect to an other worker, for instance worker_1. You have to do the same thing in every worker. ``` -ssh docker@@172.27.0.3 +ssh docker@172.27.0.3 sudo apt update sudo apt install openvpn @@ -691,7 +691,7 @@ ping 10.80.0.2 #this is the new IP of master of tun0 You are ready! -== VPN +== REMOTE/LOCAL SSH FORWARDING {empty} + Here is a video about how you can do ssh local and remote forwarding.