diff --git a/apache/apache2/dockerfile b/apache/apache2/dockerfile
index c77c8f6..b5d8f2b 100644
--- a/apache/apache2/dockerfile
+++ b/apache/apache2/dockerfile
@@ -7,6 +7,7 @@ FROM debian:bookworm-slim
RUN apt-get update && apt-get install -y apache2 openssl ca-certificates net-tools\
&& rm -rf /var/lib/apt/lists/* \
&& a2enmod ssl && a2ensite default-ssl
+
COPY 000-default.conf /etc/apache2/sites-available/000-default.conf
COPY default-ssl.conf /etc/apache2/sites-available/default-ssl.conf
COPY --from=build /app/dist /var/www/html
diff --git a/apache/attacker/000-default.conf b/apache/attacker/000-default.conf
new file mode 100644
index 0000000..07ae9aa
--- /dev/null
+++ b/apache/attacker/000-default.conf
@@ -0,0 +1,29 @@
+
+ # The ServerName directive sets the request scheme, hostname and port that
+ # the server uses to identify itself. This is used when creating
+ # redirection URLs. In the context of virtual hosts, the ServerName
+ # specifies what hostname must appear in the request's Host: header to
+ # match this virtual host. For the default virtual host (this file) this
+ # value is not decisive as it is used as a last resort host regardless.
+ # However, you must set it for any further virtual host explicitly.
+ #ServerName www.example.com
+
+ ServerAdmin webmaster@localhost
+ Redirect permanent / https://localhost/
+
+ # Available loglevels: trace8, ..., trace1, debug, info, notice, warn,
+ # error, crit, alert, emerg.
+ # It is also possible to configure the loglevel for particular
+ # modules, e.g.
+ #LogLevel info ssl:warn
+
+ ErrorLog ${APACHE_LOG_DIR}/error.log
+ CustomLog ${APACHE_LOG_DIR}/access.log combined
+
+ # For most configuration files from conf-available/, which are
+ # enabled or disabled at a global level, it is possible to
+ # include a line for only one particular virtual host. For example the
+ # following line enables the CGI configuration for this host only
+ # after it has been globally disabled with "a2disconf".
+ #Include conf-available/serve-cgi-bin.conf
+
diff --git a/apache/attacker/default-ssl.conf b/apache/attacker/default-ssl.conf
new file mode 100644
index 0000000..4b9d7f9
--- /dev/null
+++ b/apache/attacker/default-ssl.conf
@@ -0,0 +1,132 @@
+
+
+ ServerAdmin webmaster@localhost
+
+ DocumentRoot /var/www/html
+
+ # Available loglevels: trace8, ..., trace1, debug, info, notice, warn,
+ # error, crit, alert, emerg.
+ # It is also possible to configure the loglevel for particular
+ # modules, e.g.
+ #LogLevel info ssl:warn
+
+ ErrorLog ${APACHE_LOG_DIR}/error.log
+ CustomLog ${APACHE_LOG_DIR}/access.log combined
+
+ # For most configuration files from conf-available/, which are
+ # enabled or disabled at a global level, it is possible to
+ # include a line for only one particular virtual host. For example the
+ # following line enables the CGI configuration for this host only
+ # after it has been globally disabled with "a2disconf".
+ #Include conf-available/serve-cgi-bin.conf
+
+ # SSL Engine Switch:
+ # Enable/Disable SSL for this virtual host.
+ SSLEngine on
+
+ # A self-signed (snakeoil) certificate can be created by installing
+ # the ssl-cert package. See
+ # /usr/share/doc/apache2/README.Debian.gz for more info.
+ # If both key and certificate are stored in the same file, only the
+ # SSLCertificateFile directive is needed.
+ SSLCertificateFile /etc/ssl/certs/ssl-cert-snakeoil.pem
+ SSLCertificateKeyFile /etc/ssl/private/ssl-cert-snakeoil.key
+
+ # Server Certificate Chain:
+ # Point SSLCertificateChainFile at a file containing the
+ # concatenation of PEM encoded CA certificates which form the
+ # certificate chain for the server certificate. Alternatively
+ # the referenced file can be the same as SSLCertificateFile
+ # when the CA certificates are directly appended to the server
+ # certificate for convinience.
+ #SSLCertificateChainFile /etc/apache2/ssl.crt/server-ca.crt
+
+ # Certificate Authority (CA):
+ # Set the CA certificate verification path where to find CA
+ # certificates for client authentication or alternatively one
+ # huge file containing all of them (file must be PEM encoded)
+ # Note: Inside SSLCACertificatePath you need hash symlinks
+ # to point to the certificate files. Use the provided
+ # Makefile to update the hash symlinks after changes.
+ #SSLCACertificatePath /etc/ssl/certs/
+ #SSLCACertificateFile /etc/apache2/ssl.crt/ca-bundle.crt
+
+ # Certificate Revocation Lists (CRL):
+ # Set the CA revocation path where to find CA CRLs for client
+ # authentication or alternatively one huge file containing all
+ # of them (file must be PEM encoded)
+ # Note: Inside SSLCARevocationPath you need hash symlinks
+ # to point to the certificate files. Use the provided
+ # Makefile to update the hash symlinks after changes.
+ #SSLCARevocationPath /etc/apache2/ssl.crl/
+ #SSLCARevocationFile /etc/apache2/ssl.crl/ca-bundle.crl
+
+ # Client Authentication (Type):
+ # Client certificate verification type and depth. Types are
+ # none, optional, require and optional_no_ca. Depth is a
+ # number which specifies how deeply to verify the certificate
+ # issuer chain before deciding the certificate is not valid.
+ #SSLVerifyClient require
+ #SSLVerifyDepth 10
+
+ # SSL Engine Options:
+ # Set various options for the SSL engine.
+ # o FakeBasicAuth:
+ # Translate the client X.509 into a Basic Authorisation. This means that
+ # the standard Auth/DBMAuth methods can be used for access control. The
+ # user name is the `one line' version of the client's X.509 certificate.
+ # Note that no password is obtained from the user. Every entry in the user
+ # file needs this password: `xxj31ZMTZzkVA'.
+ # o ExportCertData:
+ # This exports two additional environment variables: SSL_CLIENT_CERT and
+ # SSL_SERVER_CERT. These contain the PEM-encoded certificates of the
+ # server (always existing) and the client (only existing when client
+ # authentication is used). This can be used to import the certificates
+ # into CGI scripts.
+ # o StdEnvVars:
+ # This exports the standard SSL/TLS related `SSL_*' environment variables.
+ # Per default this exportation is switched off for performance reasons,
+ # because the extraction step is an expensive operation and is usually
+ # useless for serving static content. So one usually enables the
+ # exportation for CGI and SSI requests only.
+ # o OptRenegotiate:
+ # This enables optimized SSL connection renegotiation handling when SSL
+ # directives are used in per-directory context.
+ #SSLOptions +FakeBasicAuth +ExportCertData +StrictRequire
+
+ SSLOptions +StdEnvVars
+
+
+ SSLOptions +StdEnvVars
+
+
+ # SSL Protocol Adjustments:
+ # The safe and default but still SSL/TLS standard compliant shutdown
+ # approach is that mod_ssl sends the close notify alert but doesn't wait for
+ # the close notify alert from client. When you need a different shutdown
+ # approach you can use one of the following variables:
+ # o ssl-unclean-shutdown:
+ # This forces an unclean shutdown when the connection is closed, i.e. no
+ # SSL close notify alert is send or allowed to received. This violates
+ # the SSL/TLS standard but is needed for some brain-dead browsers. Use
+ # this when you receive I/O errors because of the standard approach where
+ # mod_ssl sends the close notify alert.
+ # o ssl-accurate-shutdown:
+ # This forces an accurate shutdown when the connection is closed, i.e. a
+ # SSL close notify alert is send and mod_ssl waits for the close notify
+ # alert of the client. This is 100% SSL/TLS standard compliant, but in
+ # practice often causes hanging connections with brain-dead browsers. Use
+ # this only for browsers where you know that their SSL implementation
+ # works correctly.
+ # Notice: Most problems of broken clients are also related to the HTTP
+ # keep-alive facility, so you usually additionally want to disable
+ # keep-alive for those clients, too. Use variable "nokeepalive" for this.
+ # Similarly, one has to force some clients to use HTTP/1.0 to workaround
+ # their broken HTTP/1.1 implementation. Use variables "downgrade-1.0" and
+ # "force-response-1.0" for this.
+ # BrowserMatch "MSIE [2-6]" \
+ # nokeepalive ssl-unclean-shutdown \
+ # downgrade-1.0 force-response-1.0
+
+
+
\ No newline at end of file
diff --git a/apache/attacker/dockerfile b/apache/attacker/dockerfile
index ff1f6bb..5e41ab8 100644
--- a/apache/attacker/dockerfile
+++ b/apache/attacker/dockerfile
@@ -7,9 +7,13 @@ COPY ./index1.html /var/www/html/
RUN apt-get update && apt-get install -y dsniff net-tools apache2 \
&& rm -rf /var/lib/apt/lists/* \
+ && a2enmod ssl && a2ensite default-ssl \
&& apache2ctl start
+COPY 000-default.conf /etc/apache2/sites-available/000-default.conf
+COPY default-ssl.conf /etc/apache2/sites-available/default-ssl.conf
+# CMD ["arpspoof", "-i", "eth0", "-t", "172.21.0.4", "-r", "172.21.0.3"]
+# arpspoof -i eth0 -t 172.21.0.4 -r 172.21.0.3
-CMD ["arpspoof", "-i", "eth0", "-t", "webserver", "-r", "webserver"]
\ No newline at end of file
diff --git a/apache/attacker/ssl/CA.crt b/apache/attacker/ssl/CA.crt
new file mode 100644
index 0000000..c363750
--- /dev/null
+++ b/apache/attacker/ssl/CA.crt
@@ -0,0 +1,22 @@
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
diff --git a/apache/attacker/ssl/CA.key b/apache/attacker/ssl/CA.key
new file mode 100644
index 0000000..961d3c1
--- /dev/null
+++ b/apache/attacker/ssl/CA.key
@@ -0,0 +1,28 @@
+-----BEGIN PRIVATE KEY-----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+-----END PRIVATE KEY-----
diff --git a/apache/attacker/ssl/CA.srl b/apache/attacker/ssl/CA.srl
new file mode 100644
index 0000000..aa7aa60
--- /dev/null
+++ b/apache/attacker/ssl/CA.srl
@@ -0,0 +1 @@
+0385B4255453463D21169C944EB49D2A1F444E2A
diff --git a/apache/attacker/ssl/cert.crt b/apache/attacker/ssl/cert.crt
new file mode 100644
index 0000000..9ff85ed
--- /dev/null
+++ b/apache/attacker/ssl/cert.crt
@@ -0,0 +1,20 @@
+-----BEGIN CERTIFICATE-----
+MIIDWzCCAkMCFAOFtCVUU0Y9IRaclE60nSofRE4qMA0GCSqGSIb3DQEBCwUAMGox
+CzAJBgNVBAYTAkZSMREwDwYDVQQIDAhCcmV0YWduZTEPMA0GA1UEBwwGVmFubmVz
+MQ8wDQYDVQQKDAZFTlNJQlMxFDASBgNVBAsMCzNBIEN5YmVybG9nMRAwDgYDVQQD
+DAdLdXJpYW50MB4XDTI1MDEyMTEwNDE1NloXDTI2MDEyMTEwNDE1NlowajELMAkG
+A1UEBhMCRlIxETAPBgNVBAgMCEJyZXRhZ25lMQ8wDQYDVQQHDAZWYW5uZXMxDzAN
+BgNVBAoMBkVOU0lCUzEUMBIGA1UECwwLM0EgQ3liZXJsb2cxEDAOBgNVBAMMB0t1
+cmlhbnQwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCdOL8sHJvggBas
+dF6wJGPpIf8/S4SDQItdBbFTJhigNtec9lA/ZAhDYXtH+9nMfCwsQTeHIpN2AA76
+MJRL7Jq9Y4wyiwLxkig4nfBbNuNqwbR4h7YxWP+wk5G7bLgG4PSq87lHLN06qF+1
+LzpacosT3U4+9zHMgPvm4907pNzBzae160Zsskwc22Ku+SFvto+sm4/WFqu/qqif
+OIjWeEsLEX8vPigDCuL7IBsldrxbkhH8UMRjigqj6SKYIjgmdFU2eFanCdFJazT2
+S1MD3UaVt11CEXcQaAQdktHtwNgdiLtpJaQml01LVZeKkOYf3ULbzu2SLstVr9sP
+wi6BybbfAgMBAAEwDQYJKoZIhvcNAQELBQADggEBAApJOGyqh38EI/rDoe8/8zC5
+AfO0X9fPNNrYpZhHwHepiZUyv0dLk1E0jvsKX0UWlSbuDuD1fzcEglFl8jm4z8lV
+16n9ZC/lQptjJso0FRbR6JMSRsFvS5lPlytnfY7VETI2jvbBDHxknqmyzKM7WM4Y
+xQSc03XPBClyQ3ut+Tb+5co+G4Rq5CYx2bI9snnmTC9S/4EeN0vVZORd3hyP9cII
+YsYKcqO1czexfoT4kaXghUB2Q4v0kBJe9wSWM8Zzq6Ka3YVkqpa7tOTRTZKgSfyO
+4rBAthzYqpu03WWACVQmXR+p0FQs/T82Ay8K+piWPsS5IjCY9uU+rSMhQyyOiuk=
+-----END CERTIFICATE-----
diff --git a/apache/attacker/ssl/private.key b/apache/attacker/ssl/private.key
new file mode 100644
index 0000000..45fe144
--- /dev/null
+++ b/apache/attacker/ssl/private.key
@@ -0,0 +1,27 @@
+-----BEGIN RSA PRIVATE KEY-----
+MIIEowIBAAKCAQEAnTi/LByb4IAWrHResCRj6SH/P0uEg0CLXQWxUyYYoDbXnPZQ
+P2QIQ2F7R/vZzHwsLEE3hyKTdgAO+jCUS+yavWOMMosC8ZIoOJ3wWzbjasG0eIe2
+MVj/sJORu2y4BuD0qvO5RyzdOqhftS86WnKLE91OPvcxzID75uPdO6Tcwc2ntetG
+bLJMHNtirvkhb7aPrJuP1harv6qonziI1nhLCxF/Lz4oAwri+yAbJXa8W5IR/FDE
+Y4oKo+kimCI4JnRVNnhWpwnRSWs09ktTA91GlbddQhF3EGgEHZLR7cDYHYi7aSWk
+JpdNS1WXipDmH91C287tki7LVa/bD8Iugcm23wIDAQABAoIBAGFCX5EMSamB04Tv
+oDva5yurallfgCQp44yyHtZPNOC3zH4/KbltSmdUgI0xUbTcA/+EgLNKQmq28oz3
+TGYDgl4ynOIPeMy0G8maerwSonDCT8BYQ+8XHWXAhGCritRGiVTP3QgYyuqkikBt
+bO3S+hJZzzPIe7gE+tAEmjFxdVc1x2w6ZoOKdIfHKaa75XQW6wwns3yB6TY/M0d8
+kAlas2+zhda77Wdyl0SQ2Tj2CfCtW8uKo1LAZB4SLW0qUPrP8FMIGSEtbJ6f536E
+3Ce+FJ/klyyFzlPpTlp2DIALP011vSx2vwiWzLziMyDGecxK9gdq22jmwLydKzrf
+L7CYiyECgYEA0EE40tdvmHPJiIuq5sQr3d5AKhc91VWQ33IkCBLMWlm6dHVrR/+j
+kvMLVNSUyAdLSzwcXC1/PR2O8Bsvx9bvgGCVs5AAvwXYPeKxUYmG4UigCHJkzsKZ
+m8jmQejdoyBk+u1SDQmGoe9PnpN7pdiBnW0pr0wn4QDX+Cpg8Y/o2YcCgYEAwURR
+JCxLuyKf58PfO5eSu2J2uoWXa/bysJiQwvPsA57yQPPhUlV3TxO8o5mxWlDFI1CW
+g+9y1YQXA8crJ3KO5u0yDx86Y23wz0FKZtVdbXwdCGZEg6tZxzaGwh4FRW1acY1K
+8vE7OGaZtH9zv9aTysx1ty8XiYj51W7xjq4pLekCgYAtMVoxdwsCnG3psdV+iqey
+WB64g56pgw4TT2O+VMX//WTXDPwg/brzksasvA0lc1/Fjd/hqQXpr1ZriJrP1TbY
+Nx2FgASJb61DkMRGG4Ant2jzLE/wBo7rHafKOcyPL+J6CbI6ngyXa6VtljfI/7jw
+/tWC8xXcYCB9/ERZZ49yVQKBgQCF7XipL4T/VjwnWIXOfvfwoIgUM1U+PO/qzp6q
+amvoCnJn7lj7PDykcNHtMSlEo+oo0cSsAve53IIyXQebm3hJsJ9a+VH16w7QILeV
+UVAf+b0IwA3EjK53LWLvC+ytMt1VCQuiFObr67Wh7hxhGSprg4ojeh++cExoyivc
+qvXgWQKBgC4ipxDnLI+aOxgGkj7G9cbik28dXuTnVO3pY5tls0ToMR3QJIuYbe80
+vVaZTwGqauCPUe6uF9lJq6d01iq0SJnQpyBmDQWJgRXFMFUN9AVx7N1Y8r8MBnH1
+lHRy+TkJ4sx0sIoZUvVWds1PhfFdQA1eEYU+8gpiaGny0/PJnvaw
+-----END RSA PRIVATE KEY-----
diff --git a/apache/attacker/ssl/public.key b/apache/attacker/ssl/public.key
new file mode 100644
index 0000000..57ff1f8
--- /dev/null
+++ b/apache/attacker/ssl/public.key
@@ -0,0 +1,9 @@
+-----BEGIN PUBLIC KEY-----
+MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAnTi/LByb4IAWrHResCRj
+6SH/P0uEg0CLXQWxUyYYoDbXnPZQP2QIQ2F7R/vZzHwsLEE3hyKTdgAO+jCUS+ya
+vWOMMosC8ZIoOJ3wWzbjasG0eIe2MVj/sJORu2y4BuD0qvO5RyzdOqhftS86WnKL
+E91OPvcxzID75uPdO6Tcwc2ntetGbLJMHNtirvkhb7aPrJuP1harv6qonziI1nhL
+CxF/Lz4oAwri+yAbJXa8W5IR/FDEY4oKo+kimCI4JnRVNnhWpwnRSWs09ktTA91G
+lbddQhF3EGgEHZLR7cDYHYi7aSWkJpdNS1WXipDmH91C287tki7LVa/bD8Iugcm2
+3wIDAQAB
+-----END PUBLIC KEY-----
diff --git a/apache/attacker/ssl/public.pub b/apache/attacker/ssl/public.pub
new file mode 100644
index 0000000..57ff1f8
--- /dev/null
+++ b/apache/attacker/ssl/public.pub
@@ -0,0 +1,9 @@
+-----BEGIN PUBLIC KEY-----
+MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAnTi/LByb4IAWrHResCRj
+6SH/P0uEg0CLXQWxUyYYoDbXnPZQP2QIQ2F7R/vZzHwsLEE3hyKTdgAO+jCUS+ya
+vWOMMosC8ZIoOJ3wWzbjasG0eIe2MVj/sJORu2y4BuD0qvO5RyzdOqhftS86WnKL
+E91OPvcxzID75uPdO6Tcwc2ntetGbLJMHNtirvkhb7aPrJuP1harv6qonziI1nhL
+CxF/Lz4oAwri+yAbJXa8W5IR/FDEY4oKo+kimCI4JnRVNnhWpwnRSWs09ktTA91G
+lbddQhF3EGgEHZLR7cDYHYi7aSWkJpdNS1WXipDmH91C287tki7LVa/bD8Iugcm2
+3wIDAQAB
+-----END PUBLIC KEY-----
diff --git a/apache/attacker/ssl/request.csr b/apache/attacker/ssl/request.csr
new file mode 100644
index 0000000..578d71c
--- /dev/null
+++ b/apache/attacker/ssl/request.csr
@@ -0,0 +1,17 @@
+-----BEGIN CERTIFICATE REQUEST-----
+MIICrzCCAZcCAQAwajELMAkGA1UEBhMCRlIxETAPBgNVBAgMCEJyZXRhZ25lMQ8w
+DQYDVQQHDAZWYW5uZXMxDzANBgNVBAoMBkVOU0lCUzEUMBIGA1UECwwLM0EgQ3li
+ZXJsb2cxEDAOBgNVBAMMB0t1cmlhbnQwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAw
+ggEKAoIBAQCdOL8sHJvggBasdF6wJGPpIf8/S4SDQItdBbFTJhigNtec9lA/ZAhD
+YXtH+9nMfCwsQTeHIpN2AA76MJRL7Jq9Y4wyiwLxkig4nfBbNuNqwbR4h7YxWP+w
+k5G7bLgG4PSq87lHLN06qF+1LzpacosT3U4+9zHMgPvm4907pNzBzae160Zsskwc
+22Ku+SFvto+sm4/WFqu/qqifOIjWeEsLEX8vPigDCuL7IBsldrxbkhH8UMRjigqj
+6SKYIjgmdFU2eFanCdFJazT2S1MD3UaVt11CEXcQaAQdktHtwNgdiLtpJaQml01L
+VZeKkOYf3ULbzu2SLstVr9sPwi6BybbfAgMBAAGgADANBgkqhkiG9w0BAQsFAAOC
+AQEAdCIKAKjz7Z0f8niI1IzaGT5FqcfxdzSaYE7Q3XCKROqDbECGcYauLQoz+MOV
+IBcJLibNgbA28u8Eb4oJjbxBt2mMywm41YnnKQOtbo5mOdO+W5AgFUsA/dK76Qoz
+agnF6DS8IYFHzcEfFEFayfb5/fHBR7erQwV7fMAD8aFe/Ej8utH8rRZPqAVxxM/J
+6sFXwntgbc9dcv0rV0u+boT1bw0MpLc/z4QDOSgpAlqqBL4pAGPw1Xc+3wsA8bfb
+LJDExEoX96GAdQREACp9U7kLJ3KxfC/8UCYDNoAUmWkeF3qxfL1PJmQqj4/9Lzn3
+DduAkqX71yJ5z21wRsTqlNsrWA==
+-----END CERTIFICATE REQUEST-----
diff --git a/apache/compose.yml b/apache/compose.yml
index dd92023..e02e651 100644
--- a/apache/compose.yml
+++ b/apache/compose.yml
@@ -11,15 +11,14 @@ services:
attacker:
build: ./attacker
container_name: attacker
- ports:
- - 5001:5001
networks:
- mynetwork
privileged: true
+ stdin_open: true
depends_on:
- webserver
victim:
- build: docker/victim
+ build: ./victim
container_name: victim
networks:
- mynetwork
@@ -30,4 +29,5 @@ services:
networks:
mynetwork:
- external: false
\ No newline at end of file
+ external: false
+
\ No newline at end of file
diff --git a/apache/victim/dockerfile b/apache/victim/dockerfile
index da0e39b..51c51b5 100644
--- a/apache/victim/dockerfile
+++ b/apache/victim/dockerfile
@@ -1,5 +1,5 @@
FROM debian:bookworm-slim
-RUN apt-get update && apt-get install -y curl python3 python3-pip \
+RUN apt-get update && apt-get install -y curl python3 python3-pip iputils-ping net-tools \
&& rm -rf /var/lib/apt/lists/*