Compare commits

...

2 commits

Author SHA1 Message Date
iMax
92cccd1799 Merge branch 'main' of git.leizour.fr:CyberFlingues/arp-spoofing into main 2025-01-21 11:56:28 +01:00
iMax
f49eab2731 [Abandon Partie 1] 2025-01-21 11:56:00 +01:00
14 changed files with 305 additions and 6 deletions

View file

@ -7,6 +7,7 @@ FROM debian:bookworm-slim
RUN apt-get update && apt-get install -y apache2 openssl ca-certificates net-tools\
&& rm -rf /var/lib/apt/lists/* \
&& a2enmod ssl && a2ensite default-ssl
COPY 000-default.conf /etc/apache2/sites-available/000-default.conf
COPY default-ssl.conf /etc/apache2/sites-available/default-ssl.conf
COPY --from=build /app/dist /var/www/html

View file

@ -0,0 +1,29 @@
<VirtualHost *:80>
# The ServerName directive sets the request scheme, hostname and port that
# the server uses to identify itself. This is used when creating
# redirection URLs. In the context of virtual hosts, the ServerName
# specifies what hostname must appear in the request's Host: header to
# match this virtual host. For the default virtual host (this file) this
# value is not decisive as it is used as a last resort host regardless.
# However, you must set it for any further virtual host explicitly.
#ServerName www.example.com
ServerAdmin webmaster@localhost
Redirect permanent / https://localhost/
# Available loglevels: trace8, ..., trace1, debug, info, notice, warn,
# error, crit, alert, emerg.
# It is also possible to configure the loglevel for particular
# modules, e.g.
#LogLevel info ssl:warn
ErrorLog ${APACHE_LOG_DIR}/error.log
CustomLog ${APACHE_LOG_DIR}/access.log combined
# For most configuration files from conf-available/, which are
# enabled or disabled at a global level, it is possible to
# include a line for only one particular virtual host. For example the
# following line enables the CGI configuration for this host only
# after it has been globally disabled with "a2disconf".
#Include conf-available/serve-cgi-bin.conf
</VirtualHost>

View file

@ -0,0 +1,132 @@
<IfModule mod_ssl.c>
<VirtualHost _default_:443>
ServerAdmin webmaster@localhost
DocumentRoot /var/www/html
# Available loglevels: trace8, ..., trace1, debug, info, notice, warn,
# error, crit, alert, emerg.
# It is also possible to configure the loglevel for particular
# modules, e.g.
#LogLevel info ssl:warn
ErrorLog ${APACHE_LOG_DIR}/error.log
CustomLog ${APACHE_LOG_DIR}/access.log combined
# For most configuration files from conf-available/, which are
# enabled or disabled at a global level, it is possible to
# include a line for only one particular virtual host. For example the
# following line enables the CGI configuration for this host only
# after it has been globally disabled with "a2disconf".
#Include conf-available/serve-cgi-bin.conf
# SSL Engine Switch:
# Enable/Disable SSL for this virtual host.
SSLEngine on
# A self-signed (snakeoil) certificate can be created by installing
# the ssl-cert package. See
# /usr/share/doc/apache2/README.Debian.gz for more info.
# If both key and certificate are stored in the same file, only the
# SSLCertificateFile directive is needed.
SSLCertificateFile /etc/ssl/certs/ssl-cert-snakeoil.pem
SSLCertificateKeyFile /etc/ssl/private/ssl-cert-snakeoil.key
# Server Certificate Chain:
# Point SSLCertificateChainFile at a file containing the
# concatenation of PEM encoded CA certificates which form the
# certificate chain for the server certificate. Alternatively
# the referenced file can be the same as SSLCertificateFile
# when the CA certificates are directly appended to the server
# certificate for convinience.
#SSLCertificateChainFile /etc/apache2/ssl.crt/server-ca.crt
# Certificate Authority (CA):
# Set the CA certificate verification path where to find CA
# certificates for client authentication or alternatively one
# huge file containing all of them (file must be PEM encoded)
# Note: Inside SSLCACertificatePath you need hash symlinks
# to point to the certificate files. Use the provided
# Makefile to update the hash symlinks after changes.
#SSLCACertificatePath /etc/ssl/certs/
#SSLCACertificateFile /etc/apache2/ssl.crt/ca-bundle.crt
# Certificate Revocation Lists (CRL):
# Set the CA revocation path where to find CA CRLs for client
# authentication or alternatively one huge file containing all
# of them (file must be PEM encoded)
# Note: Inside SSLCARevocationPath you need hash symlinks
# to point to the certificate files. Use the provided
# Makefile to update the hash symlinks after changes.
#SSLCARevocationPath /etc/apache2/ssl.crl/
#SSLCARevocationFile /etc/apache2/ssl.crl/ca-bundle.crl
# Client Authentication (Type):
# Client certificate verification type and depth. Types are
# none, optional, require and optional_no_ca. Depth is a
# number which specifies how deeply to verify the certificate
# issuer chain before deciding the certificate is not valid.
#SSLVerifyClient require
#SSLVerifyDepth 10
# SSL Engine Options:
# Set various options for the SSL engine.
# o FakeBasicAuth:
# Translate the client X.509 into a Basic Authorisation. This means that
# the standard Auth/DBMAuth methods can be used for access control. The
# user name is the `one line' version of the client's X.509 certificate.
# Note that no password is obtained from the user. Every entry in the user
# file needs this password: `xxj31ZMTZzkVA'.
# o ExportCertData:
# This exports two additional environment variables: SSL_CLIENT_CERT and
# SSL_SERVER_CERT. These contain the PEM-encoded certificates of the
# server (always existing) and the client (only existing when client
# authentication is used). This can be used to import the certificates
# into CGI scripts.
# o StdEnvVars:
# This exports the standard SSL/TLS related `SSL_*' environment variables.
# Per default this exportation is switched off for performance reasons,
# because the extraction step is an expensive operation and is usually
# useless for serving static content. So one usually enables the
# exportation for CGI and SSI requests only.
# o OptRenegotiate:
# This enables optimized SSL connection renegotiation handling when SSL
# directives are used in per-directory context.
#SSLOptions +FakeBasicAuth +ExportCertData +StrictRequire
<FilesMatch "\.(cgi|shtml|phtml|php)$">
SSLOptions +StdEnvVars
</FilesMatch>
<Directory /usr/lib/cgi-bin>
SSLOptions +StdEnvVars
</Directory>
# SSL Protocol Adjustments:
# The safe and default but still SSL/TLS standard compliant shutdown
# approach is that mod_ssl sends the close notify alert but doesn't wait for
# the close notify alert from client. When you need a different shutdown
# approach you can use one of the following variables:
# o ssl-unclean-shutdown:
# This forces an unclean shutdown when the connection is closed, i.e. no
# SSL close notify alert is send or allowed to received. This violates
# the SSL/TLS standard but is needed for some brain-dead browsers. Use
# this when you receive I/O errors because of the standard approach where
# mod_ssl sends the close notify alert.
# o ssl-accurate-shutdown:
# This forces an accurate shutdown when the connection is closed, i.e. a
# SSL close notify alert is send and mod_ssl waits for the close notify
# alert of the client. This is 100% SSL/TLS standard compliant, but in
# practice often causes hanging connections with brain-dead browsers. Use
# this only for browsers where you know that their SSL implementation
# works correctly.
# Notice: Most problems of broken clients are also related to the HTTP
# keep-alive facility, so you usually additionally want to disable
# keep-alive for those clients, too. Use variable "nokeepalive" for this.
# Similarly, one has to force some clients to use HTTP/1.0 to workaround
# their broken HTTP/1.1 implementation. Use variables "downgrade-1.0" and
# "force-response-1.0" for this.
# BrowserMatch "MSIE [2-6]" \
# nokeepalive ssl-unclean-shutdown \
# downgrade-1.0 force-response-1.0
</VirtualHost>
</IfModule>

View file

@ -7,9 +7,13 @@ COPY ./index1.html /var/www/html/
RUN apt-get update && apt-get install -y dsniff net-tools apache2 \
&& rm -rf /var/lib/apt/lists/* \
&& a2enmod ssl && a2ensite default-ssl \
&& apache2ctl start
COPY 000-default.conf /etc/apache2/sites-available/000-default.conf
COPY default-ssl.conf /etc/apache2/sites-available/default-ssl.conf
# CMD ["arpspoof", "-i", "eth0", "-t", "172.21.0.4", "-r", "172.21.0.3"]
# arpspoof -i eth0 -t 172.21.0.4 -r 172.21.0.3
CMD ["arpspoof", "-i", "eth0", "-t", "webserver", "-r", "webserver"]

View file

@ -0,0 +1,22 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View file

@ -0,0 +1,28 @@
-----BEGIN PRIVATE KEY-----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-----END PRIVATE KEY-----

View file

@ -0,0 +1 @@
0385B4255453463D21169C944EB49D2A1F444E2A

View file

@ -0,0 +1,20 @@
-----BEGIN CERTIFICATE-----
MIIDWzCCAkMCFAOFtCVUU0Y9IRaclE60nSofRE4qMA0GCSqGSIb3DQEBCwUAMGox
CzAJBgNVBAYTAkZSMREwDwYDVQQIDAhCcmV0YWduZTEPMA0GA1UEBwwGVmFubmVz
MQ8wDQYDVQQKDAZFTlNJQlMxFDASBgNVBAsMCzNBIEN5YmVybG9nMRAwDgYDVQQD
DAdLdXJpYW50MB4XDTI1MDEyMTEwNDE1NloXDTI2MDEyMTEwNDE1NlowajELMAkG
A1UEBhMCRlIxETAPBgNVBAgMCEJyZXRhZ25lMQ8wDQYDVQQHDAZWYW5uZXMxDzAN
BgNVBAoMBkVOU0lCUzEUMBIGA1UECwwLM0EgQ3liZXJsb2cxEDAOBgNVBAMMB0t1
cmlhbnQwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCdOL8sHJvggBas
dF6wJGPpIf8/S4SDQItdBbFTJhigNtec9lA/ZAhDYXtH+9nMfCwsQTeHIpN2AA76
MJRL7Jq9Y4wyiwLxkig4nfBbNuNqwbR4h7YxWP+wk5G7bLgG4PSq87lHLN06qF+1
LzpacosT3U4+9zHMgPvm4907pNzBzae160Zsskwc22Ku+SFvto+sm4/WFqu/qqif
OIjWeEsLEX8vPigDCuL7IBsldrxbkhH8UMRjigqj6SKYIjgmdFU2eFanCdFJazT2
S1MD3UaVt11CEXcQaAQdktHtwNgdiLtpJaQml01LVZeKkOYf3ULbzu2SLstVr9sP
wi6BybbfAgMBAAEwDQYJKoZIhvcNAQELBQADggEBAApJOGyqh38EI/rDoe8/8zC5
AfO0X9fPNNrYpZhHwHepiZUyv0dLk1E0jvsKX0UWlSbuDuD1fzcEglFl8jm4z8lV
16n9ZC/lQptjJso0FRbR6JMSRsFvS5lPlytnfY7VETI2jvbBDHxknqmyzKM7WM4Y
xQSc03XPBClyQ3ut+Tb+5co+G4Rq5CYx2bI9snnmTC9S/4EeN0vVZORd3hyP9cII
YsYKcqO1czexfoT4kaXghUB2Q4v0kBJe9wSWM8Zzq6Ka3YVkqpa7tOTRTZKgSfyO
4rBAthzYqpu03WWACVQmXR+p0FQs/T82Ay8K+piWPsS5IjCY9uU+rSMhQyyOiuk=
-----END CERTIFICATE-----

View file

@ -0,0 +1,27 @@
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----

View file

@ -0,0 +1,9 @@
-----BEGIN PUBLIC KEY-----
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAnTi/LByb4IAWrHResCRj
6SH/P0uEg0CLXQWxUyYYoDbXnPZQP2QIQ2F7R/vZzHwsLEE3hyKTdgAO+jCUS+ya
vWOMMosC8ZIoOJ3wWzbjasG0eIe2MVj/sJORu2y4BuD0qvO5RyzdOqhftS86WnKL
E91OPvcxzID75uPdO6Tcwc2ntetGbLJMHNtirvkhb7aPrJuP1harv6qonziI1nhL
CxF/Lz4oAwri+yAbJXa8W5IR/FDEY4oKo+kimCI4JnRVNnhWpwnRSWs09ktTA91G
lbddQhF3EGgEHZLR7cDYHYi7aSWkJpdNS1WXipDmH91C287tki7LVa/bD8Iugcm2
3wIDAQAB
-----END PUBLIC KEY-----

View file

@ -0,0 +1,9 @@
-----BEGIN PUBLIC KEY-----
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAnTi/LByb4IAWrHResCRj
6SH/P0uEg0CLXQWxUyYYoDbXnPZQP2QIQ2F7R/vZzHwsLEE3hyKTdgAO+jCUS+ya
vWOMMosC8ZIoOJ3wWzbjasG0eIe2MVj/sJORu2y4BuD0qvO5RyzdOqhftS86WnKL
E91OPvcxzID75uPdO6Tcwc2ntetGbLJMHNtirvkhb7aPrJuP1harv6qonziI1nhL
CxF/Lz4oAwri+yAbJXa8W5IR/FDEY4oKo+kimCI4JnRVNnhWpwnRSWs09ktTA91G
lbddQhF3EGgEHZLR7cDYHYi7aSWkJpdNS1WXipDmH91C287tki7LVa/bD8Iugcm2
3wIDAQAB
-----END PUBLIC KEY-----

View file

@ -0,0 +1,17 @@
-----BEGIN CERTIFICATE REQUEST-----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-----END CERTIFICATE REQUEST-----

View file

@ -11,15 +11,14 @@ services:
attacker:
build: ./attacker
container_name: attacker
ports:
- 5001:5001
networks:
- mynetwork
privileged: true
stdin_open: true
depends_on:
- webserver
victim:
build: docker/victim
build: ./victim
container_name: victim
networks:
- mynetwork
@ -30,4 +29,5 @@ services:
networks:
mynetwork:
external: false
external: false

View file

@ -1,5 +1,5 @@
FROM debian:bookworm-slim
RUN apt-get update && apt-get install -y curl python3 python3-pip \
RUN apt-get update && apt-get install -y curl python3 python3-pip iputils-ping net-tools \
&& rm -rf /var/lib/apt/lists/*