Created
August 14, 2017 16:07
-
-
Save jbarnett-r7/1493776eec78f597d3fa968abd131d15 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# | |
# Cookbook:: metasploitable | |
# Recipe:: custom_build | |
# | |
# Copyright:: 2017, Rapid7, All Rights Reserved. | |
# | |
# | |
include_recipe 'metasploitable::ruby23' | |
include_recipe 'metasploitable::nodejs' | |
include_recipe #other user selected recipes as needed |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# -*- mode: ruby -*- | |
# vi: set ft=ruby : | |
Vagrant.configure("2") do |config| | |
config.vm.define "win2k8" do |win2k8| | |
# Base configuration for the VM and provisioner | |
win2k8.vm.box = "metasploitable3" | |
win2k8.vm.hostname = "metasploitable3" | |
win2k8.vm.communicator = "winrm" | |
win2k8.winrm.retry_limit = 60 | |
win2k8.winrm.retry_delay = 10 | |
win2k8.vm.network "private_network", type: "dhcp" | |
# Configure Firewall to open up vulnerable services | |
case ENV['MS3_DIFFICULTY'] | |
when 'easy' | |
config.vm.provision :shell, path: "scripts/configs/disable_firewall.bat" | |
else | |
win2k8.vm.provision :shell, path: "scripts/configs/enable_firewall.bat" | |
win2k8.vm.provision :shell, path: "scripts/configs/configure_firewall.bat" | |
end | |
# Insecure share from the Linux machine | |
win2k8.vm.provision :shell, path: "scripts/installs/install_share_autorun.bat" | |
win2k8.vm.provision :shell, inline: "rm C:\\tmp\\vagrant-shell.bat" # Hack for this bug: https://github.com/mitchellh/vagrant/issues/7614 | |
win2k8.vm.provision :shell, path: "scripts/installs/setup_linux_share.bat" | |
win2k8.vm.provision :shell, inline: "rm C:\\tmp\\vagrant-shell.bat" # Hack for this bug: https://github.com/mitchellh/vagrant/issues/7614 | |
end | |
config.vm.define "trusty" do |trusty| | |
trusty.vm.box = "rsginc/ubuntu64-14-04-1" | |
trusty.vm.hostname = "metasploitableUB" | |
trusty.vm.network "private_network", ip: '172.28.128.3' | |
trusty.vm.provider "virtualbox" do |v| | |
v.name = "MetasploitableUB" | |
v.memory = 2048 | |
end | |
config.omnibus.chef_version = :latest | |
# Provision with Chef Solo | |
# | |
config.vm.provision :chef_solo do |chef| | |
chef.cookbooks_path = [ 'chef/cookbooks' ] | |
chef.json = { 'metasploitable' => { | |
# Customizations here | |
} | |
} | |
chef.add_recipe "metasploitable::custom_build" | |
end | |
end | |
end |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment