- clone this repo locally with
(change
git clone --recurse-submodules [email protected]:koraynilay/simad && git submodule foreach 'git switch master || git switch main' && git submodule foreach git status | grep HEAD
[email protected]:koraynilay/simad
tohttps://github.com/koraynilay/simad
if using http auth) - use
ctf_scripts/user/setup_vuln.sh
(or clone this repo on the vulnbox, then rundeploy.sh
(or usesh <(curl -sL https://raw.githubusercontent.com/diunito/simad/main/deploy_clone.sh)
directly on the vulnbox))
- modify
DestructiveFarm/.env
based on what's the flag regex, the submission server, etc - modify path of
.env
instart_df.sh
- run
start_df.sh
- modify
tulip/.env
according to your necessities - modify
tulip/services/api/configurations.py
to include the vulnbox ip, the various services and their ports -
- modify path of
.env
instart_tulip.sh
- modify path of
- run
start_tulip.sh
- make a
.env
file withFIREGEX_PORT
andFIREGEX_PSWD
- change the path to the
.env
instart_firegex.sh
- run
start_firegex.sh
add these lines to your ~/.ssh/config
to not have to put the password everytime
Host your.vuln.ip
ControlMaster yes
ControlPath ~/.ssh/controlsocket-%h:%p:%r
ControlPersist 10h
or just copy your ssh key to the vuln (with ssh-copy-id
)