We'll create three containers, an Attacker, a Reverse-Proxy, and a Victim. 👹🤖🤔
We'll configure the reverse-proxy to serve a harmless website and proxy requests to our hidden attacker server. 😇😈
We'll use a RAT, a remote access tool, to control the victim. 🐀💀
We'll capture packets and analyze them. 🔍🤔
For more analyzing check out my TryHackMe Carnage room walkthrough!
Posts
- step #1 Creating Docker containers.
- step #2 Configuring servers.
- step #3 Creating a reverse-proxy.
- step #4 Adding SSL encryption.
- step #5 Time for RAT.
- step #6 Package capture.
- step #7 Running a scenario.
- step #8 Finish.