Skip to content

Terraform setup for hackazon, dvwa and juice shop on AWS EC2.

Notifications You must be signed in to change notification settings

kentatwabbi/terraform_hacking_lab

 
 

Repository files navigation

General

For more information about this project have a look at my blog.

Infrastructure as Code: Setting up a web application penetration testing laboratory

Requirements

Setup

  1. Create a variables.tf file.
  2. Copy example Content in Variables file. Enter your own access and secret key and change instance size preferences.
  3. Enter the name of your Aws EC2 SSH key name. If you are on windows you can also enter the path to the SSH key for a convenient putty command to directly connect to the instance.
  4. Execute terraform init
  5. Execute terraform apply

variables.tf file:

variable "aws_access_key" {
  default = "D0NTPV5HCR3DST0G1THVB"
}
variable "aws_secret_key" {
  default = "D0NTPV5HCR3DST0G1THVB"
}
variable "aws_region" {
  default = "eu-central-1"
}
variable "ssh_key_path" {
  default = "C:/Users/...."
}
variable "instance_type" {
  default = "t2.large"
}
variable "ssh_key_name" {
  default = "terraform-key"
}
variable "ip_whitelist" {
  default = ["1.3.3.7/32"]
}

More vulnerable Containers:

https://hub.docker.com/r/hmlio/vaas-cve-2014-6271/

https://hub.docker.com/r/hmlio/vaas-cve-2014-0160/

https://hub.docker.com/r/opendns/security-ninjas/

https://hub.docker.com/r/danmx/docker-owasp-webgoat/

https://github.com/owasp/nodegoat#option-3---run-nodegoat-on-docker

https://hub.docker.com/r/citizenstig/nowasp/

https://github.com/bkimminich/juice-shop#docker-container--

https://github.com/vulhub/vulhub

About

Terraform setup for hackazon, dvwa and juice shop on AWS EC2.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • HCL 90.0%
  • Shell 10.0%