Skip to content

agorecki/AnalysisLab

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

17 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Required Tools

Tool Link
Vagrant https://www.vagrantup.com/downloads.html
Packer https://packer.io/downloads.html
Virtualbox https://www.virtualbox.org/wiki/Downloads
VMWare Fusion (coming soon) -

Preliminary required tasks before starting

  • Clone the GitHub repository via the GitHub website or via the Git client (if installed)
  • Download and install Vagrant
  • Download Packer and move the binary to your Packer folder
  • Download and install Virtualbox

Building the Virtual Machine

Move into our working directory.

$ cd AnalysisBuild/Packer

Now we build and configure the VM. This will download the Win10 ISO from Microsoft, boot it, and install the necessary tools to configure it. This will take a couple hours so do not feel the need to watch it. Red text may display showing errors but it will handle those by itself. If the are fatal errors the operation will stop and display the reason

$ chmod +x ./packer

$ ./packer build --only=virtualbox-iso windows_10.json

Move the .box file into our new working directory

$ mv windows_10_virtualbox.box ../Boxes

Change to our Vagrant directory, import the virtual machine into Virtualbox, boot it, and run it with our Vagrant configuration

$ cd ../Vagrant

$ vagrant up

The default login is jsmith:jsmith

At this point you have a Windows 10 virtual machine with the following tools installed:

FireEye Flare

Sysinternal Suite

The license assigned to this VM is a 90 trial provided by Microsoft. Feel free to change the license to your own.

Credits:

https://github.com/clong/DetectionLab

About

Deploy a malware analysis lab using code via Packer & Vagrant

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published