Usage

Raspwn emulates a vulnerable Linux web server. To use it just boot Raspwn then connect to RasPwn OS via WiFi.from your favorite pen-testing set-up. (We like Kali, ParrotS, BlackArch and Pentoo)

SSID - RasPwn OS
Password - In53cur3!

Once you have connected you can explore the 192.168.99.0/24 subnet and the *.playground.raspwn.org domain. The Raspwn Web Playground can be found at http://playground.raspwn.org (192.168.99.13)

Network services running in Raspwn OS include -

  • Bind (192.168.99.1, 192.168.99.10) - DNS Server
  • Postfix (192.168.99.18) - Mail Transfer Agent
  • Dovecot (192.168.99.18) - Mail Client Server
  • Samba (192.168.99.10) - Windows File Sharing Server
  • Apache2 (192.168.99.13) - Web Server
  • Nginx (192.168.99.7) - Web Server
  • MySQL Server (127.0.0.1) - Database Server
  • OpenSSH (92.168.99.1) - SSH server

Playground Web Applications

Intentionally Vulnerable Web Applications-

Out-Of-Date Web Applications

The admin account for web applications is -

user - admin <admin@playground.raspwn.org>
password - Pa55w0rd!

The Web applications exist in their own little Universe. Each gets it's DNS from Raspwn and all mail outgoing to the *@playground.raspwn.org is delivered to the local mail server at mail.playground.raspwn.org and can be retrieved via IMAP or viewed from a browser via Roundcube in the Playground. Everything from DNS to MTA to MySQL to Apache2 is already set up.

Two email accounts have been set up with the credentials -

IMAP/SMTP Server - <mail.playground.raspwn.org>

user 1 - <admin@playground.raspwn.org>
password - Pa55w0rd!

user 2 - <mrbill@playground.raspwn.org>
password - OhNoMrBill!

(More email accounts can be added too but that's a 'coming soon'.)

If you wish to customize RasPwn or play Red vs. Blue, you can logon locally or via SSH. The default credentials are:

user - pi
password - pwnme!

RasPwn images are put together from snapshots of Debian Linux. This allows us to create a vulnerable system image without breaking the system stability. The end effect is that RasPwn is a fly in amber. The current snapshot is http://snapshot.debian.org/archive/debian/20150203T222332Z/. By Default the system is headless. However, xorg can be installed via apt-get (in fact any package from the Debian snapshot repo can be installed.) Just connect eth0 to the internet (from behind a firewall of course) and do sudo apt-get install desired-package .

The current documentation is minimal (sorry) I'll be adding more as I can.

NOTE - It is possible to connect eth0 to the internet and use RasPwn as a (possibly the world's most insecure) wireless router however - IF YOU DO SO PLEASE DO SO FROM BEHIND NAT AND A FIREWALL! DO NOT EXPOSE ANY RASPWN INTERFACES DIRECTLY TO THE INTERNET OR FORWARD INTERNET TRAFFIC TO RASPWN IN ANY WAY!!!

WE ARE NOT KIDDING WHEN WE SAY INTENTIONALLY VULNERABLE.