Skip to content
Glenn Pegden edited this page May 6, 2024 · 3 revisions

Welcome to the RetroNetSec wiki!

RetroNetSec is a project designed to make it easy to spin up vintage Operating Systems and demonstrate security vulnerabilities between them.

The entire thing is dockerised, allowing you to spin-up machines trivially (though spinning up multiple of the same machine may not works as sometimes hosts and IPs are preconfigured (though we try to avoid that where possible).

All the hosts are available via vnc on unique ports (check docker-compose.yml for which are on which post)

Unless you are running some very serious hardware, it's not expected that you use docker-compose to spin up all hosts, just the one or two you need.

Special Hosts

DHCP Host

Hosts that get their IP via dhcp will start at 10.0.2.15

Static Hosts

  • 10.0.2.2 - VDE Switch - Software-defined network switch that almost all hosts connect to for networking.
  • 10.0.2.11 - SMB/FTP Server - Containing lots of tools, malware, utils etc.

Attacks Tested/Supported

Here is a list of all the attacks attacks and supported

More Info

FAQ

Clone this wiki locally