Prerequisites

  1. Host setup: Host Environment Setup
  2. VM disk: attacker.qcow2 in /var/lib/libvirt/images/
  3. VM launched: sudo ./scripts/run_vms.sh

VM Access

  • IP: 192.168.200.11 (static)
  • Credentials: attacker / jules (auto-login)

Setup Method

Access URLs

Once deployed, access the C2 infrastructure at:

  • Web Interface: http://192.168.200.11:3000 (from host) or http://localhost:3000 (from attacker VM)
  • Landing Page: http://192.168.200.11:8080 (from host) or http://localhost:8080 (from attacker VM)

Configuration

Attacker VM Role

  • Builds rootkit: Compiles epirootkit.ko for victim
  • C2 server: Port 4444 (client connections)
  • Web interface: Port 3000 (operator access)
  • Landing page dropper: Port 8080 (dropper access)

Network

  • Attacker IP: 192.168.200.11
  • C2 port: 4444 (default)
  • Web UI: http://192.168.200.11:3000
  • Landing page dropper: http://192.168.200.11:8080

Next Steps

  1. Victim Setup: Deploy rootkit
  2. Monitor: Watch for client connections
  3. Control: Use CLI or Web UI