Skip to content
Snippets Groups Projects
user avatar
Boris LONJON authored
Wireguard server & client set up
Attacker VM with promiscuous mode on
eedf7641
History

Project logo

Wireguard Attack

Status Gitlab Issues GitHub Pull Requests License


This repository is a POC demonstrating the compromission of a Wireguard connection allowing to discover identity of a user.

📝 Table of Contents

🧐 About

Write about 1-2 paragraphs describing the purpose of your project.

🏁 Getting Started

These instructions will get you a copy of the project up and running on your local machine for development and testing purposes. See deployment for notes on how to deploy the project on a live system.

Prerequisites

You need to have VirtualBox installed on your machine along with Hashicorp Vagrant.

sudo apt install vagrant

Installing

A step by step series of examples that tell you how to get a development env running.

Say what the step will be

git clone https://gitlab.limos.fr/borlonjo/wireguard-attack.git
cd wireguard-attack

Now you can start VM using vagrant

vagrant up

End with an example of getting some data out of the system or using it for a little demo.

🎈 Usage

To connect to VM using ssh, you can issue :

vagrant ssh <vm_name>