WebApp Firewall Simulator

By Patrik Mjartan

Instructions

The "outsider" on the left represents an attacker outside of the network you are administering. The "insider" on the right represents a computer inside the network you are tasked with protecting. Both terminals will respond to a subset of the commands associated with iptables, nmap, and ipconfig. For more details about the project please see the Thesis.

Starter Commands

Below are a small set of commands to get you started:
  1. Insider: Type ipconfig into the insider's terminal to learn what its IP address is.
  2. Outsider: In the outsider terminal run nmap -p 80 [Insider IP address] to find out if port 80, which is commonly used by internet connections, is open.
  3. Insider: Close port 80 by typing iptables -A INPUT -dport 80 -j DROP
  4. Outsider: Run nmap -p 80 [Insider IP address] again to see if you have successfully closed the port.
  5. Outsider: Change the outsider's IP so they can test from a different location. set ip 166.155.72.10, this is not a standard linux command, but is very handy for our WebApp.