WebApp Firewall Simulator
By Patrik Mjartan
The "outsider" on the left represents an attacker outside of the network you are administering. The "insider" on the right represents a computer inside the network you are tasked with protecting. Both terminals will respond to a subset of the commands associated with
. For more details about the project please see the Thesis
Below are a small set of commands to get you started:
- Insider: Type
ipconfig into the insider's terminal to learn what its IP address is.
- Outsider: In the outsider terminal run
nmap -p 80 [Insider IP address] to find out if port 80, which is commonly used by internet connections, is open.
- Insider: Close port 80 by typing
iptables -A INPUT -dport 80 -j DROP
- Outsider: Run
nmap -p 80 [Insider IP address] again to see if you have successfully closed the port.
- Outsider: Change the outsider's IP so they can test from a different location.
set ip 220.127.116.11, this is not a standard linux command, but is very handy for our WebApp.