« prev :: next »

Connect to the hal9k-wifi WiFi Access Point. Then check your IP:

haxys@straylight:~$ ip a
3: wlp59s0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP group default qlen 1000
    link/ether 68:ec:c5:dd:3a:e2 brd ff:ff:ff:ff:ff:ff
    inet brd scope global dynamic noprefixroute wlp59s0
       valid_lft 7081sec preferred_lft 7081sec
    inet6 fe80::2c06:69cf:f0d0:1de7/64 scope link noprefixroute
       valid_lft forever preferred_lft forever

As you can see, we’ve been assigned an IP in the range, and if we ping, we can see we’re able to ping the OPNsense router:

haxys@straylight:~$ ping -c3
PING ( 56(84) bytes of data.
64 bytes from icmp_seq=1 ttl=64 time=2.04 ms
64 bytes from icmp_seq=2 ttl=64 time=7.17 ms
64 bytes from icmp_seq=3 ttl=64 time=83.2 ms

--- ping statistics ---
3 packets transmitted, 3 received, 0% packet loss, time 2003ms
rtt min/avg/max/mdev = 2.036/30.811/83.228/37.123 ms

On the host, you’ll want to disable auto-connect on enp2s0f0 and enp2s0f1, otherwise the host will also be available within the hacker lab.

Visit in a browser, and login with your root credentials. Start the configuration wizard.

  • Hostname: OPNsense-CORE
  • Domain: hal9k.lab
  • Primary DNS:
  • Secondary DNS:
  • Override DNS: Yes
  • Enable Resolver: Yes
  • Enable DNSSec Support: No
  • Harden DNSSec Data: No
  • Time info: Defaults
  • Block RFC1918 Private Networks: No
  • Block bogon networks: No
  • Keep password the same.

Once it’s all configured, reload. Next, install any updates that may be available. This may take a few repetitions. Then, go ahead and shut down the system via the RDP connection. Create a new snapshot called “Interfaces Configured.”

« prev :: next »