Created
July 1, 2017 22:13
-
-
Save warewolf/23a2949ca64941f1fe0707749cf2235a to your computer and use it in GitHub Desktop.
Fedora/Red Hat Open vSwitch malware analysis segment "mirror" tunnel config
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # set remote_ip below to your cuckoo VM's management IP | |
| # set local_ip below to your VM server's management IP | |
| TYPE="OVSTunnel" | |
| OVS_TUNNEL_TYPE="gre" | |
| OVS_BRIDGE="malwarebr0" | |
| DEVICE="gremonitor0" | |
| OVS_TUNNEL_OPTIONS="options:remote_ip=192.168.2.100 options:local_ip=192.168.2.70" | |
| OVS_EXTRA="\ | |
| -- --id=@p get port gremonitor0 \ | |
| -- --id=@m create mirror name=m0 select-all=true output-port=@p \ | |
| -- set bridge malwarebr0 mirrors=@m" | |
| BOOTPROTO=none | |
| DEVICETYPE="ovs" | |
| ONBOOT="yes" |
Author
Author
On the receiving side (the cuckoo sandbox VM) you need to:
ip link add monitor0 type gretap remote 192.168.2.70 local 192.168.2.100 ttl 255 key 1
If you try to use ip tun, or ip link add monitor0 type gre you're gonna have a bad time.
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
The above as a plain shell script that does the same: