This repository contains a docker-compose.yaml
file that sets up a Network Security Toolkit with HAProxy, Wireshark, and Security Utilities. The provided docker-compose.yaml
file creates a custom Docker network and connects all services to it.
- proxy (HAProxy): A high-performance and highly-robust TCP/HTTP load balancer. The configuration file is mapped from the local
haproxy.cfg
file. - wireshark (ffeldhaus/wireshark): A Docker container running Wireshark with Xpra for remote access. It is connected to the proxy service and uses the same network.
- secutils (michaelborck/secutils): A Docker container containing various security utilities, including Wireshark, nmap, snort, hydra, nikto, wget, curl, ping, netcat, and sqlmap.. It is also connected to the custom network.
- Install Docker and Docker Compose.
- Clone this repository:
git clone https://github.com/yourusername/network-security-toolkit.git
- Change to the cloned directory:
cd network-security-toolkit
- Create and start the services with Docker Compose:
docker-compose up -d
- IP address: 192.168.1.2
- Port: 14500
- Configuration file:
./haproxy.cfg
- IP address: 192.168.1.3
- Access password: "wireshark"
- Captured files: Stored in the local
./caps
directory
- IP address: 192.168.1.5
- Port: 6080
- Username: root
- Password: rootpassword
- SSL: false
- Data directory: Mapped to the local
./data
directory
- Network name: custom_network
- Driver: bridge
- Subnet: 192.168.1.0/24
To stop and remove the services, use the following command:
docker-compose down
To access the Wireshark container remotely, follow these steps:
-
Open your web browser and go to
http://localhost:14500
. -
You will be prompted to enter the Xpra username and password. Use the following credentials:
- Username: wireshark
- Password: wireshark
-
After successful authentication, you will be able to access the Wireshark interface remotely.
Please note that the Wireshark container is connected to the proxy service, which listens on port 14500. Make sure the proxy service is up and running before attempting to connect to the Wireshark container.
There are two ways to connect to the Secutils container:
-
Open a PowerShell or terminal window.
-
Run the following command to access the Secutils container's Bash shell:
docker exec -it secutils bash
- You can now use the command line tools available within the container, such as Wireshark, nmap, snort, hydra, nikto, wget, curl, ping, netcat, and sqlmap.
-
Open your web browser and go to
http://localhost:6080
. -
Wait a few seconds for the graphical interface to load.
-
you will now have access to the Linux container's graphical interface, where you can use the available security tools.
Remember to ensure that the Secutils container is up and running before attempting to connect using either method.
This project is released under the MIT License. See the LICENSE file for details.