Offensive Infrastructure with Modern Technologies
That's the reason why I decided to write this N-part blog post series, to record my "journey" and the lessons learned while building a secure, disposable, and completely automated infrastructure to be used in offensive operations.
I’m currently still in the middle of the process, so I will release the different sections as I go.
I would also like to get feedback from other professionals. Let me know if you find the information shared in this series useful, if something is missing, or if you have ideas on how to improve it.
This is the high-level outline of the different sections:
Introduction to the HashiCorp suite, and to Consul in particular.
- The HashiCorp Stack
- Consul as a Service Mesh
- The Hardware Prerequisites
- Consul - Basic Configuration
- Single Node Deployment
- Multi Node Deployment
- Consul - Hardened Configuration
- Running Consul as a Non-Privileged User
- Configuring Access Control Lists
- Enabling Gossip Encryption
- Enabling RPC Encryption with TLS
Step-by-step walkthrough that will allow you to automatically deploy the full HashiCorp stack with Ansible.
- High Level Design
- Multi Node (Physical) Deployment
- Logical Deployment of the HashiStack
- Environment Setup
- Code Structure
- Vagrant Setup
- Ansible Setup
- Core Components
- Core Component 1: Consul (+ dnsmasq)
- Core Component 2: Vault
- Core Component 3: Nomad (+ docker)
- Core Component 4: Traefik
- Sample Application