I recently signed up for TryHackMe, a CTF-style online platform for learning cyber security, using hands-on exercises and labs. I prefer to use my own tooling (Kali) in a local virtual machine rather than the browser-based Attack Box. This requires an OpenVPN tunnel connection.
I discovered that while you can use Kali's default VPN client, you need to make a few configuration changes once you import your personalized .ovpn
configuration file.
Note: This assumes you have configured your LAN to use a private IP range of 192.168.0.0/16
which virtually all SoHo routers do. (If you've reconfigured your router to address in 10.0.0.0/8
you probably don't need this guide.)
Step 1 - Download & Import your Configuration File
Click the Network Connections menu in the quick launch bar (top right), choose VPN Connections > New, choose Import A Saved VPN Confiruation... and provide your <tryhackme-username>.ovpn
file.
Step 2 - Tweak Routes
Open the configuration's settings and choose the IPv4 Settings
Tab, and click Routes...
.
Check off Use this connection only for resources on its network
Without this, all traffic will pass over the VPN tunnel, which has the negative side-effect of blocking anything that isn't served from the TryHackMe 10.0.0.0/8
network.
Step 3 - Set tool scope
You could additionally set scope of tools like BurpSuite to TryHackMe's IP range:
Top comments (0)