Lab Building Series: Ep1

2 min read

Introduction to lab #

This lab project introduces provide hands-on experience in IT and cybersecurity. The series will cover building a network, breaking it with penetration tests, and then monitoring and defending against those attacks, all within a safe, controlled environment.

Lab Scenario and Topology: The lab is built around a fictional company, that needs its IT infrastructure. Key issues to be addressed include:

  • Lack of centralized resources, file shares, storage, backups, and security.
  • No user management.
  • Disorganized network with uncontrolled device connections.
  • Concerns about ransomware attacks and a desire for hardened, monitored, and defensible systems.
  • Hands-on Experience: You will gain practical skills in building networks, dealing with virtual machines, and administering systems.
  • Safe Environment: It provides a safe and controlled environment to learn how to break and defend systems without causing real-world damage.
  • Comprehensive Skill Set: By the end of the series, you will learn how to harden systems, conduct penetration testing (red teaming), and perform threat monitoring and analysis (blue teaming).
  • Industry Preparation: The skills taught, such as configuring firewalls, Active Directory, and DNS, are directly applicable to real-life industry scenarios.

The proposed network topology includes:

  • Virtual Servers:
    • Email server
    • Windows Server for Active Directory, Domain Controller, DNS, and file shares
    • Ubuntu Server for various services and tool testing
    • Elasticsearch stack for system monitoring and logging
  • Networking and Security:
    • Opnsense Next-Generation Firewall with Sensei feature extensions
  • Virtual Clients:
    • Windows 10 client for testing
    • Kali attack machine for launching attacks
  • All devices will be connected to a virtual layer 2 switch and virtualized using VirtualBox or other hypervisors like Hyper-V or VMWare. Future plans may include cloud integration and additional branch sites.

Key Learning Outcomes: By the end of the series, you will gain skills in:

  • Basic network configurations.
  • Configuring firewalls, servers, Active Directory, DNS, and user management.
  • Hands-on Windows and Linux server and client administration.
  • Hardening devices and networks.
  • Exposure to penetration testing tools and techniques.
  • Hands-on experience with blue team monitoring and defense against attacks.

All the best 🙂

Table of contents

Share This Article :

Leave a Reply

Your email address will not be published. Required fields are marked *