Главная
Study mode:
on
1
Intro
2
Outline
3
Disclaimers
4
Introduction
5
My Motto: Cheat
6
Target Audience
7
If you have the hardware
8
If you have the money
9
Top Level Plan
10
Hardware Specs
11
Operating Systems
12
Basic Scripting
13
First Big Decision: The Internet
14
Apache and Virtual Interfaces
15
Scripting the Conf File
16
Dynamic Websites
17
Fail Story
18
Simulating Web Requests
19
Lab Practice
20
Putting it al Together
21
Part 2
22
NMAP and Ports
23
TCPDUMP (VM1)
24
Wireshark
25
Simple Things to Add
26
Random Protocols
27
DNS
28
File Forensics
29
Automating Kali
30
Other Resources
31
Developing an Offensive Range......
32
Stick with the Theme!
33
Advance Options
34
Layer 2
35
VPNs
36
Devices/pF sense
37
Challenges
38
Contact Info and Questions
Description:
Explore a comprehensive guide on constructing a cost-effective cyber training range. Learn about hardware specifications, operating systems, basic scripting, and crucial decisions regarding internet connectivity. Discover techniques for setting up Apache servers with virtual interfaces, creating dynamic websites, and simulating web requests. Delve into network analysis tools like NMAP, TCPDUMP, and Wireshark, while exploring additional features such as DNS configuration and file forensics. Gain insights on automating Kali Linux, developing offensive ranges, and implementing advanced options like Layer 2 networking and VPNs. Perfect for cybersecurity enthusiasts and professionals looking to build practical, budget-friendly training environments.

Building a Cyber Training Range on a Budget

Add to list
0:00 / 0:00