InfosecLabs

Infoseclabs 2.0

A penetration testing lab dedicated to researching & developing offensive and defensive security techniques. A bug hunting automation platform

 

Update

Originally this lab was built for the purpose of learning and teaching penetration testing. We had an awesome time and we learned a ton. The day has come that we must use the lab for a new purpose. With serious investment in both time and money we need to turn it into something that continues to be useful. The resources in the lab are primarily being used for our local group SDHackers.

 

Purpose

  • Researching and developing offensive and defensive techniques
  • Bug hunting
  • Automating tasks we do on a daily basis

 

In Progress

  • Building a Kubernetes cluster on ESXi to Dockerize bug hunting workloads
    -Creating API’s to automate the following for our Slack team:
    -Nmap scans
    -Burp Suite scans
    -Hash cracking

 

Version 1 (no longer in production)

 

Infoseclabs is a penetration testing lab designed and built  for the purpose of teaching, researching, and testing offensive & defensive security techniques. It features business grade networking, infrastructure , and many elements that you would find in a modern business.   This lab is maintained and upgraded frequently to accommodate new scenarios and expand it’s current features. For a list of features see below.

Network Diagram:

network diagram

 

Lab updates:

InfosecLabs Part 1

InfosecLabs Part 2

InfosecLabs Part 3

InfosecLabs Part 4

How does this work?

  • The public lab is a scaled down version of our private lab meant for learning  penetration testing through hands on
  • The private lab is reserved for private research and testing.
  • If you would like to build your own lab and have questions you can hit me up on twitter

 

Twitter:

If you have any questions about the lab please tweet to @infoseclabs or @IamtheHonz

Features of the lab:

  • Windows domain/services
  • Exchange 2013(fully functional)
  • Windows Server 2012 R2 Domain controller
  • Windows IIS
  • Windows 2008 R2 File Server
  • Windows Sharepoint Foundation 2013
  • Windows 10
  • Windows 8.1
  • Windows 7
  • Windows Vista
  • Windows XP
  • Varying Internet Explorer versions
  • Red Hat Linux
  • Web Servers(Linux)
  • OpenVAS
  • DMZ
  • Kali Linux
  • Security Onion
  • Metasploitable 2
  • Owasp Mutillidae
  • Hacking – the Art of Exploitation live cd
  • Pentesterlab web for pentesters I
  • Pentesterlab web for pentestters II
  • Pentesterlab from SQL injection to Shell
  • Custom vulnerable virtual machines