DarthSidious
  • Darth Sidious
  • GETTING STARTED
    • Getting started
    • External network access to Domain Admin
    • Intro to Windows hashes
  • Building a lab
    • Building a lab
    • Preparing Kali
    • Building a small lab
    • Building a lab with ESXI and Vagrant
    • Cuckoo malware analysis lab
  • Initial access
    • Password spraying
    • Initial access through exchange
  • ENUMERATION
    • Powershell
    • BloodHound
    • PowerView
    • Azure enumeration
  • Execution
    • Pass the hash
    • Responder with NTLM relay and Empire
    • DeathStar
    • CrackMapExec
  • Privilege escalation
    • Mimikatz
    • Token Impersonation
    • Juicy Potato
    • ALPC bug 0day
  • Defense evasion
    • Bypassing Applocker and Powershell contstrained language mode
    • From RDS app to Empire shell
    • Stealth
  • OTHER
    • Link encyclopedia
    • Writeups
      • lkylabs v1
    • War stories
      • Domain admin in 30 minutes
  • Credential access
    • Password cracking and auditing
  • Command & Control
    • SILENTTRINITY
Powered by GitBook
On this page
  • Mini lab for children
  • Big boy labs for big boys
  • Automated Lab
  1. Building a lab

Building a lab

PreviousIntro to Windows hashesNextPreparing Kali

Last updated 7 years ago

There are a few guides to building a lab in this book.

Mini lab for children

The first lab guide helps you set up a very small and simple lab consisting of a domain controller and a few workstations. The goal is to practice credential relaying using Responder and other fun tools.

Big boy labs for big boys

I have added an article for building a much bigger lab using ESXi and automating a lot of it with Vagrant. If you feel confident, brave and have a lot of time, go for this. It requires fundamental knowledge of setting up Active Directory and configuring Windows machines. It could be used as a companion lab for MCSA and MCSE certifications.

Automated Lab

I've been playing with for a while using Hyper-V. More to come!

AutomatedLab