Skip to content

Hacking Lab that can be used to test or demonstrate Windows Active Directory lateral movement steps. The network and machines are deployed in AWS using Terraform using default Amazon AMIs. The vulnerabilities in the lab are then rolled out through user-data scripts (Powershell).

License

Notifications You must be signed in to change notification settings

rubengrootroessink/HackingLab

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Installation Instructions

Generate SSH key pair

ssh-keygen [-t {TYPEOFKEY}]

Copy your private SSH key to the Terraform folder

This is required as this key is necessary to upload some files to the gateway machine

Change the following variables (in variables.tf)

aws_access_key
aws_secret_key
aws_region (optional)
ssh_key_name (optional)
ssh_key_public_path (path to previously generated public key)
ssh_key_private_path (path to previously generated private key)

Install and deploy AWS lab using Terraform

sudo apt get install terraform
terraform init (in the correct folder)
terraform apply

Wait 20 minutes until the lab is deployed

Login into the Wireguard server

ssh -i {private SSH key} ubuntu@{public IP address}

Extract the file wireguard.conf and save it to your local machine as wg0.conf

sudo wg-quick up ~/wg0.conf

About

Hacking Lab that can be used to test or demonstrate Windows Active Directory lateral movement steps. The network and machines are deployed in AWS using Terraform using default Amazon AMIs. The vulnerabilities in the lab are then rolled out through user-data scripts (Powershell).

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published