Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/Marshall-Hallenbeck/red_team_attack_lab
Red Team Attack Lab for TTP testing & research
https://github.com/Marshall-Hallenbeck/red_team_attack_lab
ansible hacking infosec lab penetration-testing pentesting red-team redteam security security-testing security-tools vagrant
Last synced: 3 months ago
JSON representation
Red Team Attack Lab for TTP testing & research
- Host: GitHub
- URL: https://github.com/Marshall-Hallenbeck/red_team_attack_lab
- Owner: Marshall-Hallenbeck
- License: gpl-3.0
- Created: 2021-08-12T19:55:10.000Z (about 3 years ago)
- Default Branch: main
- Last Pushed: 2023-05-15T21:17:05.000Z (over 1 year ago)
- Last Synced: 2024-06-06T20:01:21.059Z (5 months ago)
- Topics: ansible, hacking, infosec, lab, penetration-testing, pentesting, red-team, redteam, security, security-testing, security-tools, vagrant
- Language: PowerShell
- Homepage: https://github.com/Marshall-Hallenbeck/red_team_attack_lab
- Size: 1.5 MB
- Stars: 537
- Watchers: 19
- Forks: 75
- Open Issues: 2
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-hacking-lists - Marshall-Hallenbeck/red_team_attack_lab - Red Team Attack Lab for TTP testing & research (PowerShell)
README
# Red Team Attack Lab
Disclaimer: right now this is in a development state. This is also my first time really using Vagrant & Ansible.
## Description
A virtual environment with various realistic operating system and vulnerabilities for red teamers to play with
### Impetus
Every lab environment that I have come across (Splunk Attack Range, DetectionLab, etc)
has been heavily focused on blue team controls and/or only runs in cloud environments.As someone who doesn't want to pay extra money to host environments in AWS or Azure,
this was quite annoying, so I decided to hack together something that runs locally.My main focus is on setting up a red teamable environment either for testing the development of tools,
discovering new techniques, testing older TTPs, or staying up to date with the newest emerging threats.## Installation
### Linux
#### Dependencies
```
sudo apt-get update
sudo apt-get install -y linux-headers-generic vagrant virtualbox virtualbox-dkms
sudo apt install ansible
sudo gem install winrm-elevated
sudo gem install winrm
```
```
ansible-galaxy collection install community.windows chocolatey.chocolatey
vagrant plugin install vagrant-hostmanager vagrant-vbguest
```### Windows
See [Windows Setup](docs/windows_setup.md)## How to Run
### Full Build (may take ~2 hours!)
```
vagrant up
```
If a host fails to connect via WinRM after spinning up (intermittent issue), just re-run the provisioning via `vagrant provision $host`.### Specific Build
```
vagrant up dc01 win10-1 win10-dev kali
```
For full list of hosts see [hosts](docs/hosts.md)## Architecture
TODO: create architecture document...See [hosts](docs/hosts.md)
## Vulnerabilities
See [Vulnerabilities](docs/vulnerabilities.md)