Scenario 2 – that's no network, it's a space station
For this scenario, we will construct a penetration test environment that simulates a standard testing environment. It'll be a fairly simple setup with no pivoting required. I will refer to this one as the reporting range because realistically that's the best purpose for this setup. In order to gauge the reporting ability of your staff, run them though a similar setup and see what comes back.
The structure of the scenario, which is similar to the previous one, is broken down into the following:
- Network diagram
- Brief
- Setup
- Exploitation guide
- Variations
Network diagram
This scenario can feature as many or as few systems as you like. I'm going to use five to create a representative ...
Get Kali Linux CTF Blueprints now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.