Pentest Lab

Pentest Lab

#Security Testing#Offensive Security

Inceptor is a template-driven framework for evading Anti-Virus and Endpoint Detection and Response solutions, allowing users to create custom evasion techniques and test their security controls.

Visit Website

This Local Pentest Lab Utilizes Docker Compose for Testing

This local pentest lab utilizes Docker Compose to launch multiple victim services alongside an attacker service that runs Kali Linux. The first time you run this lab, it may take a while to download all the necessary Docker images. Executed commands: - ./lab.sh --help - ./lab.sh --check-dependencies - ./lab.sh --up --all-services - ./lab.sh --info - ./lab.sh --overview all - ssh root@kali -o "UserKnownHostsFile /dev/null" - ./lab.sh --down

The Lab Setup Instructions

The lab should function properly right away if all necessary dependencies are installed. Upon startup, the lab will perform a check to ensure that all dependencies are met. To start the lab, follow these steps: - git clone https://github.com/oliverwiegers/pentest_lab - cd pentest_lab - ./lab.sh -u By default, the lab will initiate all victim services along with one red team service. Additional services can also be started and added as needed. More details on this are provided below.

For Additional Usage Information, Consider

For additional usage information, you may want to read the help message displayed by running ./lab.sh -h or --help. Dependencies: - bash - find - sed - yq (Please note: use the Python version, not yq-go.) - docker - docker-compose

The lab features an integrated

The lab features an integrated dependency check that is executed automatically.