
Pentest Lab
#Security Testing#Offensive Security
Inceptor is a template-driven framework for evading Anti-Virus and Endpoint Detection and Response solutions, allowing users to create custom evasion techniques and test their security controls.
This Local Pentest Lab Utilizes Docker Compose for Testing
This local pentest lab utilizes Docker Compose to launch multiple victim services alongside an attacker service that runs Kali Linux. The first time you run this lab, it may take a while to download all the necessary Docker images.
Executed commands:
- ./lab.sh --help
- ./lab.sh --check-dependencies
- ./lab.sh --up --all-services
- ./lab.sh --info
- ./lab.sh --overview all
- ssh root@kali -o "UserKnownHostsFile /dev/null"
- ./lab.sh --down
The Lab Setup Instructions
The lab should function properly right away if all necessary dependencies are installed. Upon startup, the lab will perform a check to ensure that all dependencies are met.
To start the lab, follow these steps:
- git clone https://github.com/oliverwiegers/pentest_lab
- cd pentest_lab
- ./lab.sh -u
By default, the lab will initiate all victim services along with one red team service. Additional services can also be started and added as needed. More details on this are provided below.
For Additional Usage Information, Consider
For additional usage information, you may want to read the help message displayed by running ./lab.sh -h or --help.
Dependencies:
- bash
- find
- sed
- yq (Please note: use the Python version, not yq-go.)
- docker
- docker-compose
The lab features an integrated
The lab features an integrated dependency check that is executed automatically.