The Red Team Playground is a Dockerized vulnerable lab network for learning and practicing Red Teaming concepts. Hack, persist, pivot, command & control, loot, monitor, evade.
- Jump in the coversations on the Issues! Don't be shy :)
- Tip: run your ideas by the Issues threads before coding and creating PRs to avoid lost or duplicate work
Description | Completion |
---|---|
Add a few vulnerable hosts | 3/11/23 |
Add C2 - Metasploit, Sliver | 3/31/23 |
Add Wazuh monitoring | 5/4/2023 |
Automate "incident responders" | Planning |
- Vulnerable targets for practicing recon, exploitation, persistence, priv esc
- C2 infrastructure
- Defensive monitoring (monitoring dashboard + alerts, file integrity monitoring) to practice evasion, better understand IR
- TODO: include a "BlueBot" process that simulates a blue teamer w crontabs that restarts certain server processes every 5 mins (for practicing persistence), etc
- TODO: multiple networks for practicing lateral and pivoting internally and cloud* (fontend/backend, dmz, dummy aws metadata server, etc)
- Red Teamer game scenarios to emulate adversaries (access the customer database, hold the s3 bucket for ransom, run a miner for 10 mins without raising alerts, etc)
- Projects can be tracked and worked on as Issues
- Changes should be made on new branches and a PR submitted to merge into main, to be reviewed my minispooner
- Create a few game modes with various adversarial objectives
- Add in a few trainings on what it means to Red Team. Could be lessons then a lab/objective, etc
- http://localhost:8080/WebGoat/login
- Create account (admin1:admin1)