-
Notifications
You must be signed in to change notification settings - Fork 5
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
824ba41
commit 118c0f9
Showing
5 changed files
with
34 additions
and
0 deletions.
There are no files selected for viewing
Binary file not shown.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Original file line | Diff line number | Diff line change |
---|---|---|---|
@@ -1,2 +1,31 @@ | |||
# PT-Environment | # PT-Environment | ||
Local penetration test experimental environment | Local penetration test experimental environment | ||
|
|||
## What's this | |||
|
|||
This is a Network topology designed by Cisco Packet Tracer in my own laptop. | |||
|
|||
## Why do this | |||
|
|||
In the daily APT attack and defense and penetration testing process, we will encounter a very complicated internal network environment(maybe the Windows AD environment), we need to ensure that there will be no leakage before some actual operations. | |||
|
|||
So, I used the VMware workstation to build this whole experimental environment in my laptop. | |||
|
|||
This is just a simple topology and design file. After that, I will write about the specific configuration process and details when I am free. | |||
|
|||
This project has no technical content, just an archive of its own learning knowledge process. | |||
|
|||
## What it looks like now | |||
|
|||
![Network topology](maps/Network-topology.jpg) | |||
|
|||
|
|||
## In the future | |||
|
|||
I did a "Cyber Range" project at the university, mainly for cyber security teaching and training. At that time, it was all the systems built with a VMware Esxi server with 200G memory. The system system at that time was as follows: | |||
|
|||
![CTF-Platform-Diagram](maps/CTF-Platform-Diagram.bmp) | |||
|
|||
Personally, in fact, the "network shooting range" is an important network security infrastructure for individuals, organizations, companies and even the country. A good shooting range can be a good experimental network environment and exercise offensive and defensive techniques. | |||
|
|||
Maybe in the future, the above shooting range will be done again and become a real enterprise product. |
Binary file not shown.
File renamed without changes
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Original file line | Diff line number | Diff line change |
---|---|---|---|
@@ -0,0 +1,5 @@ | |||
# The release note | |||
|
|||
### 2019.06.23 | |||
1. add the basic version. | |||
2. add the README. |