This is a course created by Omar Santos. Numerous cybersecurity and penetration testing tools and techniques have the potential to damage or destroy the target system or the underlying network. In addition, if malware is used in testing, there is the potential for infection and spread if testing in an Internet-connected testbed. This class will teach how to build your own virtualized, physical, or cloud-based environment to practice your skills in a safe ecosystem.
You will learn what you need to create a lab for offensive and defensive cybersecurity concepts. You will also learn and obtain access to numerous tools that you can use to practice your skills, from virtual machines (VMs), Docker containers, and intentionally vulnerable systems. You will learn how you can leverage tools like Virtual Box, VMWare Workstation/Fusion, ESXi, Proxmox, or even OpenStack to build your own cyber range. In addition, you will also learn how to use tools like Vagrant and Ansible to automate a lot of tasks. Vagrant files and Ansible playbooks will be shared during the class for you to build complex lab environments within minutes. You will also learn how to create environments in cloud services such as AWS, Azure, Google Cloud, and Digital Ocean.
This course is designed for anyone preparing for a certification like Certified Ethical Hacker (CEH), CompTIA PenTest+, CEH Practical, Offensive Security Certified Professional (OSCP), Cisco CCIE Security, CCNP Security. It is also designed to help those just learning how to perform penetration testing (ethical hacking), exploit development, or reverse engineer malware.
This is an all-in-one virtual machine built on top of Kali Linux + extra tools + several vulnerable applications running in Docker containers. This standalone VM designed for you to practice your skills in a safe environment.
Download WebSploit Full here.
Ubuntu Server + vulnerable containers. Choose this VM if you already have Kali Linux (or any other penetration testing distribution) and just want to run the vulnerable containers separately.
Download WebSploit Lite here.
If you already have a pen testing environment like Kali, Parrot Security, and Black Arch, you can download and run this script to setup your own WebSploit environment. The script will automatically install Docker and all the underlying containers and tools.
username: root
password: toor
username: websploit
password: websploit
Topics include: Ethical hacking (penetration testing); digital forensics and Digital Forensics and Incident Response (DFIR); threat hunting; malware analysis; reverse engineering; and more.
Stay in Touch with Omar!