Introduction

Welcome to the Overview of Cyber-Lab

Technologies included:

pfSense, Kali Linux, Windows, Docker, Portainer, Metasploitable, Proxmox

Network Architecture Plan

Lab Setup Instructions

Plan

  1. Installing pfSense Firewall
  2. Kali Linux for managing the firewall and conducting attacks
  3. Docker and Portainer for running vulnerable applications
  4. Metasploitable 2 as a vulnerable machine

Setup Overview

1. Configure pfSense Firewall

Purpose: Control and monitor all traffic within your lab network.

Instructions: Follow pfSense documentation to set up basic configurations such as interfaces, firewall rules, and NAT.

  1. Obtain pfSense ISO from the website
  2. Create a VM and install
pfSense Configuration
pfSense Configuration

2. Install Kali Linux

Purpose: Use Kali Linux as the main attack machine and for managing the pfSense firewall.

Instructions: Ensure Kali Linux is properly networked with pfSense and other lab components.

  1. Obtain Kali ISO from the Kali website
  2. Create a VM and install
  3. Test connection to the internet
Kali Linux Test
Kali Linux Test

3. Set Up Docker for Vulnerable Applications

Purpose: Use Docker to run vulnerable applications and services.

Instructions: Install Docker and pull the necessary vulnerable images.

  1. Create the Docker VM in Proxmox
  2. SSH into Docker VM through Kali
  3. Install Portainer as a Docker container
  4. Manage Portainer through port :9449
Portainer
Portainer SSH Install Portainer Web GUI

4. Install Metasploitable 2

Purpose: A pre-made vulnerable machine to understand and exploit common vulnerabilities.

Instructions: Ensure Kali Linux is properly networked with pfSense and other lab components.

  1. Create a VM without an image
  2. SSH into Proxmox, locate the VM files, and add the image to the configuration files
  3. Start the VM and finish configuration
  4. Test the finished install from the Kali machine
Metasploitable 2 Web Test
Metasploitable 2 Web Test