The Capsulecorp Pentest is a small virtual network managed by vagrant and ansible. It contains five virtual machines, including one Linux attacking system running xubuntu and 4 Windows 2019 servers configured with various vulnerable services.
This project can be used to learn network penetration testing as a stand-alone environment but is ultimatly designed to compliment my book The Art of Network Penetration Testing
Why is this cool?
Setting up a virtual network to learn penetration testing can be tedious as well as time/resource consuming. Everything in the capsulecorp environment is pretty much done for you already. Once you get Vagrant, Ansible and VirtualBox installed on your machine you only need to run a couple of vagrant
commands to have a fully functioning Active Directory domain that you can use for hacking/learning/pentesting etc.
Current Functionality
goku.capsulecorp.local
vegeta.capsulecorp.local
gohan.capsulecorp.local
trunks.capsulecorp.local
tien.capsulecorp.local
vegeta
trunks
gohan
tien
Requirements
In order to use the Capsulecorp Pentest network you must have the following:
OSX Configuration
In order to manage Windows hosts you’ll have to install pywinrm
with pip inside the ansible virtual environment
source ~/ansible/bin/activate
pip install pywinrm
deactivate
Installation
For a detailed installation walkthrough check out the MacOS Setup Guide
Configure Windows Hosts
The first thing you should do is bring up and provision Goku the domain controller. This system will likely take the longest to bring up because the dcpromo stuff just takes a while.
vagrant up goku
vagrant provision goku
Repeat the above two commands for gohan, vageta and trunks.
…WARNING…
This section of the provision is expected to take a while because after a dcpromo it takes a long time for the system to reboot.
TASK [promotedc : Set a static address to 172.28.128.100] ********************** changed: [goku] TASK [promotedc : Change hostname to goku] ************************************* ok: [goku] TASK [promotedc : Install Active Directory Services] *************************** ok: [goku] TASK [promotedc : Promote goku to domain controller] *************************** changed: [goku] TASK [promotedc : Reboot after promotion] **************************************
Configure Your Pentest Platform
Bring up the virtual machines using vagrant. First cd into the project directory, for example: cd ~/capsulecorp-pentes
. Take note of the RDP port that gets forwarded to your localhost.
vagrant up pentest
Provision the pentest machine.
vagrant provision pentest
You can access your penitent machine either using your preferred RDP client to connect to the xrdp listener or via SSH with.
vagrant ssh pentest
Kali Linux 2024.4, the final release of 2024, brings a wide range of updates and…
This Go program applies a lifetime patch to PowerShell to disable ETW (Event Tracing for…
GPOHunter is a comprehensive tool designed to analyze and identify security misconfigurations in Active Directory…
Across small-to-medium enterprises (SMEs) and managed service providers (MSPs), the top priority for cybersecurity leaders…
The free and open-source security platform SecHub, provides a central API to test software with…
Don't worry if there are any bugs in the tool, we will try to fix…