~CappettainAWS Cyber RangeCVE-2020–1472 | Netlogon Elevation of Privilege Exposure ResearchPurple-Team w/ Splunk’s Attack RangeSep 21, 20201Sep 21, 20201
~CappettainAWS Cyber RangeOrchid/OXT — The VPNaaS for Cyber Researcher’sCreating a Multi-Hop VPN connection in 3 minutes…Aug 31, 2020Aug 31, 2020
~CappettainAWS Cyber RangeCommandCenter (c2) 101 — Iterating through the Cyber Range Life-CycleAbout 1 month ago, I released the CommandCenter (c2) Docker container. Since then I have been working with a select group of individuals…Jul 29, 2020Jul 29, 2020
~CappettainAWS Cyber RangeBuilding an On-Site Cyber Rangew/ 2CPU, 128GB Memory, & 6TB of RAID-10 StorageJul 20, 2020Jul 20, 2020
~CappettainAWS Cyber RangeAWSCyberRange — CommandCenter (c2) released to DockerHubLaunch & Manage your AWSCyberRange with ease…Jun 28, 20201Jun 28, 20201
~CappettainAWS Cyber RangeDesktop Tools -4- LinuxOpen-Source, OS alternatives, & free / edu licensesMar 26, 2020Mar 26, 2020
~CappettainAWS Cyber RangeSecDevOps 101 —Strengthen the BasicsSearch for foundational knowledge hereMar 24, 2020Mar 24, 2020
~CappettainAWS Cyber RangeStep 4 — AttackAfter enumeration you want to attack a target. Enumeration is the most important step as it will help you make an educated guess about the…Mar 20, 2020Mar 20, 2020
~CappettainAWS Cyber RangeStep 2 — Building the Cyber Range w/ TerraformThis next step greatly simplified by using the project’s makefile. We can simply execute make cyberRange to create the entire CyberRange…Mar 20, 2020Mar 20, 2020
~CappettainAWS Cyber RangeStep 3 — Log into Kali & EnumerateNow that you have your Cyber Range up, you need to start using the tools to enumerate the network, collect data, and understand the…Mar 20, 2020Mar 20, 2020