avatar

Legacy

Infos

Author : VirtualSamurai

Level : Medium

Machines : 5

Network :

Description

Legacy is a vulnerable playground that simulates a real world enterprise network, implements common vulnerabilities and misconfigs and goes through the whole cyber kill chain (initial access, privilege escalation, lateral movement, defense evasion...)

This lab consists of :

- A fictional company "on-prem" Windows Active Directory domain
- 5 intentionally vulnerable machines
- 10 flags
- Antivirus and firewall

RoE (Rules of Engagement) :

- No password attacks expected
- Clean your stuff, do not leave any malwares/tools/files on the machines
- If you change something, reset it back to its initial state

Threat Model : 

You'll have to simulate an advanced persistent threat targeting the private industry using your own TTPs.

Breach Model : 

You only have a VPN config file to access the simulation network. You must find the target subnet by yourself.

Windows 1

Windows 1

Windows 2

Windows 2

Windows 2