Legacy is a vulnerable playground that simulates a real world enterprise network, implements common vulnerabilities and misconfigs and goes through the whole cyber kill chain (initial access, privilege escalation, lateral movement, defense evasion...)
This lab consists of :
- A fictional company "on-prem" Windows Active Directory domain
- 5 intentionally vulnerable machines
- 10 flags
- Antivirus and firewall
RoE (Rules of Engagement) :
- No password attacks expected
- Clean your stuff, do not leave any malwares/tools/files on the machines
- If you change something, reset it back to its initial state
Threat Model :
You'll have to simulate an advanced persistent threat targeting the private industry using your own TTPs.
Breach Model :
You only have a VPN config file to access the simulation network. You must find the target subnet by yourself.