This is a joint webcast from Black Hills Information Security and Active Countermeasures.
How many of us have tried some new configuration option, utility, or hardware on a production environment, only to crash a critical piece of the business? (me raising hand…) It’s amazing how quickly we learn not to do that! Now we have to decide – do we stop trying out new things because we’re scared of causing problems, or do we come up with a safe way to play and learn?
We’re going to cover how to set up a Home Lab – an isolated environment where you can test new hardware, programs, and applications. By keeping this totally separate from everything else, you get free rein to play without risk to your other systems – and without risk of breaking any company policies!
We’ll cover how to set this up, the equipment needed, and how to configure these. Best of all, you can use throwaway hardware to do it!
Join the new Threat Hunting Community Discord discussion server: https://discord.gg/JmXpQFD
Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/09/SLIDES_HowToBuildHomeLab.pdf
0:00 – You’re In Charge
7:18 – The Network Layout
9:43 – (John’s Spaghetti)
20:38 – Project Hardware
26:06 – Firewall
29:21 – Switch
30:53 – Wireless AP
36:49 – Sentinel
38:33 – File and Drive Image Transfer
41:04 – Laberv
43:41 – Guinea Pigs
44:46 – John’s Setup Porn
46:44 – HELK
47:35 – Beaker
48:13 – Creating Evil
49:48 – Recording
50:14 – Incrementally Opening Up the Firewall
51:50 – Software
53:31 – Packet Capture
54:25 – Network Monitoring
55:09 – Scanning
56:12 – Disk Imaging
56:43 – On a Budget – What’s Critical
57:04 – Closing Notes
Check out our Cyber Range, not just a place to work through challenges and play, but also an open direct/hands-on training environment.
Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.