Five virtual machines simulating a vulnerable enterprise environment, each demonstrating realistic security misconfigurations that exist in production networks.
When Business Beats Best Practice: MGR1 Configuration
Understanding AD Attack Vectors Through Intentional Misconfiguration
IIS Misconfigurations, MySQL Exposure, and Path to Domain Admin
Vulnerable executive workstation setup with verification scripts
Domain Controller misconfigurations and Active Directory setup
Vulnerable web server, IIS, and MySQL database configuration
Enterprise tactics and techniques mapped to Phase 1 vulnerabilities
Microsoft's official AD DS reference and best practices
Industry-standard Sysmon configuration for endpoint monitoring
Hypervisor configuration and NAT network setup reference
Microsoft Internet Information Services configuration and security
Database security best practices and configuration reference