OpenVPN for home use I run DD-WRT on my home router. It’s great enough and does what I need. I run a VPN on it so I can connect from untrusted networks. My threat model doesn’t include my ISP or t...
Well life catches up with you fast I guess. I haven’t posted any updates because I was posting as I was building and I hit a roadblock. I’ll first talk about that in case Google gets you here while...
I decided to run a Docker swarm at home because I thought it would be useful to know how to do and didn’t really appreciate what I was getting into when I started it all. Despite the current them o...
I’ve been using Ansible a little bit now and while it has a very easy learning curve, there’s some finer points I had some trouble figuring out. I’m still not the best with it, but being barely fun...
I got distracted. I’ve done quite a bit of work on the incident response type lab I’ve been working on, but I also got interested in Docker and Docker Swarm. I’ve built that and it works so I figur...
Building a home lab Part 2 - Networking Some More So now we have some hardware and some virtualization hosts set up. Now you can set up your firewall. There are a few things we can do to make this...
Proxmox is an open source virtualization solution and a really flexible base for a home lab. This guide will walk through building a simple 2 node proxmox cluster. My deployment tools are ansible a...
Cause everyone posts one If enumeration is the bread and butter of penetration testing, reverse shells are the cheesecake. Stolen usernames and passwords may be one of the most reliable ways to ge...
Why not just attack someone else? Because it’s illegal. Attacking a home lab If you’re doing this on a budget, you have a few ways to go about this. You can either use old machines you have layi...
More test cases, but first, some housekeeping Docker will fill up disk space quickly if you’re not managing it actively or planning for it. Since I use throw away VMs for my docker containers, I d...