Day 10 of 100

Day 10 of 100

After narrowly avoiding disaster the previous day, I opted to learn a little about setting up a home lab. I am now convinced that my laptop is better suited for a virtual home lab, seeing as it is 10 years old at this point, and I’m asking quite a bit of it as of late.

Once settled on my decision to do all of my home lab in the virtual realm, I wanted to find something cheap or free. AWS was the first thing that fit the bill.

Setting up the account is pretty straightforward, and I was soon presented with a panel of options that were quite perplexing. I have no idea what I’m looking at, or really what my next step should be. Back to Google!

I followed a tutorial as best I could, but was quite discouraged as the format the video was showing was very different from what I was presented with. I suppose, AWS went through a design change that in my opinion was actually a step back in usability. I eventually came across a video that was close enough to what I was seeing that creating a VPC (Virtual Private Cloud) was not much harder than sending an email. The next step was creating an EC2 instance (Amazon Elastic Compute Cloud), specifically an Ubuntu server. I was then instructed to create a Private Key and save it in the .ppk format.


Once that was complete, it was time to try and SSH into it. I was advised to use a program called Putty, but that it was created for Windows. Some searching showed me that it was possible to install it on Linux, and I was able to accomplish that via the CLI. There were a few issues on my end not really understanding how to use the program, but using the tutorial’s steps for the Windows version worked just fine on my Linux version.

I SSH’d into a server that I created on AWS!

How cool is that? I started that day without a virtual server, and now I’m ending it with one. I’ve only ever used the #thm website to do anything remotely (pun, sorry) close to this.

Now the next step is to lay out how I want the home lab to look like, build it, harden it and secure it.

Josh Young

Director of Technology | Network+ | A+ | (ISC)2 Certified in Cybersecurity | ITIL 4 Foundation | InfraGard member | MS-ISAC member

1 年

Good work. Keep pressing forward. Keep challenging yourself.

Gregory Spiller "The Digital Diogenes"

2X #1 Best Selling Featured Author | Technology Swiss Army Knife | BizOps Alchemist | Just-A-Guy-as-a-Service |

1 年

Same as everyone else that migrates to the cloud...go back on prem after getting sticker shock

要查看或添加评论,请登录

James S.的更多文章

  • OAuth 2.0 - Authentication Bypass via OAuth implicit flow

    OAuth 2.0 - Authentication Bypass via OAuth implicit flow

    Since we've gone over the basics of what OAuth is, and its common grant types, let's discuss the first vulnerability…

  • What is OAuth, and what are grant types?

    What is OAuth, and what are grant types?

    Today I'm shifting my focus from Active Directory to web applications, by diving into Open Authorization (OAuth2.0).

    2 条评论
  • Active Directory Attack - SMB Relay

    Active Directory Attack - SMB Relay

    The next common attack I am covering is SMB Relay. Using once again TCM Security's YouTube video as a guide, the setup…

    3 条评论
  • Web Security Academy Blind SQLi with conditional responses.

    Web Security Academy Blind SQLi with conditional responses.

    Hello everyone! It has been awhile since my last article, and while doing a lab on Portswigger's Web Security Academy…

    1 条评论
  • File Integrity Monitoring: Powershell Edition Pt. II

    File Integrity Monitoring: Powershell Edition Pt. II

    Hello everyone, welcome to Part II! (If you've not read Part I yet, you may do so here.) I'd like to start off by…

  • File Integrity Monitoring: Powershell Edition Pt. 1

    File Integrity Monitoring: Powershell Edition Pt. 1

    Hello everyone! I'd like to start off by giving credit where credit is due: Josh Madakor created the original script…

  • Web Application Front-End Vulnerabilities

    Web Application Front-End Vulnerabilities

    Continuing with my education on Web Application Security, I'd like to showcase four main vulnerabilities examined by…

    2 条评论
  • Active Directory Home Lab

    Active Directory Home Lab

    Hello everyone, I'd like to share some of the setup of my Active Directory home lab. This all started with a casual…

  • Information Security, Access Control, and the Parkerian Hexad..oh my!

    Information Security, Access Control, and the Parkerian Hexad..oh my!

    Happy Sunday everyone! Today I will be focusing on what I have learned in the first part of my new "Fundamentals of…

  • My Hands-On SQL Home Lab

    My Hands-On SQL Home Lab

    Hello, and welcome to another installment of my journey to becoming a Cybersecurity Professional. The past week and a…

    4 条评论

社区洞察

其他会员也浏览了