

For this type of installation, the system requirements are as follows: Intel Xeon CPU supporting Intel® VT-x with Extended Page Tables (EPT) and Ubuntu Server 16.04.4 LTS 圆4.
Fasttrack schedule 10.0.0.1 serial code#
In this combination, QEMU acts as a hardware emulator it’s flexible enough and can run code written for one processor architecture on another architecture (ARM on x86 or PPC on ARM). Detailed information on all EVE-NG features, including the Professional and Learning Center versions that support Docker and clustering, is available on its official website in this article, I will discuss only the key functions. Our purposes required a web interface aside from EVE-NG, it was available at that time only in the GNS3 beta version. However, it was created not only for networking professionals: the functionality of this platform is virtually endless and limited only by your imagination and knowledge. The solution is very popular among networking specialists – just look at these network topology examples with clusters and BGP! BGP topology a fully featured hands-on demonstration stand for customers.ĮVE-NG Community Edition was chosen as the base platform this is a fork of well-known UnetLab that is no longer supported.efficient internal/external training of engineers and.In this particular case, our team needed a platform able to implement the following functions: In addition to free cyberpolygons designed for competitions, there are plenty of expensive vendor solutions with ready-made attack and defense scenarios that enable you to effectively train both ‘blue’ and ‘red’ teams, either in the cloud (subscription-based) or on-premise. Unlike classic CTF competitions, cyberpolygons are used to train not only ‘attackers’, but also ‘defenders’. Cyberpolygon? But why?Īs you probably know, a cyberpolygon is a kind of virtual environment whose primary purpose is training. So, I decided to standardize the process, and concurrently test a modern emulation platform. Therefore, this approach seemed to be ineffective to me, especially considering that the VMware platform doesn’t provide some of the features and flexibility. When an engineer quits, such ‘personal’ virtual machines are simply killed together with all ‘accumulated experience’. Even though they are required only for labs, in reality, they communicate with each other and with the Internet via the production infrastructure. as a result, such infrastructures often include port groups. In addition to ‘personal’ VMs running on different ESXi hosts, segmented networks are required to test firewalls, run malware, etc.

Most likely, other team members won’t be able to use such VMs without preliminary research. As a result, you have a horde of differently configured virtual machines running almost the same software.

Experience shows that without a standardized approach, each engineer eventually builds up a similar infrastructure with a unique blackjack.

Integration tasks are usually typical, too: setting up authentication via AD/Radius, connecting to mail servers, rolling out agents, assembling a cluster, providing mirrored traffic, submitting logs or flows to analysts, etc. In addition, any infrastructure includes some standard hierarchy of user groups, network segmentation, software, and network equipment (switches, routers, firewalls, etc.). There are plenty of vendors and solutions, but most of the engineers focused on the protection of the same kind of systems and standard corporate infrastructure: workstations, AD servers, file shares, mail servers, web servers, and database servers. They explored, deployed, integrated, and tested various products. The idea to test a modern emulation platform came to me when I was overseeing a team of cybersecurity engineers. I suggest another way: set up an emulation platform using EVE-NG and create on its basis a universal scalable cyberpolygon enabling networking and security specialists to polish their skills. Some admins reinvent the wheel by assembling fearsome combinations of virtual machines and all kinds of software. Virtualization tools are required in many situations: testing of security utilities, personnel training in attack scenarios or network infrastructure protection, etc.
