Skip to content

tp8888/Full-Stack-Enterprise-Cyber-Range

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

103 Commits
 
 
 
 

Repository files navigation

🏢 Full-Stack Enterprise Cyber Range

Cybersecurity testing and research lab

📌 Executive Summary

This repository documents the architecture, deployment, and configuration of a fully virtualized, enterprise-grade Security Operations Center (SOC) and Cyber Range. Built entirely within Oracle VirtualBox, this environment simulates a realistic corporate network with strict segmentation, a dedicated threat hunting SIEM, a vulnerable Active Directory forest, and an air-gapped malware analysis sandbox.

The primary objective of this project is to provide a safe, segmented environment for advanced penetration testing, digital forensics, incident response (DFIR), and perimeter defense research.

🏗️ Network Architecture & Segmentation

To adhere to Zero Trust principles, the network is routed through a central pfSense firewall and segmented into distinct Virtual LANs (VLANs), ensuring strict traffic control between trusted and untrusted zones.

  • WAN (vtnet0): External internet connection (NAT).
  • LAN (vtnet1): Primary management network.
  • CYBER_RANGE (vtnet2): Offensive security subnet featuring Kali Linux.
  • AD_LAB (vtnet3): Simulated corporate environment with Windows Server Active Directory.
  • ISOLATED (vtnet4): Air-gapped sandbox for detonation and malware analysis (FlareVM, REMnux).
  • SECURITY (vtnet5): Dedicated defensive zone for security monitoring and SIEM deployment (Splunk).

🛠️ Core Technology Stack

  • Infrastructure & Routing: Oracle VirtualBox, pfSense (FreeBSD)
  • Offensive Security: Kali Linux
  • Defensive Operations (Blue Team): Splunk (SIEM)
  • Digital Forensics & Incident Response (DFIR): Tsurugi Linux
  • Malware Analysis: FlareVM (Windows), REMnux (Linux)
  • Enterprise Environment: Windows Server 2019, Active Directory

📂 Project Documentation & Build Phases

The deployment of this cyber range is documented in phases. Click on any phase below to view the detailed configuration guides, firewall rulesets, and deployment steps.

Phase 1: Network Topology & Hypervisor Setup

Credit & Inspiration: This architecture is built based on the "Building a Virtual Security Home Lab" blueprint designed by David Varghese.

📌 Objective

To establish the foundational hypervisor environment and map out the virtualized network segmentation required for a Zero Trust enterprise architecture.

🗺️ Lab Topology Diagram

The following diagram illustrates the logical separation of the lab zones, all orchestrated by the pfSense firewall.

flowchart TD
    %% Legend (not rendered in diagram - add separately in README)
    %% WAN (Red), LAN (Purple), CYBER_RANGE (Gray), AD_LAB (Blue), ISOLATED (Yellow), SECURITY (Orange)

    %% Top: Internet & Router
    INTERNET("🌐 Internet")
    ROUTER["🛡️ pfSense Router & Firewall"]

    %% Host PC and VirtualBox
    HOST_PC["💻 Host PC (Laptop)"]
    VBOX["📦 VirtualBox Hypervisor"]

    %% VLAN Subnets & Labels
    WAN_SUBNET["10.0.2.15/24 (WAN)"]
    CYBER_SUBNET["10.0.0.0/24 (CYBER_RANGE)"]
    AD_SUBNET["10.80.80.0/24 (AD_LAB)"]
    ISOLATED_SUBNET["10.99.99.0/24 (ISOLATED)"]
    SECURITY_SUBNET["10.6.6.0/24 (SECURITY)"]

    %% Devices per VLAN
    KALI["🐧 Kali Linux\n10.0.0.2"]
    METASPLOITABLE["🎯 Metasploitable 2\n10.6.6.12"]
    CHRONOS["⏱️ Chronos 1\n10.6.6.13"]
    TSURUGI["🔍 Tsurugi Linux\n10.10.10.2"]
    SPLUNK["📊 Splunk\n10.10.10.13"]
    WIN_SERVER["🖥️ Win Server 2019\n10.80.80.2"]
    WIN10_1["💻 Win10 Enterprise\n10.80.80.11"]
    WIN10_2["💻 Win10 Enterprise\n10.80.80.12"]
    FLARE_VM["☠️ Flare VM\n10.99.99.11"]
    REMNUX["🐧 REMnux\n10.99.99.12"]

    %% Connections (Top-Down)
    INTERNET --> ROUTER
    ROUTER --> WAN_SUBNET
    ROUTER --> CYBER_SUBNET
    ROUTER --> AD_SUBNET
    ROUTER --> ISOLATED_SUBNET
    ROUTER --> SECURITY_SUBNET

    WAN_SUBNET --> KALI
    SECURITY_SUBNET --> METASPLOITABLE
    SECURITY_SUBNET --> CHRONOS
    CYBER_SUBNET --> TSURUGI
    CYBER_SUBNET --> SPLUNK
    AD_SUBNET --> WIN_SERVER
    AD_SUBNET --> WIN10_1
    AD_SUBNET --> WIN10_2
    ISOLATED_SUBNET --> FLARE_VM
    ISOLATED_SUBNET --> REMNUX

    %% Styling by subnet
    classDef wan fill:#ffd6d6,stroke:#d33,stroke-width:1px;
    classDef security fill:#fff0d6,stroke:#d98f00,stroke-width:1px;
    classDef cyber fill:#e6e6e6,stroke:#666,stroke-width:1px;
    classDef adlab fill:#d6eaff,stroke:#3399ff,stroke-width:1px;
    classDef isolated fill:#fff8d6,stroke:#ccbb33,stroke-width:1px;

    class WAN_SUBNET wan;
    class WAN_SUBNET wan;
    class CYBER_SUBNET cyber;
    class AD_SUBNET adlab;
    class ISOLATED_SUBNET isolated;
    class SECURITY_SUBNET security;
Loading

About

Cybersecurity testing and research lab

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors