This directory contains the components to build the labs for Chapter 29. Lab Information: The following VMs will be setup for this lab: Docker Host IP: 10.0.0.50 Docker User: ubuntu Docker Password: SSH key setup with the lab Kali Computer IP: 10.0.0.40 Kali User: kali Kali Password: SSH key setup with the lab. Setting up the Lab: Make sure you have completed all the steps at (https://github.com/GrayHatHacking/GHHv6/tree/main/CloudSetup). Go into the Lab/terraform directory and modify the terraform.tfvars. Edit the file with your favorite text editor and then replace the contents of the key_path variable with the path to your SSH key. An example might look like: key_path="/home/kali/.ssh/id_rsa". Go into the Lab subdirectory and run build.sh to start the environment build. It will ask you are sure you want to create resources. If it does ask type yes. This will create resources that may cost you money. If you want to destroy the lab between uses, run destroy.sh. Answer yes when it asks if you are sure, and the resources will be deleted. Retrieving the IP addresses of the machines: Once the build.sh script is completed, it should print the IP addresses of the hosts.
A security dataset and CTF platform with full and attack-only versions pre-indexed for Splunk.
A book that helps improve Docker security by covering risks and countermeasures
Package verification tool for npm with various verification and testing capabilities.
A Python library for querying ThreatCrowd's API for email, IP, domain, and antivirus reports
A CLI tool for securely generating keys, passwords, and providing credentials without files, primarily for building secure BOSH deployments using Vault and Spruce.
Cybersecurity conference featuring talks on various hacking topics by industry experts.
A repository of CTF source files and write-ups from 2015, addressing common issues in CTF write-ups.
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.
Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.
Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.