Skip to content

A beginner-friendly cybersecurity lab project built using VirtualBox, pfSense (with Snort IDS/IPS), Kali Linux, and Metasploitable 2.

Notifications You must be signed in to change notification settings

cyristal-gems/verylegit_verylegal

Repository files navigation

Very Legit Title

Welcome to my first cybersecurity lab! This project was built as part of a Cybersecurity Fellowship to simulate a realistic, beginner-friendly environment for learning offensive and defensive security techniques.

This diagram visually represents the cybersecurity lab setup used in this project. It shows a segmented network environment built with VirtualBox, featuring three virtual machines:

  • pfSense Firewall & IDS/IPS – Positioned between external and internal networks, responsible for traffic filtering and intrusion detection using Snort.
  • Kali Linux (Attacker) – Connected to both attacker and server networks to simulate an external attacker using tools like Metasploit and Nikto.
  • Metasploitable 2 (Target) – A vulnerable machine on the internal server network used for testing exploitation techniques.

Each machine is labeled with its role, IP address, and network interface to help visualize the traffic flow and attack paths.


Lab Sections

This repository is organized into the following sections:

Each section is written in Markdown for easy reading and includes commands, explanations, and insights from my beginner perspective.


Diagram

image


Learning Goals

  • Understand the basics of network segmentation, firewalls, and IDS/IPS.
  • Explore common attacker tools (Metasploit, Nmap, Nikto, Netcat) and practice basic penetration testing.
  • Simulate real-world cybersecurity scenarios in a safe, isolated environment.

About

A beginner-friendly cybersecurity lab project built using VirtualBox, pfSense (with Snort IDS/IPS), Kali Linux, and Metasploitable 2.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published