3.4. Setup in an isolated environment

Warning

sorry, not implemented. Development will hopefully happen in the future.

The Fedora Security Lab environment can be used to create a complete environment consisting of an attack target and attackers in an isolated area of an existing physical network or a class room.

3.4.1. Requirement

The requirements for running a Fedora Security Lab Environment are:

  • A system which is capable of acting as server, is able to boot from external devices (USB), and have a network interface
  • working physical network (all systems are connected to the same network segment)
  • some systems capable for network booting (PXE boot)

Basically a class room for the computer science education is a good starting point.

   Switch
+----------------+     +---------+
|X X X X X X X X |     |Server   |
+^-^-^---------^-+     |- DHCP   |
 | | |         |       |- PXE    |
 | | |         +-------|- Data   |
 | | |                 +---------+
 | | |
 | | +-----------------+
 | +--------+          |
++-------+ ++-------+ ++-------+
|Client 1| |Client 2| |Client 3|
+--------+ +--------+ +--------+

3.4.2. Setup Course

  • Disconnect the physical network from the outside
  • Start the system which will become the server
  • When the server is up and running, start your other system after you have changed their BIOS boot sequence to Boot from network or similar.