Pentesting labs typically isolate vulnerable systems without modeling real-world network behavior. This talk presents a toolset that introduces simulated users and network activity to lab environments, enabling practitioners to model realistic corporate networks and explore additional attack vectors safely. The speakers demonstrate the tool's major functions and capabilities.
Show original YouTube description
This video was presented at BSidesSLC 2018 Visit https://bsidesslc.org for more information about the conference. ----------------------------------------------------------------- Pentesting labs tend to have isolated boxes representing specific vulnerabilities. This doesn’t do a great job of mimicking real world networks which have active users and network activity. We created a tool set to introduce simulated users to a lab environment which enables us to accurately model real world corporate networks and allows for additional attack vectors to be explored in a safe setting. During this talk we’ll go over the major functions of the tool and showcase its capabilities with a live demonstration.