PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab
The easiest way to get a machine is to start with is to run Standalone Template
- (First time only) Create a Windows 11 Base image to make subsequent builds much quicker
- Create a Windows 11 Machine
- Run a Windows Update Scheduled task to install all available updates
To build a vulnerable Active Directory, run the AutomatedBadLab Template.
Each Custom Role comes with its own README and in some cases a Lab Template to demonstrate its use.
If you are running AutomatedBadLab on a Virtual Machine, the recomendation is to build a DHCP / Internet Router VM via the Router Template.
Example Active Directory Template which uses the dual-NIC configuration.
RDCMan is recommended for managing RDP connection profiles. AutomatedLab updates the local hosts file during the build process, so only NETBIOS names are required to connect to lab machines.
TrustedSec Blog Post provides a great runthrough on how to get set up.
- The AutomatedLab Team
- @davidprowe for the inspiration with BadBlood
- @TrimarcJake for the ADCS work on Locksmith
THE SCRIPTS PROVIDED IN THIS PACKAGE ARE FOR EDUCATIONAL PURPOSES AND TESTING ONLY. THEY ARE NOT INTENDED TO BE EXECUTED IN A PRODUCTION ENVIRONMENT.
USE OF THESE SCRIPTS IS AT YOUR OWN RISK. THE AUTHOR MAKES NO WARRANTIES AS TO THE FUNCTIONALITY, EFFECTIVENESS, OR SUITABILITY OF THESE SCRIPTS FOR ANY PARTICULAR PURPOSE. THE AUTHOR SHALL NOT BE RESPONSIBLE FOR ANY DAMAGES, INCLUDING BUT NOT LIMITED TO, DATA LOSS, SYSTEM DOWNTIME, OR SYSTEM INSTABILITY ARISING FROM YOUR USE OF THESE SCRIPTS.
BY USING THESE SCRIPTS, YOU ACKNOWLEDGE THAT YOU UNDERSTAND AND ACCEPT THESE TERMS.