We offer cloud hosted penetration testing labs with cutting edge features and realistic environments.
Penetration testing labs tend to have isolated boxes representing specific vulnerabilities. This doesn’t do a great job of mimicking real world networks which have active users and network activity. We create lab environments with fully functioning Windows domains, simulated active users, technical vulnerabilities, and general security misconfigurations. Environments are built to mimic the real deal. Performing an end to end penetration test in an Ubeeri lab will look and feel just as if you're at a client site on a production network. In addition, we also provide detailed training materials to teach new penetration testers methodology and technical skills.
Ubeeri labs are built on the premise that the best training environment is the one which most accurately represents the real thing. That's why our labs are deployed with fully configured Windows Active Directory infrastructures, realistic internal applications and data, and commonly seen network architectures. Our labs also have a representative sample of live systems, with up to over 100 connected machines.
Access your lab’s dashboard application anywhere to view the status of your lab systems and perform basic management actions: reboot machines, take snapshots of current system states, and revert to saved snapshots. Enable multi-factor authentication for increased security.
Many environments will have mature SIEM solutions that provide monitoring and alerting of attacker activity. We've configured our lab networks with Splunk for monitoring activity. New penetration testers can learn what not to do, and experienced users will have more visibility into what types of events their activities are triggering.
Enter the domain as an unprivileged user and work up to Domain Admin via multiple escalation paths. Our labs feature both technical exploits and generic misconfigurations which allow attackers to gain initial domain accounts and escalate to more sensitive areas of the network. Each escalation path mirrors a scenario we've encountered on real world penetration tests.
Our environments simulate active users exhibiting common behaviors. The simulation includes browsing the web to create network traffic, mapping file shares to send credentials over the wire, and automatically opening emails to mimic phishing scenarios. This opens up a number of attacker scenarios which are not ordinarily present in a pentest lab environment.