We offer cloud hosted penetration testing labs with cutting edge features and realistic environments.
Penetration testing labs tend to have isolated boxes representing specific vulnerabilities. This doesn’t do a great job of mimicking real world networks which have active users and network activity. We create lab environments with a fully functioning Windows domain, simulated active users, technical vulnerabilities, and general security misconfigurations. Environments are built to mimic the real deal. Performing an end to end penetration test in an Ubeeri lab will look and feel just as if you're at a client site on a production network. In addition, we also provide detailed training materials to teach new penetration testers methodology and technical skills.
Our environments simulate active users exhibiting common behaviors. The simulation includes browsing the web to create network traffic, mapping file shares to send credentials over the wire, and automatically opening emails to mimic phishing scenarios. This opens up a number of attacker scenarios which are not ordinarily present in a pentest lab environment.
Enter the domain as an unprivileged user and work up to Domain Admin via multiple escalation paths. Our labs feature both technical exploits and generic misconfigurations which allow attackers to gain initial domain accounts and escalate to more sensitive areas of the network. Each escalation path mirrors a scenario we've encountered on real world penetration tests.
Ubeeri labs are built on the premise that the best training environment is the one which most accurately represents the real thing. That's why our labs are deployed with fully configured Windows Active Directory infrastructures, realistic internal applications and data, and commonly seen network architectures. Our labs also have a representative sample of live systems, with up to over 100 connected machines.
Every client environment is different, and a pentesting lab should be able to reflect varying levels of security maturity. Ubeeri labs have a number of security controls which can be selectively enabled, resulting in an array of security postures. We can emulate the older firm which hasn't updated its policies or tool sets since 2005, as well as the new firm with all the bells and whistles. Roll through a flat network of old operating systems or fight against tight firewall rules and advanced security features such as Microsoft LAPS and Windows Defender, it's your choice.
Many environments will have mature SIEM solutions that provide monitoring and alerting of attacker activity. We've configured our lab networks with alerts for risky behavior via Splunk. New penetration testers can learn what not to do, and experienced users will have more visibility into what types of events their activities are triggering.