I have had the opportunity to meet Eric in person and learn a lot from him in only a brief discussion at Texas Cyber Summit in Austin '23. It was a brilliant conversation.
I just got my security+ and very excited to focus on finding a job full time and diving into the labs. So happy I found this channel! I will forsure be ready when it comes time for my interview. Glad you are focusing on SOC stuff!
Congratulations, I am trying to get in motion to follow right behind u. As I'm left with no other options at this point. Been on the losing end of a very hefty targeted cyber attack, bank accounts back to back hacked, constant targeted spear phishing, amongst other things I'll leave offline, I still kinda dont know where to start, but what I have acquired so far is self taught. And it has been hell trying to do anything to gain more knowledge as expected. Nobody is gonna come save anybody so with that understood, I'll hold true to my values morals and principles, and defend myself on and offline. Much respect to all
I watched Eric video from 4 yrs ago and now this one...the grey hair is a sign...lol Serious though this man is awesome and at 50 im just starting out but i hope to one day work in a SOC under someone like him. The open SoC training aspect to help improve employees is the kind of thing i love because everyone wins in the end.
Finished Part one on a M1 Mac I used Ubuntu on M1 an Windows on Azure Virtual Machines. I will still continue to tugg at a way to do it on a M1 just to push the bar. As someone new to Cybersecurity I wish the best of luck for everybody attempting this
is this the rolling meme (respectfully) of robin tryin to say he has a "masters in cyber security" and batman slapping the k9 poo poo out of him saying "WE WANT REAL WORLD EXPERIENCE" This is actually alil more refreshing to hear. And is much appreciated. Ill def be taking the advice giving here with full respect, enjoy yalls weekend fellas
Less than 13 min into the video and am already learning a lot more than other videos/blogs about setting up VMs. Really appreciate the explanations and considerations when it comes to making decisions regarding VMs.
But would it be honest of me to say on my CV / resume that "I wrote automated response rules" when actually i copy n pasted John Capuano's response rules? Put me on the spot and I probably wouldn't know how to write a rule by myself.
I want to purchase VMware Workstation Pro, but I do not understand why they have the option to buy the Pro for $199 or upgrade Pro for $99. kinda confuse
Thanks for the fantastic video. Some incredible information ive taken away from this. As someone who has just passed my Google IT Support course and is really interested in the Cyber Security course next and then the Blue Team level 1 cert after, this is incredible content for me to start using now with my studies so I'll be ready for interviews hopefully in the near future!
Got stuck deploying or installing the sensor command in Limacharlie. Was using powershell not cmd w admin rights. To start The sensor command ,,, taking my time and learning allot !!!
Thank you for this lab but I'm having trouble at the setup attack system step in part 1. I enter the command ssh user@[Linux_VM_IP] and then say yes to add it. But my password says permission denied. Ive restarted the entire Ubuntu process twice and tried making a new pass but still no luck. Im not using the wrong IP address, password, and i even checked to make sure port 22 was open. IDK what else to do.
I've noticed that the SOC lab was built using VMware on the windows operating system. Can you use VMware on Linux to do the same thing? Has anyone done it? Edit: I spoke too soon. It works just fine!
anyone else stuck on Part 2 task 3? Im able to generate --http [linux_VM_IP] --save /opt/sliver. but after I exit im not able to cd into /opt/sliver even though it says "File exists" when I try to mkdir /opt/server. Also when typing command "locate /opt/sliver" i am able to find it. just not able to cd into it and it doesnt appear to generate payload onto /opt/sliver
@@dre8231 Yes. I wish i can explain why or how we got this issue. But I will try to explain what I saw him do. So for whatever reason when we did step 10 on part 1 "mkdir -p /opt/sliver" its suppose to create a directory instead it created an .exe so he had to create a directory and moved the executable in the folder. Hope this helps
I have a bachelors in cybersecurity, Security+ cert, and working on my az-900 right now. Anybody know why I cant find a job other than not having much experience?
I have a mac M1 and just wanted to know if this lab is possible to do with my system? Can I use parallels for mac and run vmware inside it? Appreciate the video
I have an M1 as well and came across issues when trying to set up a different lab (the Windows AD environment for TCM's PEH course and/or the Windows lab for TCM's Windows Forensics course; the latter may be related to not being able to get Burp Suite on the Kali VM running on UTM virtual machine due to an issue with Java). All that to say I'm looking to see if I can run all of these labs on a 2018 Mac Mini, which seem to be available with 16Gb+ RAM and 256+ HDs for a decent price. I haven't pulled the plug though as this is very recent venture, and I haven't confirmed compatibility between the Mac Mini and the labs. I built the PEH AD lab on the Azure cloud, but it's costing me $50 a month to sit there doing nothing.
at the 41:49 timemark on the dispaly is shows step 7 the ssh user@{linux_VM_IP} that is me using my host windows not the widows victim machine correct? i ask because wen i SSH it times out....
I have had the opportunity to meet Eric in person and learn a lot from him in only a brief discussion at Texas Cyber Summit in Austin '23. It was a brilliant conversation.
💙
I just got my security+ and very excited to focus on finding a job full time and diving into the labs. So happy I found this channel! I will forsure be ready when it comes time for my interview. Glad you are focusing on SOC stuff!
Congratulations, I am trying to get in motion to follow right behind u. As I'm left with no other options at this point. Been on the losing end of a very hefty targeted cyber attack, bank accounts back to back hacked, constant targeted spear phishing, amongst other things I'll leave offline, I still kinda dont know where to start, but what I have acquired so far is self taught. And it has been hell trying to do anything to gain more knowledge as expected. Nobody is gonna come save anybody so with that understood, I'll hold true to my values morals and principles, and defend myself on and offline. Much respect to all
I watched Eric video from 4 yrs ago and now this one...the grey hair is a sign...lol Serious though this man is awesome and at 50 im just starting out but i hope to one day work in a SOC under someone like him. The open SoC training aspect to help improve employees is the kind of thing i love because everyone wins in the end.
He’s epic!
The grey hair is definitely a sign 😆 Thanks for the kind words 💙
Finished Part one on a M1 Mac I used Ubuntu on M1 an Windows on Azure Virtual Machines. I will still continue to tugg at a way to do it on a M1 just to push the bar. As someone new to Cybersecurity I wish the best of luck for everybody attempting this
Thank you for making this video.
is this the rolling meme (respectfully) of robin tryin to say he has a "masters in cyber security" and batman slapping the k9 poo poo out of him saying "WE WANT REAL WORLD EXPERIENCE"
This is actually alil more refreshing to hear. And is much appreciated. Ill def be taking the advice giving here with full respect, enjoy yalls weekend fellas
Got finished finally with Part 1. Lets of "gifts" for me LOL. Learned so much tho, thanks to you both!
Ha that's right on point for me w/ Eric mentioning using Ubuntu for folks like me w/ only an 8 year old laptop to use.
Less than 13 min into the video and am already learning a lot more than other videos/blogs about setting up VMs. Really appreciate the explanations and considerations when it comes to making decisions regarding VMs.
Eric is a wealth of information and a genuine treasure.
I missed the live but greatful to both of you!!
Thank god I found this video
But would it be honest of me to say on my CV / resume that "I wrote automated response rules" when actually i copy n pasted John Capuano's response rules? Put me on the spot and I probably wouldn't know how to write a rule by myself.
I know I wonder about that too lol
Word is as "I implemented automated response rules"
I want to purchase VMware Workstation Pro, but I do not understand why they have the option to buy the Pro for $199 or upgrade Pro for $99. kinda confuse
Thanks for the fantastic video. Some incredible information ive taken away from this. As someone who has just passed my Google IT Support course and is really interested in the Cyber Security course next and then the Blue Team level 1 cert after, this is incredible content for me to start using now with my studies so I'll be ready for interviews hopefully in the near future!
Love it , very useful information
This is so insightful and practical approach. A big thanks to Eric and Gerald. Looking forward to the series
Got stuck deploying or installing the sensor command in Limacharlie. Was using powershell not cmd w admin rights. To start The sensor command ,,, taking my time and learning allot !!!
Sorry had to edit to make it more clear. Now I want my liked ❤. Back lol 😆.
Thank you for this lab but I'm having trouble at the setup attack system step in part 1. I enter the command ssh user@[Linux_VM_IP] and then say yes to add it. But my password says permission denied. Ive restarted the entire Ubuntu process twice and tried making a new pass but still no luck. Im not using the wrong IP address, password, and i even checked to make sure port 22 was open. IDK what else to do.
#Teamblue #Teamreplay - very informative video; thanks Gerald!
Going to try it anyway and see what happens
Very Informative. Thank you sir.
Why is it that when I run "ps -T" when connected to the session it crashes and gives me a stack overflow?
Part 2, step 6 when trying to change directory's i keep getting not a directory? any reason?
and when I try to make that dir using mkdir it says its already a directory lol
I've noticed that the SOC lab was built using VMware on the windows operating system. Can you use VMware on Linux to do the same thing? Has anyone done it?
Edit: I spoke too soon. It works just fine!
Would using Windows Sandbox be an option for using as a victim box?
As long as you can network between attacker and victim and victim can network to Lima Charlie SaaS should be ok
anyone else stuck on Part 2 task 3? Im able to generate --http [linux_VM_IP] --save /opt/sliver. but after I exit im not able to cd into /opt/sliver even though it says "File exists" when I try to mkdir /opt/server. Also when typing command "locate /opt/sliver" i am able to find it. just not able to cd into it and it doesnt appear to generate payload onto /opt/sliver
YES im having the same issue. Where you able to find out what was causing this?
@@dre8231 Yes. I wish i can explain why or how we got this issue. But I will try to explain what I saw him do. So for whatever reason when we did step 10 on part 1 "mkdir -p /opt/sliver" its suppose to create a directory instead it created an .exe so he had to create a directory and moved the executable in the folder. Hope this helps
@@jaybell0819 ahhhh yes this makes sense. Thanks for the help/reply back!
@Dre were you able to fix? Lets get through this all the way to part 4
I have a bachelors in cybersecurity, Security+ cert, and working on my az-900 right now. Anybody know why I cant find a job other than not having much experience?
Your resume
do you live near a big city?
I have a mac M1 and just wanted to know if this lab is possible to do with my system? Can I use parallels for mac and run vmware inside it? Appreciate the video
Im not sure if it’s possible. If you can get the VMs both running and can configure the networking to work, then I don’t see why not.
I have an M1 as well and came across issues when trying to set up a different lab (the Windows AD environment for TCM's PEH course and/or the Windows lab for TCM's Windows Forensics course; the latter may be related to not being able to get Burp Suite on the Kali VM running on UTM virtual machine due to an issue with Java). All that to say I'm looking to see if I can run all of these labs on a 2018 Mac Mini, which seem to be available with 16Gb+ RAM and 256+ HDs for a decent price. I haven't pulled the plug though as this is very recent venture, and I haven't confirmed compatibility between the Mac Mini and the labs. I built the PEH AD lab on the Azure cloud, but it's costing me $50 a month to sit there doing nothing.
Can we have the discord link?
Not sure which discord we mention but simply cyber discord is simplycyber.io/discord
at the 41:49 timemark on the dispaly is shows step 7 the ssh user@{linux_VM_IP} that is me using my host windows not the widows victim machine correct? i ask because wen i SSH it times out....
Yes host vm so you can effectively do the things you need to do on the Linux box easier
@@SimplyCyber ok it just tells me connection timed out