โLuck is what happens when preparation meets opportunity.โ โ Seneca
๐งญ OPFORGE Lab Companion Sheet This companion sheet is a quick-reference guide for building and navigating the OPFORGE segmented lab environment. It aligns with blog posts 1 through 7 and supports realistic threat emulation, detection validation, and cyber-AI experimentation.
๐งฑ Lab Zones & Addressing Zone CIDR Description Gateway RED_NET 192.168.50.0/24 Offensive tools, implants, C2s 192.168.50.1 INTERNAL_NET 192.168.60.0/24 Clients, Domain Controller, Blue Team infra 192.168.60.1 DMZ_NET 192.168.20.0/24 Public-facing services 192.168.20.1 LAN_WORKSTATIONS 192.168.30.0/24 User workstations 192.168.30.1 EXT_NET (Transit) 192.168.41.0/24 Between DMZ and InternetSim 192.168.41.1 InternetSim 192.168.40.0/24 Simulated public Internet 192.168.40.1 ๐ฆ Core Systems Hostname Role IP Address Notes OPF-DC01 Windows AD/DNS Controller 192.168.60.5 Authoritative for opforge.local OPF-FW-DMZ pfSense Firewall 192.168.20.5 Routes/filters between DMZ + EXT_NET OPF-RT-RED VyOS Router for RED_NET 192.168.50.1 Static route โ EXT_NET via 192.168.50.2 OPF-RT-EXT VyOS Router between DMZ & RED 192.168.20.2 Dual NIC on DMZ + EXT OPF-RT-INET VyOS Router for simulated Internet 192.168.40.1 Outbound only OPF-RT-INT VyOS Router for Internal Network 192.168.60.1 Connected to Domain + workstations OPF-RT-DMZ Trunk router with VLAN 41 192.168.41.2 Connected to pfSense DMZ transit ๐ก DNS Role Assignment Device Interface Role Primary DNS Fallback DNS Notes opf-rt-int Internal network 192.168.60.5 1.1.1.1, 8.8.8.8 Uses AD DNS opf-rt-inet Internet gateway 1.1.1.1 8.8.8.8 Strict external only opf-rt-red Red team network 192.168.50.1 1.1.1.1 pfSense for monitoring opf-rt-ext External/DMZ router 192.168.50.1 1.1.1.1 No internal lookup opf-fw-dmz DMZ Firewall 1.1.1.1 8.8.8.8 Forwards to internal or external ๐ Firewall Rule Logic (pfSense) Allow DNS (TCP/UDP 53) from INTERNAL_NET to opf-dc01 Allow ICMP selectively (ping, traceroute validation) Allow NTP (UDP 123) Allow HTTP/HTTPS only to specific zones Deny all else explicitly with logging ๐ DNS Resolver Config (pfSense) Enabled DNS Resolver Domain override: opforge.local โ 192.168.60.5 General DNS: 1.1.1.1, 8.8.8.8 Outgoing Interface: DMZ_TRANSIT_VLAN41 ๐ VyOS Routing Sample (per router) configure set protocols static route 192.168.30.0/24 next-hop 192.168.20.2 set protocols static route 192.168.60.0/24 next-hop 192.168.30.1 commit; save ๐งช Validation Commands Windows ping opf-dc01 nslookup google.com tracert opf-dc01.opforge.local Linux cat /etc/resolv.conf ping opf-dc01.opforge.local systemd-resolve --status ๐บ Timeline Snapshot (Posts 1โ7) Post # Milestone 1 Lab Design + Purpose Defined 2 Static Routing and Interfaces Set 3 Subnet Segmentation (Red, Blue, DMZ) 4 (Deprecated โ merged into 5 & 7) 5 DNS Resolver, Domain Controller Setup 6 Cross-zone DNS + Routing Fully Validated 7 VLAN 41 Added, pfSense Transit Config Completed ๐ง Tips & Notes Always snapshot before making routing/firewall changes Use tcpdump or Packet Capture in pfSense for flow debugging Keep /etc/hosts clean and prefer DNS testing via resolvers Maintain NAT boundaries only where necessary (egress control) ๐งฉ Next Companion Add-ons Network diagram (SVG/PNG) Credential vault structure (how secrets are handled) Integration plans for Zeek and detection engines Stay methodical. Document everything. Grow forward.
...