“Luck is what happens when preparation meets opportunity.” โ€” Seneca

๐Ÿงญ OPFORGE Lab Companion Sheet

This companion sheet is a quick-reference guide for building and navigating the OPFORGE segmented lab environment. It aligns with blog posts 1 through 7 and supports realistic threat emulation, detection validation, and cyber-AI experimentation.


๐Ÿงฑ Lab Zones & Addressing

ZoneCIDRDescriptionGateway
RED_NET192.168.50.0/24Offensive tools, implants, C2s192.168.50.1
INTERNAL_NET192.168.60.0/24Clients, Domain Controller, Blue Team infra192.168.60.1
DMZ_NET192.168.20.0/24Public-facing services192.168.20.1
LAN_WORKSTATIONS192.168.30.0/24User workstations192.168.30.1
EXT_NET (Transit)192.168.41.0/24Between DMZ and InternetSim192.168.41.1
InternetSim192.168.40.0/24Simulated public Internet192.168.40.1

๐Ÿ“ฆ Core Systems

HostnameRoleIP AddressNotes
OPF-DC01Windows AD/DNS Controller192.168.60.5Authoritative for opforge.local
OPF-FW-DMZpfSense Firewall192.168.20.5Routes/filters between DMZ + EXT_NET
OPF-RT-REDVyOS Router for RED_NET192.168.50.1Static route โ†’ EXT_NET via 192.168.50.2
OPF-RT-EXTVyOS Router between DMZ & RED192.168.20.2Dual NIC on DMZ + EXT
OPF-RT-INETVyOS Router for simulated Internet192.168.40.1Outbound only
OPF-RT-INTVyOS Router for Internal Network192.168.60.1Connected to Domain + workstations
OPF-RT-DMZTrunk router with VLAN 41192.168.41.2Connected to pfSense DMZ transit

๐Ÿ“ก DNS Role Assignment

DeviceInterface RolePrimary DNSFallback DNSNotes
opf-rt-intInternal network192.168.60.51.1.1.1, 8.8.8.8Uses AD DNS
opf-rt-inetInternet gateway1.1.1.18.8.8.8Strict external only
opf-rt-redRed team network192.168.50.11.1.1.1pfSense for monitoring
opf-rt-extExternal/DMZ router192.168.50.11.1.1.1No internal lookup
opf-fw-dmzDMZ Firewall1.1.1.18.8.8.8Forwards to internal or external

๐Ÿ” Firewall Rule Logic (pfSense)

  • Allow DNS (TCP/UDP 53) from INTERNAL_NET to opf-dc01
  • Allow ICMP selectively (ping, traceroute validation)
  • Allow NTP (UDP 123)
  • Allow HTTP/HTTPS only to specific zones
  • Deny all else explicitly with logging

๐Ÿ“‘ DNS Resolver Config (pfSense)

  • Enabled DNS Resolver
  • Domain override: opforge.local โ†’ 192.168.60.5
  • General DNS: 1.1.1.1, 8.8.8.8
  • Outgoing Interface: DMZ_TRANSIT_VLAN41

๐Ÿ”„ VyOS Routing Sample (per router)

configure
set protocols static route 192.168.30.0/24 next-hop 192.168.20.2
set protocols static route 192.168.60.0/24 next-hop 192.168.30.1
commit; save

๐Ÿงช Validation Commands

Windows

ping opf-dc01
nslookup google.com
tracert opf-dc01.opforge.local

Linux

cat /etc/resolv.conf
ping opf-dc01.opforge.local
systemd-resolve --status

๐Ÿ—บ Timeline Snapshot (Posts 1โ€“7)

Post #Milestone
1Lab Design + Purpose Defined
2Static Routing and Interfaces Set
3Subnet Segmentation (Red, Blue, DMZ)
4(Deprecated โ€“ merged into 5 & 7)
5DNS Resolver, Domain Controller Setup
6Cross-zone DNS + Routing Fully Validated
7VLAN 41 Added, pfSense Transit Config Completed

๐Ÿง  Tips & Notes

  • Always snapshot before making routing/firewall changes
  • Use tcpdump or Packet Capture in pfSense for flow debugging
  • Keep /etc/hosts clean and prefer DNS testing via resolvers
  • Maintain NAT boundaries only where necessary (egress control)

๐Ÿงฉ Next Companion Add-ons

  • Network diagram (SVG/PNG)
  • Credential vault structure (how secrets are handled)
  • Integration plans for Zeek and detection engines

Stay methodical. Document everything. Grow forward.

โ€” H.Y.P.R.