The AWS and Google Cloud network access for this training

Here's a diagram that shows how the entire network is laid out. Basically so far and when we run our setup commands during these 3 days,

  1. Each one of you has your own virtual machine

  2. Each one of you has your own attacker machine running inside your AWS

  3. For most of the exercises, each one of you will have target infrastructure running within your own accounts.

  4. For some exercises, you will be attacking infrastructure hosted by Appsecco to mimic Internet based attacks

  5. We will mention access to various targets if access is different than what is mentioned above

complete network

Last updated