IWC is now offering a couple different options of our Cyber Live Fire Range (CLFR). We have been using the base CLFR in our Cyber Security bootcamps over the years while we were perfecting it. Our team now uses it in real world engagements ranging from Forensic Imaging, Incident Response, and Red Team Assessments.
Our new CLFR Capture the Flag (CTF) server was build to address the growing need for a more diverse range to simulate a larger environment. We have built it using KVM and Virt-Manager on top of Ubuntu Server with a minimal desktop installed for easy of usability. With this solution, you can spin up a CTF event with little effort or create your own set of targets. If you want to try out a new OS, just install it within KVM or download the VM and convert it using either virsh or the Cyber Secrets Virsh ME Tool.
This lab is the classic Encrypted Portable CLFR built on Kali, also showcased in the Build-a-Lab Workshop. Built on a 2 TB external HDD that is bootable on both UEFI and Legacy MBR systems, this version has a couple virtual machines installed along with other labs, templates, and documentation covering forensics, incident response, SCADA / ICS, hacking, and reverse engineering / malware analysis.
The IWC-CLFR-CTF lab is based of Ubuntu Server 18.10 (Cosmic Cuttlefish) with a Minimal Desktop installed (because it's a server). It also has Libvirt, Qemu, KVM, and Virt-Manager preconfiguring with over 30 targets (Many from Vulnhub.com) to test right out of the box, three popular Hacking distros (BlackArch, Kali, and Parrot Security), and Security Onion with Elastic-Stack.
The Virtual Machines Currently Installed: