To build a VM for the UTM, select ‘Create VM’ from the upper right hand corner of the Proxmox web-based management interface (see Figure 1). The UTM9 will sit at the virtual front door for your Proxmox lab and should be the first VM stood up once Proxmox is installed. I just very much prefer the former to the latter and am determined to ride it out to the end. I should note that Sophos UTM9 will likely lose support at some point in the next several years as Sophos continues to emphasize the XG platform (which is also free). I use the UTM9 to organize the lab into segments by category (ie: web application vulnerabilities, remote code execution flaws, Windows domain practice, etc.) which makes things significantly easier to manage. My own lab environment, which I maintain for both personal use and university instruction, is built on Proxmox and Sophos UTM9. If those are your technological preferences, I highly recommend a read. Several years ago, we did a post on virtual networking in ESXi and pfSense. Labgopher is a nice tool for keeping track of good deals on ebay. Picking up an older Dell R710 on ebay, Craigslist, or through a reseller/rehabber isn’t nearly as soul-crushingly expensive as one might expect. Nowadays, this kind of setup doesn’t have to be exclusive to the enterprise. To take things to the next level, however, you really need a hypervisor like ESXi or Proxmox. The most straightforward option is to simply spin up VMs in VirtualBox or VMWare Player and manage everything locally. One of the best ways to acquire and maintain an offensive security skill set is to build a home lab and populate it with intentionally vulnerable machines.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |