To fully utilize the capabilities of EDRmetry Matrix, you need a dedicated testing environment. To eliminate the need to purchase access to a commercial Cyber ​​Range environment, we decided that the best solution would be to enable EDRmetry to run in your own lab, including on your desktop as a Virtual Machine.

A dedicated image of TARGET_X VM has been prepared for these needs. You can download and deploy it within your own network and have full private access.

1. TARGET_X - The main Linux VM where you run offensive tests and where you can install the EDR/Runtime Security engine of your choice:

  • Linux Distribution = RHEL9/Alma9

  • Default targets → vulnerable components and services are installed by default

  • Deployment scripts or step-by-step instructions for EDR/Runtime Security deployment:

    • It's up to you which EDR/Runtime Security engine you choose for testing. Just by default, there is no EDR/Runtime Security engine started @ TARGET_X.

2. KALI_X - your own internal attacker machine dedicated to handling local reverse shell connections, installing C2 frameworks, pivoting, and many more:

  • Linux Distribution = Kali Linux

3. C2_X - your own external attacker machine with a public IP dedicated to handling egress reverse shell connections, installing C2 frameworks, pivoting, and many more:

  • Linux Distribution = Kali Linux