Virtual Machines / C2
To fully utilize the capabilities of EDRmetry Matrix, you need a dedicated testing environment. To eliminate the need to purchase access to a commercial Cyber Range environment, we decided that the best solution would be to enable EDRmetry to run in your own lab, including on your desktop as a Virtual Machine.
A dedicated image of TARGET_X VM has been prepared for these needs. You can download and deploy it within your own network and have full private access.
1. TARGET_X - The main Linux VM where you run offensive tests and where you can install the EDR/Runtime Security engine of your choice:
Linux Distribution = RHEL9/Alma9
Default targets → vulnerable components and services are installed by default
-
Deployment scripts or step-by-step instructions for EDR/Runtime Security deployment:
It's up to you which EDR/Runtime Security engine you choose for testing. Just by default, there is no EDR/Runtime Security engine started @
TARGET_X.
2. KALI_X - your own internal attacker machine dedicated to handling local reverse shell connections, installing C2 frameworks, pivoting, and many more:
Linux Distribution = Kali Linux
3. C2_X - your own external attacker machine with a public IP dedicated to handling egress reverse shell connections, installing C2 frameworks, pivoting, and many more:
Linux Distribution = Kali Linux