Hacker Kayra
  • 📍Introduction Page
  • ⭐Learning Process
    • 🧠Learning Mindset
    • 🖇️Learning Dependencies
    • 🧮Learning Process
  • 🔠Fundamentals
    • 🛜Networking Fundamentals
    • 🐧Linux Fundamentals
    • 🪟Windows Fundamentals
    • 🕵️Active Directory
    • 🕸️Introduction to Web Applications
    • 🗃️Other Useful Concepts
      • Regular Expressions (RegEx)
    • Cyber Security Products
      • Lab Setup
      • ✅Fortigate Firewall
      • MDM Lab
      • IAM Lab
      • PAM Lab
      • DLP Lab
  • 🧰Tools
    • Nmap
    • Nessus
    • Ffuf
    • Hydra
    • John The Ripper
  • ✍️Write Ups
    • 🗃️Hack The Box Machines
      • 🐧Linux
        • Code
    • 🗃️Proving Grounds Boxes
      • 🐧Linux
        • Stapler
        • eLection
        • Loly
        • Blogger
        • Potato
        • Amaterasu
        • Exfiltrated
        • Pelican
        • Astronaut
        • Cockpit
        • Levram
        • Extplorer
        • LaVita
        • pc
        • Scrutiny
        • Zipper
        • Flu
        • Twiggy
        • Codo
        • Crane
        • Hub
        • BlackGate
        • Boolean
        • ClamAV
        • PayDay
        • Snookums
        • Bratarina
        • Nibbles
      • 🪟Windows
        • Algernon
        • AuthBy
        • Craft
        • Kevin
        • Squid
        • Jacko
        • DVR4
        • Hepet
        • Shenzi
        • Nickel
        • Slort
        • MedJed
        • Active Directory
          • Access
          • Vault
    • 🪪Certificates
      • Certified Professional Penetration Tester (eCPPTv3)
      • Web Application Penetration Tester eXtreme (eWPTXv3)
    • 🚩CTF Events
      • Cyber Hub 2025 CTF
  • 📚Study Notes
    • Penetration Tester (HTB CPTS)
      • Penetration Testing Process
      • Reconnaissance, Enumeration & Attack Planning
        • Network Enumeration with Nmap (Continue Here)
        • Footprinting (Just Do Formatting)
        • Vulnerability Scanning (Check)
        • File Transfers
        • Using the Metasploit Framework
        • Web Information Gathering
        • Shells & Payloads
      • Exploitation & Lateral Movement
        • Attacking Common Services (Just Do Formatting)
        • Password Attacks
        • Active Directory Enumeration & Attacks (TBC)
        • Pivoting, Tunneling, and Port Forwarding
      • Web Exploitation
        • Using Web Proxies (Check)
        • Attacking Web Applications With Ffuf (Check)
        • Login Bruteforcing
        • Cross-Site Scripting (XSS)
        • Command Injection
        • SQL Injection
        • File Upload Attacks
        • File Inclusion
        • Web Attacks (Check)
        • Attacking Common Applications (Check)
      • Post-Exploitation
        • Linux Privilege Escalation
        • Windows Privilege Escalation (TBC)
      • Documentation & Reporting
  • 🧑‍💻Other
    • Leet Code
      • Quick Guide: Big-O Notation
      • Problem 01 - Two Sum
    • Data Structure & Algorithms (DSA)
  • 🗄️Archive/Backup/Bin
    • Sysmon Usecases (IBM)
    • 🐧Linux Fundamentals (TryHackMe)
      • Introduction
      • Basic Commands
      • Wildcards & Operators
      • Permissions
      • Common Directories
      • Terminal Text Editors
      • General/Useful Utilities
    • 🪟Windows Fundamentals (TryHackMe)
      • Introduction
      • The File System
      • User Accounts
      • Settings & Control Panel & Task Manager
      • System Configuration
    • Active Directory (TryHackMe)
      • Breaching Active Directory
    • FOR508: Advanced Incident Response, Threat Hunting, and Digital Forensics
      • Book 2 - Intrusion Analysis
        • Credential Theft
        • Event Log Analysis for Responders and Hunters
    • Certified Threat Hunting Professional (eCTHPv2)
      • Threat Hunting: Hunting the Endpoint & Endpoint Analysis
        • Event IDs, Logging, & SIEMs
    • OSCP
      • Report Writing
      • ✅Passive Information Gathering
      • ✅Active Information Gathering
      • ✅Vulnerability Scanning
      • Introduction to Web Application Attacks
      • Common Web Application Attacks
        • ✅Cross-Site Scripting (XSS)
        • ✅Directory Traversal
        • ✅File Inclusion
        • ✅File Upload Vulnerabilities
        • Command Injection
        • SQL Injection Attacks
        • Client Side Attacks
      • ✅Locating Public Exploits
      • ✅Exploiting Walkthrough
      • Fixing Exploits
      • ✅Antivirus Evasion
      • Password Attacks
      • Windows Privilege Escalation
      • Linux Privilege Escalation
      • Port Redirection and SSH Tunneling
      • Tunneling Through Deep Packet Inspection
      • The Metasploit Framework
      • Active Directory Introduction & Enumeration
      • Attacking Active Directory Authentication
      • Lateral Movement in Active Directory
      • Assembling the Pieces
      • Other General Information
    • ⚡Port Swigger (Web Penetration Testing)
      • ✅Information Disclosure
      • ✅Path Traversal (Directory Traversal)
      • ✅OS Command Injection
      • Business Logic Vulnerabilities
      • ✅Authentication
      • ✅Access Control
    • Certified Bug Bounty Hunter (CBBH)
      • Web Requests
        • HTTP Fundamentals
    • Getting Started
      • Introduction
      • Pentesting Basics
    • Certified Penetration Testing Specialist (CPTS)
      • Introduction
        • ✅Penetration Testing Process
          • Penetration Testing Overview
          • Laws & Regulations
          • Penetration Testing Process
          • Pre-Engagement
          • Information Gathering
          • Vulnerability Assessment
          • Exploitation
          • Post-Exploitation
          • Lateral Movement
          • Proof-of-Concept
          • Post-Engagement
          • Practice
          • Academy Module Layout
        • Getting Started with Hack The Box (HTB)
      • Reconnaissance, Enumeration & Attack Planning
        • ✅Network Enumeration with Nmap
          • Enumeration & Introduction to Nmap
          • Host Discovery
          • Host and Port Scanning
          • Saving The Results
          • Service Enumeration
          • Nmap Scripting Engine
          • Scanning Performance
          • Firewall and IDS/IPS Evasion
        • Footprinting
        • ✅Information Gathering - Web Edition
          • Introduction
          • Passive Information Gathering
          • Active Information Gathering
        • Vulnerability Assessment
        • File Transfers
        • Shells & Payloads
        • Using the Metasploit Framework
      • Exploitation & Lateral Movement
        • Password Attacks
        • Attacking Common Services
        • Pivoting, Tunneling, and Port Forwarding
        • Active Directory Enumeration & Attacks
      • Web Exploitation
        • Using Web Proxies
        • ✅Attacking Web Applications with Ffuf
        • ✅Login Brute Forcing
        • SQL Injection Fundamentals
        • SQLMap Essentials
        • Cross-Site Scripting (XSS)
        • File Inclusion
        • File Upload Attacks
        • Command Injections
        • Web Attacks
        • Attacking Common Applications
      • Post-Exploitation
        • Linux Privilege Escalation
        • Windows Privilege Escalation
      • Reporting & Capstone
        • Documentation & Reporting
        • Attacking Enterprise Networks
    • Old Active Directory
    • Tib3rius Privilege Escalation
      • Linux Privilege Escalation
    • HTB Archived Write-Ups (Check)
      • Irked
      • Nibbles
      • Brainfuck
      • Lame (Check)
    • 📋Cheat Sheets
      • Penetration Testing Cheat Sheet (In Progress)
Powered by GitBook
On this page
  • Setting Up & Installation
  • Importing OS Images
  • Setting up Local Network
  • Fortigate Setup
  • Switch Configuration
  1. Fundamentals
  2. Cyber Security Products

Lab Setup

Setting Up & Installation

  • For this lab, I used EVE-NG to emulate a simple network environment. I downloaded and installed the following:

    • Eve-ng community edition from their website: https://www.eve-ng.net/index.php/download/

    • Eve-ng windows client side (Optional, for wireshark and vnc for windows machiens)

    • FileZilla (To transfer the object files through FTP)

    • OS Images, you can find these online, I got some from here, https://drive.google.com/file/d/1M9LGlev0IgXNQvCbrqtGcAdTJTRIMZLX/view and others like the fortigate firewall I downloaded manually (More on that below)

  • After creating the VM in VMware and completing the setup, I logged in to the console using root:eve. When accessing the web GUI, use admin:eve, I spent several minutes trying to log in as root before realizing no error message appears to indicate the correct credentials.

Importing OS Images

  • To add devices (switches, routers, PCs, etc.), first import their OS images:

  • On the EVE-NG VM, navigate to /opt/unetlab/addons/, which contains three subfolders:

    • dynamips (Cisco routers)

    • iol (Linux-based images)

    • qemu (other generic images)

  • Each image must follow a specific naming convention. For example, for FortiGate:

    • Download the KVM file from the FortiGate support site.

    • Check the naming convention at https://www.eve-ng.net/index.php/documentation/qemu-image-namings/ (for FortiGate, it should be virtioa.qcow2).

    • Rename the file to virtioa.qcow2.

    • Create a new folder under /opt/unetlab/addons/qemu/ named fortinet-FGT-7.2.11/, grant it full permissions (chmod 777), and place the renamed file there.

Setting up Local Network

  • My simple local network setup included:

    • 1 FortiGate firewall

    • 1 core switch

    • 2 additional switches

    • 4 PCs (2 connected to each switch)

    • 1 management network (to simulate WAN for FortiGate)

  • This is how the topology should look:

  • Right-click the workspace, choose Network, then Management to add the management network.

  • Add the four PCs, then the switches, and finally the FortiGate.

  • While all devices are powered off, connect them as per the diagram.

  • Power on all devices and begin configuration.

Fortigate Setup

  • Log in to verify the license.

  • Navigate to Network -> Interfaces.

    • Port1: WAN (no additional configuration needed).

    • Port2:

      • Role: LAN

      • Addressing Mode: Manual

      • IP/Netmask: 192.168.1.1/255.255.255.0

      • DHCP Server: On

      • Address Range: 192.168.1.100 to 192.168.1.200

      • Default Gateway: 192.168.1.1

      • DNS Server: “Same as System DNS” or specify (8.8.8.8, 8.8.4.4)

  • Configure a firewall policy to allow LAN-to-WAN access:

    • Go to Policy & Objects → IPv4 Policy.

    • Click Create New.

      • Name: LAN_to_WAN_Access

      • Incoming Interface: Port2 (LAN_Network)

      • Outgoing Interface: Port1 (WAN)

      • Source: All

      • Destination: All

      • Schedule: Always

      • Service: ALL (for lab simplicity)

      • Action: ACCEPT

      • NAT: Enabled (“Use Outgoing Interface Address”)

      • Log Allowed Traffic: Enable all sessions or security events

Switch Configuration

On each switch I had to do some configurations,

Main Switch

enable
configure terminal

! Port to FortiGate LAN (port2)
interface G0/2
 description Link-to-FortiGate-LAN
 switchport mode access
 spanning-tree portfast
 no shutdown
exit

! Port to Switch 2
interface G0/0
 description Link-to-SW2
 switchport mode access
 no shutdown
exit

! Port to Switch 3
interface G0/1
 description Link-to-SW3
 switchport mode access
 no shutdown
exit

end
write memory

Switch 1

enable
configure terminal

! Port to Main Switch (SW1)
interface G0/0
 description Link-to-SW1
 switchport mode access
 no shutdown
exit

! Ports for PCs
interface G0/1
 description To-PC1
 switchport mode access
 spanning-tree portfast
 no shutdown
exit

interface G0/2
 description To-PC2
 switchport mode access
 spanning-tree portfast
 no shutdown
exit

end
write memory

Switch 2

enable
configure terminal

! Port to Main Switch (SW1)
interface G0/0
 description Link-to-SW1
 switchport mode access
 no shutdown
exit

! Ports for PCs
interface G0/1
 description To-PC3
 switchport mode access
 spanning-tree portfast
 no shutdown
exit

interface G0/2
 description To-PC4
 switchport mode access
 spanning-tree portfast
 no shutdown
exit

end
write memory
  • Once complete, each device should have its own IP address and be able to communicate with the rest of the network and access the internet.

PreviousCyber Security ProductsNextFortigate Firewall

Last updated 18 hours ago

🔠
FortiGate KVM
Simple Topology