Welcome to CyberLab.co!
This is where I conduct my ethical hacking and security research experiments and I report them here at CyberLab.co. According to the Penetration Testing Execution Standard (PTES) technical guidelines, there are seven sections to penetration testing. They are Pre-engagement Interactions, Intelligence Gathering, Threat Modeling, Vulnerability Analysis, Exploitation, Post Exploitation, and Reporting. All of my experiments will fall under any one of these seven sections.
I do not condone breaking any laws and what you do is your responsibility, not mine. With that, everything I am doing is in a lab environment. If you are following along with me on my research, allow me to help you get started and build your own Cyber Lab at home. We will begin by installing VirtualBox. VirtualBox will allow you to install multiple Operating Systems like Windows or Linux on your current computer. I prepared a step by step tutorial for you. Currently, I am doing this from a Mac computer. If you are on a Windows computer, you can try to attempt to do it on your own, installing VirtualBox is not difficult. I will come out with a Windows version very soon.
Click here to Get started and build your own cyber lab.
Thank you again for taking the time to join me as I experiment to satisfy my curiosity. If you want to learn more as much as I do, I also prepared a quick tutorial on how to scrape web pages. Scraping pages falls under intelligence gathering. I walk you through on how to scrape a webpage with the Python programming language.