المهارات network-101
📦

network-101

مخاطر متوسطة ⚙️ الأوامر الخارجية🌐 الوصول إلى الشبكة

Set Up Penetration Testing Lab

This skill helps security learners set up vulnerable network services in an isolated lab environment for hands-on penetration testing practice. It provides step-by-step instructions for configuring HTTP, HTTPS, SNMP, and SMB services with known configurations for safe testing.

يدعم: Claude Codex Code(CC)
⚠️ 65 ضعيف
1

تنزيل ZIP المهارة

2

رفع في Claude

اذهب إلى Settings → Capabilities → Skills → Upload skill

3

فعّل وابدأ الاستخدام

اختبرها

استخدام "network-101". Set up HTTP server for testing

النتيجة المتوقعة:

Commands to install Apache, start the service, configure firewall rules for port 80, and verify the server is running using curl.

استخدام "network-101". Configure SNMP enumeration target

النتيجة المتوقعة:

Steps to install snmpd, configure community strings, restart the service, and test with snmpwalk commands.

استخدام "network-101". SMB enumeration commands

النتيجة المتوقعة:

Example commands using smbclient, smbmap, and enum4linux to discover shares, users, and policies on a target system.

التدقيق الأمني

مخاطر متوسطة
v1 • 2/24/2026

This is a legitimate penetration testing education skill for setting up lab environments. Static findings mostly represent false positives (legitimate admin commands, test URLs). However, the skill configures vulnerable services (default SNMP communities, chmod 777) that pose real risks if used improperly. Requires warnings about authorized use only in isolated lab environments.

1
الملفات التي تم فحصها
348
الأسطر التي تم تحليلها
7
النتائج
1
إجمالي عمليات التدقيق
مشكلات متوسطة المخاطر (3)
Overly Permissive File Permissions
Skill instructs using chmod 777 on Samba share directories (lines 176, 329). This creates world-writable directories that could be exploited if applied to production systems.
Default SNMP Community Strings
Skill configures SNMP with default community strings 'public' and 'private' (lines 127-128). These are well-known credentials that could expose systems if deployed improperly.
Potential Misuse for Unauthorized Access
Skill teaches enumeration techniques (nmap, snmpwalk, enum4linux) that could be misused against systems without authorization. While framed as lab setup, the techniques could be applied to unauthorized targets.
مشكلات منخفضة المخاطر (2)
Self-Signed SSL Certificates
Skill generates self-signed certificates for HTTPS testing. While appropriate for labs, this pattern should not be used in production.
Service Enablement at Boot
Skill configures services (apache2, smbd, snmpd) to start automatically via systemctl enable.

عوامل الخطر

⚙️ الأوامر الخارجية (1)
🌐 الوصول إلى الشبكة (1)
تم تدقيقه بواسطة: claude

درجة الجودة

38
الهندسة المعمارية
100
قابلية الصيانة
87
المحتوى
50
المجتمع
46
الأمان
100
الامتثال للمواصفات

ماذا يمكنك بناءه

Security Certification Prep

Security professionals preparing for CEH, OSCP, or CompTIA Security+ can use this skill to set up practice environments for enumeration techniques.

Cybersecurity Training Labs

Instructors can use this skill to quickly configure vulnerable target systems for hands-on training sessions.

Home Lab Security Practice

Learners can set up their own home labs to practice network reconnaissance and service enumeration safely.

جرّب هذه الموجهات

Basic Lab Setup
Use the network-101 skill to set up an HTTP server on port 80 for my penetration testing lab.
SNMP Configuration
Configure SNMP service with community strings for enumeration practice. Show me the commands to set up snmpd on Linux.
SMB Share Setup
Set up a Samba share with anonymous access for my lab environment. Include steps for configuring permissions.
Enumeration Commands
Show me how to enumerate the SMB service using enum4linux and smbmap. My target IP is 192.168.1.100.

أفضل الممارسات

  • Always use this skill in isolated, air-gapped lab environments separate from production networks
  • Document all changes made to lab systems and maintain separate credentials from production
  • Regularly rebuild lab systems to ensure clean, known states for testing

تجنب

  • Never apply configurations from this skill to production or internet-facing systems
  • Do not use default community strings (public/private) outside of isolated labs
  • Avoid leaving services enabled with chmod 777 permissions on any network

الأسئلة المتكررة

Is this skill safe to use?
This skill is safe when used ONLY in isolated lab environments for authorized security testing. Never apply these configurations to production systems or networks you do not own.
What tools does this skill cover?
The skill covers nmap for port scanning, snmpwalk for SNMP enumeration, smbclient and smbmap for SMB enumeration, and enum4linux for comprehensive SMB/NetBIOS enumeration.
Can I use this skill for OSCP exam prep?
Yes, this skill is excellent for OSCP and other penetration testing certification preparation. It helps you understand how services are configured and enumerated.
Does this skill perform exploitation?
No, this skill only covers service configuration and enumeration techniques, not exploitation. It sets up vulnerable targets for safe practice.
What operating systems are supported?
The skill covers both Linux (Apache, Snmpd, Samba) and Windows (IIS, Windows SNMP Service, Windows SMB) configurations.
Why are default credentials used in this skill?
Default SNMP communities (public/private) and anonymous SMB access are configured intentionally for lab practice. These represent common misconfigurations that security testers encounter.

تفاصيل المطور

المؤلف

sickn33

الترخيص

MIT

مرجع

main

بنية الملفات

📄 SKILL.md