Internship Orangecyberdefense

A project that aims to deliver a comprehensive solution for red team operations, enabling advanced testing and training for cybersecurity professionals.

Overview

The goal of my internship was to provide Orange Cyberdefense with a robust, automated solution for efficiently setting up Red Team environments. The project consisted of analyzing the requirements for offensive security labs, architecting a modular infrastructure using Infrastructure as Code (OpenTofu), and integrating advanced security tools such as Mythic (C2), GoPhish, Evilginx, and Exegol.

We implemented a Python wrapper to automate the deployment and management of up to 255 isolated environments, each equipped with strict firewalling, VPN access, dynamic DNS configuration, and logging. The result was a future-proof platform that drastically reduced setup time and improved security and reproducibility for Red Team engagements.

The assignment emphasized automation, modularity, and security best practices, resulting in a professional solution ready for both internal use and client-facing engagements.

Architecture

Red Team Environment Architecture Diagram

The architecture is designed for modularity and security. Each client environment is isolated in its own virtual network, with dedicated servers for C2, phishing, attack, and VPN access. All environments are provisioned automatically using OpenTofu, Cloud-init and ansible, and managed centrally via the Python wrapper.

  • Each environment has its own subnet, firewall, and DNS records.
  • Centralized VPN gateway provides secure access for operators.
  • Reverse proxy (Nginx) routes traffic to internal services securely.
  • Logging and monitoring are aggregated for auditing and troubleshooting.

Features

Development Process

  1. Requirements & Research: Analyzed the needs of the Red Team, reviewed current tools, and defined the desired workflow.
  2. Design & Planning: Outlined the architecture—modular, scalable, and secure—choosing technologies such as OpenTofu, Mythic, and GoPhish.
  3. Implementation: Developed the Python wrapper, automated infrastructure deployment, integrated all core tools, and created secure access flows.
  4. Testing & Documentation: Deployed test environments, performed attack simulations, and delivered comprehensive user documentation.

Gallery

Exegol CLI Exegol CLI
Exegol GitHub Exegol GUI
Orange Pi Connection Network setup
Mythic C2 Mythic C2
GoPhish Dashboard GoPhish
Grafana Mythic Logs Grafana Mythic Logs
fake GitHub login page Fake GitHub Login Page

Technologies Used

Skills & Learning Outcomes

Team Members

Resources