[{"categories":["guides","active directory","penetration testing"],"content":"Introduction In this blog post I will be providing instructions for how to install the GOAD (Game of Active Directory) Lab on Arch Linux. In addition to installing the GOAD lab environment,I will also be installing the “Exchange” (Mail System), “Wazuh” (EDR), and “Elk” (SIEM) GOAD Lab Extensions Requirements RAM Requirements In this guide I will be showing how to configure VMware to use your Arch Linux Systems “swap” partition for additional RAM. I do not recommend using your “swap” partition as additional RAM if the swap partition resides on a storage medium that is not solid-state (SSD). Using your “swap” partition as RAM allows for running the GOAD AD Lab with less than the required amount of system ram. Please find what I would recommend as bare minimums for each lab configuration. “GOAD” Lab (without any lab extensions) At least 16 GB of free RAM with 32 GB of swap space. At least 24 GB of free RAM (not using swap) “GOAD” Lab (with “Exchange” extension) At least 32 GB of free RAM with 32 GB swap space. At least 42 GB of free RAM (not using swap) “GOAD” Lab (with “Exchange”, “Elk”, and “Wazuh” extension) At least 46 GB of free RAM with 32 GB of swap space. At least 64 GB of free RAM (not using swap) Other Requirements 140 of storage space 10 to 15-minutes of initial setup additional 1 to 1.5 hours for “GOAD” lab with no extensions additional 1 to 1.5 hours for “Exchange” lab extension additional 20 minutes for “Elk” lab extension additional 20 minutes for “Wazuh” lab extension VMware Workstation a host machine running Arch Linux Instructions Find a Location That You Will Store the Lab-Related Files (140 GB of Free Space) df -h # identify a mount location with at least 140 GB of free space For my system the /data parition has at least 140 GB of free space. In the following instructions, replace /data with whichever location you plan on using. Create a Directory to Store All GOAD-Related Files In. mkdir /data/ad-lab Define an environmental variable to ensure the vagrant boxes are saved under this location. mkdir /data/ad-lab/.vagrant export VAGRANT_HOME=\"/data/ad-lab/.vagrant\" echo 'export VAGRANT_HOME=\"/data/ad-lab/.vagrant' \u003e\u003e $HOME/.bashrc #if using bash echo 'export VAGRANT_HOME=\"/data/ad-lab/.vagrant' \u003e\u003e $HOME/.zshrc # if using zsh Install vagrant, vagrant-vmware-utility, python-virtualenv, dnsmasq, and vmware-workstation yay -Sy vagrant vagrant-vmware-utility python-virtualenv dnsmasq vmware-workstation Note: If it is your first time installing VMware workstation, then you might need to build or load some VMware specific kernel modules. The Arch Linux Wiki page for VMware contains instructions. Configure VMware Network Start VMware Network Editor: sudo vmware-netcfg There will be a list of “vmnet” adapters within the window that opened. Configure it so that the vmnet3 “host-only” adapter has a subnet of “192.168.58.0” and a DHCP Mask of “255.255.255.0”. Next, save and exit that window. Configure the Vagrant-Vmware-Utility Service Run the following commands: sudo /opt/vagrant-vmware-desktop/bin/vagrant-vmware-utility service uninstall sudo /opt/vagrant-vmware-desktop/bin/vagrant-vmware-utility certificate generate sudo /opt/vagrant-vmware-desktop/bin/vagrant-vmware-utility service install sudo systemctl restart vagrant-vmware-utility Clone the GOAD Repository git clone \"https://github.com/Orange-Cyberdefense/GOAD\" /data/ad-lab/GOAD Install Vagrant Plugin Dependencies First, ensure the environment variable $VAGRANT_HOME is correctly set to the .vagrant directory we created earlier (export VAGRANT_HOME=/data/ad-lab/.vagrant). Next, install the vagrant plugin dependencies: vagrant plugin install vagrant-reload vagrant-vmware-desktop winrm winrm-fs winrm-elevated optional (only if using “swap” parition as additional RAM) run sudo vmware, then go to “edit” menu -\u003e “Preferences” -\u003e “Memory” -\u003e “Additional Memory” option -\u003e Select “Allow some virtual machine memory to be swapped” -\u003e “close” If you are unsure if you have a swap","date":"2025-12-06","objectID":"/posts/goad-ad-lab-setup-guide-arch-linux/:0:0","tags":["goad","guide","active directory","lab","ad","how to","archlinux"],"title":"How to Install the GOAD (Game Of Active Directory) Lab on Arch Linux","uri":"/posts/goad-ad-lab-setup-guide-arch-linux/"},{"categories":["guides","certifications","penetration testing"],"content":"Introduction November 2025 (Update) Hello Folks, As of Today, November 4th, 2025 I have updated this OSCP guide to contain my current recommendations and up-to-date information. Prerequisites This blog post will assume you already have a decent understanding of the foundational subjects. If you are unsure if you need to allocate time into learning the foundation, then head over to TCM Security’s Blog Post and utilize the section from the blog post on the various foundational subjects and the resources to learn them. Before Purchasing the PEN-200 (OSCP) Package Before you purchase the PEN-200 package which starts the 3-month lab access timer, I recommend completing the following steps. TCM Security Training I’m not being paid to shill TCM’s training, but I did use it for my preparation and I found it to be beneficial and valuable. I would recommend doing one of the following options: Option One - PNPT Package If you can afford this option, I would recommend it as both the Windows and Linux Privilege Escalation by TCM Security are only accessible VIA the PNPT package. Additionally, preparing for and passing the PNPT would teach you a significant portion of what is required for the OSCP. I passed the PNPT certification prior to starting my OSCP preparation and I don’t regret it. If you choose this route, ensure that you complete all of the courses included in the PNPT package. Options Two - One Month All Access Pass A more affordable option is to purchase one month of the All Access Pass to TCM Security’s academy. However, this option doesn’t provide access to the Linux or Windows Privilege Escalation Training. If you choose this option, be sure to complete the following TCM Security courses: Practice Ethical Hacking OSINT Fundamentals Practical Web Hacking To learn privilege escalation for both Windows and Linux, I would recommend taking the following approach. For each of the privilege escalation techniques mentioned in the following resources, do the following: Ask yourself “Do I understand how this technique can achieve privilge escalation?”. If the answer is “no”, then take some time to research the particular feature or functionality that it is taking advantage of to better understand how it works. Create a note that includes how the technique works, how to tell if the technique can be used to escalate privileges, how to perform the technique, and how the technique is mitigated. Practice the technique in a TryHackMe room or in an offline lab environment. HackTricks - Linux Privilege Escalation Cheatsheet HackTricks - Linux Privilege Escalation HackTricks - Windows Privilege Escalation Cheatsheet HackTricks - Windows Privilege Escalation Through the process of completing the above courses, you should start to work to figure out your note-taking and organization system. I use Obsidian for note-taking, but I believe Obsidian, Notion or Joplin will suffice for the majority of people. However, I would advise giving each of these note-taking solutions an honest try several days try before settling on a single solution. As, Obsidian has a sort of learning curve where you likely won’t realize the power of the modular plugin system and the possibilities until you have spent at least a few days (several hours) tinkering with your Obsidian vault. Active Directory Hacking After completing one of the options from the previous step, I would recommend installing the GOAD AD Lab. For those unfamiliar, the GOAD AD Lab is an open-source project that automates the deployment of an advanced Active Directory lab environment which allows you to practice enumeration, initial access, and lateral movement techniques that were not covered by TCM Security’s Practical Ethical Hacking course. Attempt to perform the active-directory-related techniques from the Practical Ethical Hacking course without looking anything up. Strictly use your notes as a reference for how to perform those techniques. This will help you identify any gaps in your notes. Be sur","date":"2025-11-19","objectID":"/posts/oscp-guide/:0:0","tags":["oscp","exam","certification","penetration testing","guide","pen200","pen-200","offsec"],"title":"Jorkle's OSCP Guide (November 2025)","uri":"/posts/oscp-guide/"}]