🏗️ The Killbox: Trapper Range

A 100% Free, Multi-Target Cyber Security Sandbox & Automated Hacking Lab

🛡️ Zero-Risk Execution Transparency

This laboratory functions completely inside an air-gapped hypervisor isolation layer. No modifications, alterations, or background software configurations ever execute on your physical host laptop [01-Hypervisors, 02-ISO-Archive]. Your Windows 11 host registry parameters and local account databases remain entirely untouched while host Core Isolation / Memory Integrity properties remain active [01-Hypervisors, 02-ISO-Archive].

ACTIVE RANGE FOREST

🌲 Enterprise AD-DS Directory

Windows Server 2025 domain structure pre-loaded with exactly 2,491 fuzzed user profiles, tiered Organizational Units (OUs), and nested computer targets for intense password spraying and roasting practice [01-Hypervisors, 02-ISO-Archive].

BOOT-TO-ROOT CATALOG

🐧 Multi-OS Vulnerable Targets

Includes separate, host-isolated targets across our private network switch: DC-1 (vulnerable Drupal CMS), SickOs (proxy server misconfigurations), and Kioptrix Level 1 (legacy service auditing) [01-Hypervisors, 02-ISO-Archive].

DEVSECOPS IAAS

🤖 Automation Core

Built completely utilizing Infrastructure-as-Code principles. Fully automated deployment templates stand up multiple complex networks, interfaces, and domains completely hands-free [01-Hypervisors, 02-ISO-Archive].

📟 Quick Deployment Console

# Host PowerShell (Run as Administrator)
PS C:\> winget install HashiCorp.Vagrant --silent --accept-source-agreements --accept-package-agreements
PS C:\> git clone https://github.com/ReconTrapper/Hacking-Playground-.git
PS C:\> cd Hacking-Playground-
PS C:\> vagrant up
🚨 Absolute Sandbox Safety Guarantee (No-Host-Risk Blueprint)

100% Isolated: All underlying virtual machines, penetration testing scripts, and network port sweeps operate inside an air-gapped internal switch layout (LabNet) [01-Hypervisors, 02-ISO-Archive]. It is physically impossible for traffic to bleed onto your local Wi-Fi, compromise your home router, or interact with your host filesystems [01-Hypervisors, 02-ISO-Archive].

Zero Residual Footprint: If anything breaks or you want to wipe the lab completely off your drive, simply run vagrant destroy -f inside this directory [01-Hypervisors, 02-ISO-Archive]. It will instantly purge the RAM, clear the allocations, and wipe the virtual hard drives completely—leaving your host laptop clean [01-Hypervisors, 02-ISO-Archive].

🔍 What Happens Under the Hood (Chronological Timeline)

1. Automated Dependency Mounting (Winget Verification)

The winget command connects directly to Microsoft's official app store channels to download HashiCorp Vagrant and Oracle VirtualBox silently in the background, updating all global environment system variable paths automatically [Source: GitHub Documentation].

2. Isolated Subnet Mapping (Private Switch Integration)

When you execute vagrant up, the virtualization engine builds an internal, host-only virtual network switch switch layer (LabNet / 10.0.2.0/24) [01-Hypervisors, 02-ISO-Archive]. This ensures all downstream exploits, network sweeps, and fuzzed target vectors remain completely air-gapped from your physical home Wi-Fi network [01-Hypervisors, 02-ISO-Archive].

3. Headless Operating System Streaming (Base Box Caching)

Vagrant communicates with secure cloud image mirrors to download the official base image templates for Kali Linux and Windows Server Evaluation [01-Hypervisors, 02-ISO-Archive]. It automatically provisions separate virtual disk drives and maps hardware constraints (memory allocations, virtual CPUs) cleanly.

4. Active Directory Forest Automation (Domain Elevation)

The script signs into the fresh Windows Server instance, launches native PowerShell automation, installs the Active Directory Domain Services (AD-DS) framework role, elevates the server to a root domain controller forest named trapped.local, and issues an automated system restart.

5. Range Database Fuzzing Matrix (Target Generation)

The script invokes the BadBlood engine completely inside the virtual boundaries of the server [01-Hypervisors, 02-ISO-Archive]. It generates multi-tiered Organizational Units and injects exactly 2,491 randomized user targets directly into the isolated directory file [01-Hypervisors, 02-ISO-Archive]. Concurrently, it misconfigures realistic security flaws like disabling pre-authentication for targeted AS-REP Roasting training [01-Hypervisors, 02-ISO-Archive].

6. Boot-to-Root Catalog Synchronization (Multi-VM Launch)

Vagrant finishes by downloading and launching your preconfigured Linux-based target endpoints (DC-1 Drupal Server, SickOs, Kioptrix), linking them seamlessly to the exact same private subnet and leaving you with a weaponized, production-grade cyber sandbox range completely ready for training [01-Hypervisors, 02-ISO-Archive]!