Defining the project’s structure
In this chapter, we will use a Terraform project structure similar to what we had in Chapter 4, Setting Up Isolated Penetration Testing Lab Environments on GCP. While there are similarities between the lab environments in the previous chapter and this one, the lab environment in this chapter will have a few additional components to give it a bit more complexity:
Figure 5.4 – What our lab setup looks like (without the network environment)
One of the major components of the lab environment in this chapter will be a secure secrets store (Azure Key Vault) where we will store one of the flags. We will also make it possible for lab users (assuming the role of an attacker) to break out of a running container and gain unauthorized access to the host system inside the VM instance. Once access to the host system has been obtained, a system-assigned managed identity will allow access to the Azure Key Vault secrets from...