Offensive Security • Private Lab

Red Team Homelab — Access Gate

Cipher Challenge

Prove you can read between the streams. Decrypt the string below and verify it. If you succeed, email me the exact plaintext and you may get private access to the lab targets.

Layers: 2
ckA/OEMyRURbIEpARiA0QzI0PDY1IEU5NiA0OkE5NkNdIHQ+Mjo9ID42IEU5OkQgPjZERDI4NiAyPzUgeFY9PSA4Okc2IEpARiAyNDQ2REQgRUAgRTk2ID0yMyBFQCA5Rj9FIEdGPT82QzIzOj06RTo2RF0=
Hint #1: Two layers only.
Hint #2: One of them speaks of 47.
Hint #3: The other one is more… basic.
Email proof

Status & Progress

30%
Lab buildPhase: Setup
Integrating ELK, automation scripts, and target rotation.
  • ⚑ Can you break the cipher?
  • ⚑ If you reach the lab, can you find all the vulnerabilities?
  • ⚑ Operate ethically. Simulations only. Consent first.

Targets (Planned)

  • DVWA • Juice Shop
  • AD mini-domain (Server 2022 + Clients)
  • Custom vulnerable services

Stack & Network

  • VirtualBox/VMware • pfSense • VLANs
  • Kali/Parrot • Burp • Metasploit
  • ELK • Nmap • Wireshark

Rules of Engagement

  • Operate only inside the lab ranges
  • No production, no third‑party systems
  • Document steps, avoid collateral impact