Network 101
This skill should be used when the user asks to "set up a web server", "configure HTTP or HTTPS", "perform SNMP enumeration", "configure SMB shares", "test network services", or needs guidance on configuring and testing network services for penetration testing labs.
Author
zebbern
Category
Other ToolsInstall
Hot:11
Download and extract to your skills directory
Copy command and send to OpenClaw for auto-install:
Download and install this skill https://openskills.cc/api/download?slug=sickn33-skills-network-101&locale=en&source=copy
Network 101 - Penetration Testing Network Service Configuration Guide
Skill Overview
Network 101 is a network service configuration guide designed specifically for penetration testing labs. It helps users quickly set up common network services such as HTTP, HTTPS, SNMP, and SMB for service enumeration, log analysis, and security testing practice.
Use Cases
1. Building a Penetration Testing Lab
When you need to create an isolated test environment to practice network service enumeration and security testing, Network 101 provides a complete configuration workflow. Whether you use Windows Server or Linux, you can quickly deploy a full target environment that includes web services, file sharing, and network monitoring services according to the guide.
2. Network Security Teaching and Practice
Network security instructors and students can use this skill to quickly build standardized service target environments in a classroom setting. Students can then practice identifying services and scanning for vulnerabilities using tools such as nmap, snmpwalk, and enum4linux.
3. Preparing CTF Competition Target Machines
CTF problem setters and participants can use this skill to configure standardized network service challenges, or to build a local practice environment to become familiar with default configurations and common vulnerabilities of various services.
Core Features
Quick Deployment of HTTP/HTTPS Servers
Provides complete configuration solutions for both Windows IIS and Linux Apache platforms, including self-signed SSL certificate generation, firewall rule setup, and service validation commands. Supports deploying web services suitable for testing within minutes, and allows creating mock scenarios that include login pages.
SNMP Service Configuration and Enumeration
Explains in detail the installation of SNMP services and the configuration of community strings. Provides a complete set of enumeration commands—from basic snmpwalk to brute-forcing community strings—helping users practice network device information collection skills.
SMB File Sharing Deployment
Covers both Windows native sharing and Linux Samba implementations. Supports configuring different permission levels for shared access, enabling comprehensive SMB service enumeration practice with tools such as smbclient, smbmap, and enum4linux.
Frequently Asked Questions
How can I quickly set up an HTTP server for penetration testing?
On Linux, you only need to run
sudo apt install apache2 && sudo systemctl start apache2 to complete the basic installation. If you want to customize the page, edit the /var/www/html/index.html file. Don’t forget to configure the firewall to allow port 80: sudo ufw allow 80/tcp.Why does SMB anonymous access fail?
Modern Windows systems disable SMBv1 and anonymous access by default. You’ll need to enable insecure guest logins via group policy or the registry, or in Linux Samba configure
guest ok = yes and map to guest = bad user. Also, ensure the firewall allows port 445.Should a penetration testing lab be isolated?
Yes. It is strongly recommended to completely isolate the penetration testing lab from production networks. Configuring these services carries security risks (such as SNMP v1/v2c plaintext transmission, weak community strings, anonymous SMB access, etc.). You should operate them only in a dedicated virtual network to avoid impacting real systems.