Network 101

This skill should be used when the user asks to "set up a web server", "configure HTTP or HTTPS", "perform SNMP enumeration", "configure SMB shares", "test network services", or needs guidance on configuring and testing network services for penetration testing labs.

Author

zebbern

Category

Other Tools

Install

Hot:11

Download and extract to your skills directory

Copy command and send to OpenClaw for auto-install:

Download and install this skill https://openskills.cc/api/download?slug=sickn33-skills-network-101&locale=en&source=copy

Network 101 - Penetration Testing Network Service Configuration Guide

Skill Overview


Network 101 is a network service configuration guide designed specifically for penetration testing labs. It helps users quickly set up common network services such as HTTP, HTTPS, SNMP, and SMB for service enumeration, log analysis, and security testing practice.

Use Cases

1. Building a Penetration Testing Lab


When you need to create an isolated test environment to practice network service enumeration and security testing, Network 101 provides a complete configuration workflow. Whether you use Windows Server or Linux, you can quickly deploy a full target environment that includes web services, file sharing, and network monitoring services according to the guide.

2. Network Security Teaching and Practice


Network security instructors and students can use this skill to quickly build standardized service target environments in a classroom setting. Students can then practice identifying services and scanning for vulnerabilities using tools such as nmap, snmpwalk, and enum4linux.

3. Preparing CTF Competition Target Machines


CTF problem setters and participants can use this skill to configure standardized network service challenges, or to build a local practice environment to become familiar with default configurations and common vulnerabilities of various services.

Core Features

Quick Deployment of HTTP/HTTPS Servers


Provides complete configuration solutions for both Windows IIS and Linux Apache platforms, including self-signed SSL certificate generation, firewall rule setup, and service validation commands. Supports deploying web services suitable for testing within minutes, and allows creating mock scenarios that include login pages.

SNMP Service Configuration and Enumeration


Explains in detail the installation of SNMP services and the configuration of community strings. Provides a complete set of enumeration commands—from basic snmpwalk to brute-forcing community strings—helping users practice network device information collection skills.

SMB File Sharing Deployment


Covers both Windows native sharing and Linux Samba implementations. Supports configuring different permission levels for shared access, enabling comprehensive SMB service enumeration practice with tools such as smbclient, smbmap, and enum4linux.

Frequently Asked Questions

How can I quickly set up an HTTP server for penetration testing?


On Linux, you only need to run sudo apt install apache2 && sudo systemctl start apache2 to complete the basic installation. If you want to customize the page, edit the /var/www/html/index.html file. Don’t forget to configure the firewall to allow port 80: sudo ufw allow 80/tcp.

Why does SMB anonymous access fail?


Modern Windows systems disable SMBv1 and anonymous access by default. You’ll need to enable insecure guest logins via group policy or the registry, or in Linux Samba configure guest ok = yes and map to guest = bad user. Also, ensure the firewall allows port 445.

Should a penetration testing lab be isolated?


Yes. It is strongly recommended to completely isolate the penetration testing lab from production networks. Configuring these services carries security risks (such as SNMP v1/v2c plaintext transmission, weak community strings, anonymous SMB access, etc.). You should operate them only in a dedicated virtual network to avoid impacting real systems.