Skip to content

Shared Networks with Inter-Team Connectivity

Abstract

In a shared networks environment, multiple virtual machine (VM) environments are configured to communicate with one another across a shared common network. Unlike isolated environments, each environment in this configuration is given unique passwords, hostnames, and DNS records. This type of shared network setup simulates a real-world network where devices can interact, allowing users to experience and experiment with network dynamics in an Instructor-controlled environment. For more on shared networks environments, please visit the article titled Shared Networks Overview.


What is Inter-Team Connectivity?

Inter-Team Connectivity is the shared networks feature that, when enabled by the instructor, allows all VMs within a classroom to communicate as if they were connected to the same network switch. This instructor-controlled environment allows for seamless collaboration or competition within a class. When enabled, students can explore network interactions in multi-team scenarios, creating opportunities for cooperative or adversarial tasks.

When Inter-Team Connectivity is enabled, tools such as Nmap (Network Mapper) and Metasploit can be utilized to perform network discovery, vulnerability scanning, penetration testing, and analysis of networked systems. This feature allows students to work on real-world cybersecurity tasks, such as identifying open ports and potential security weaknesses in other teams' VMs and hardening their own systems against attacks.

Potential Risks and Best Practices

Enabling Inter-Team Connectivity can introduce certain risks in an educational setting. Students can access each other's systems (including instructor VMs) and potentially disrupt the educational environment with unauthorized remote code execution or the alteration of VM configurations on other student machines. To mitigate these risks, instructors should work closely with students to ensure their activities align with educational objectives. Understan that courseware -- published by the Cyber Range or yourself -- places students in learning situations where they have the opportunity to act maliciously, and it is the role of the educators to guide them.


Have a Question? Contact Support

We're here to help you. If you still have questions after reviewing the information above, please feel free to submit a ticket with our Support Team and we'll get back to you as soon as possible.