Please encrypt your important files to ensure confidentiality at all times.
Consists of virtual networks, vulnerability environments, attacking scripts, 50+ CVE’s etc
Hard to simulate and controlled environments
Ready-to-use experimental setups and private/isolated environments
Common components supporting wide range of activities
Helpful to streamline/expedite R&D, translation and delivery of new solutions
For educational & professional training
Useful for hands-on practice and skills assessment
Comes with modular environment setup
Various features like Web, Email, Databases, etc. and phases in Pentesting (Enumeration, Vulnerability Analysis, Exploitation) are covered in the environments
If you would like to explore the environment on NCL testbed for your projects/research,please reach out to us at support@ncl.sg for more information!
OT (Operational Technology) Testbed in cloud
Can be used to emulate Cyberattacks in SCADA systems (eg. 2015 Ukraine attack on Smart Grid)
In collaboration with ADSC
Leverage Open-Source Software to facilitate development/usage
Emulate all OT physical/embedded devices (e.g. sensor, PLC) into VM instances for safer and faster testing/development
In collaboration with ADSC
If you would like to explore the environment on NCL testbed for your projects/research,please reach out to support@ncl.sg for more information!
A Simulated Healthcare integrated with Windows Active Directory service
Provides dynamic and realistic environment with simultaneous access of attackers and users in various roles (e.g. Doctor, Patient) with simulated workflow
Facilitate more realistic testing/training
Support Role-based Access Management with multiple level of authentication
Configured with predefined users account (more than 1000)
Supports Data Anonymity to protect patient's information
If you would like to explore the environment on NCL testbed for your projects/research,please reach out to support@ncl.sg for more information!
Replay Log4Shell attack on NCL testbed
Explore and learn about Log4Shell (CVE-2021-44228) vulnerability
If you would like to explore the environment on NCL testbed for your projects/research,please reach out to support@ncl.sg for more information!
Cyber kill chain in a fintech environment
Common vulnerabilities in web applications based on OWASP Top 10
How such vulnerabilities could be discovered in real world web applications
How a successful kill-chain could be designed by chaining the vulnerabilities for remote code execution
If you would like to explore the environment on NCL testbed for your projects/research,please reach out to support@ncl.sg for more information!
Useful for cyber exercise or security product testing that require realistic white traffic to camouflage the attack traffic from the attackers
Generates realistic "white" traffic by generating human-behave activity with a system
OctoBot can generate several activities (e.g., web browsing, upload data) for web server and IT healthcare system
If you would like to explore the environment on NCL testbed for your projects/research,please reach out to support@ncl.sg for more information!
NCL provides support for the conduct of CTF events
Growing number of users from community
NCL has supported multiple CTF events for academia and agencies