Multiple attacker VMs (Kali, Parrot, Commando VM) - Windows Active Directory environment (DC + workstations) - Linux server targets (various distributions and configurations) - Vulnerable web applications (custom instances) - Network segmentation with virtual firewalls