Creating all kinds of labs¶ A wolverine’s guide to controlled carnage Infrastructure requirements Cloud vulnerabilities for challenges Challenge design principles Terraform vulnerable lab template Safety notes for cloud CTF labs Getting a foothold in the top of the world tree Redirectors’ tangled deception Bounce servers’ hidden rings Serpent-woven HTTP Backends’ sweet surrender The wind is automation’s invisible hand The crown: Attack machines at the summit