html web templates

-sugar Star- — Knight Of Erin -v1.06-

Knight of Erin -v1.06- -Sugar Star- is an adult-oriented fantasy role-playing game developed by Fushimi Studio (often credited under circles like 伏見スタジオ). It is the enhanced, definitive version of the original Knight of Erin , incorporating significant gameplay refinements, additional content, and bug fixes up to version 1.06. The subtitle -Sugar Star- distinguishes this more complete release.

However, upon arrival, Erin discovers the local garrison is corrupt, the townsfolk are terrified, and a mysterious "Black Powder" is circulating the black market. Worse, her direct superior, a jaded knight-captain named , seems intent on humiliating or breaking her spirit. Erin must navigate political traps, dangerous dungeons, and her own growing physical vulnerabilities to uncover the truth behind Milvania’s decay—and decide what kind of knight she truly wants to be. Adult Content & Themes Note: This section is for informational clarity, not endorsement. Knight of Erin -v1.06- -Sugar Star-

This version is the most stable and feature-complete. Earlier versions (1.00–1.04) have significant bugs and missing content. Always verify you have the -Sugar Star- release. Final Recommendation Knight of Erin -v1.06- -Sugar Star- is best suited for players who enjoy dark fantasy , moral choice systems , and traditional JRPG gameplay (exploration, turn-based combat, equipment management) and do not object to non-consensual adult themes. If you prefer a pure heroic narrative or dislike content triggered by losing battles, this game is not recommended. Knight of Erin -v1

For those within its target audience, v1.06 offers a remarkably polished and reactive experience that stands above many similar adult RPG Maker titles. However, upon arrival, Erin discovers the local garrison

Lab Setup

You can build your own lab as elaborate as you would like. However, for the purpose of this class, the following virtual machines (VMs) will be used.

WebSploit

Kali + Additional Tools + Vulnerable Applications in Docker containers...

Raven

A vulnerable VM that you will use to perform a full assessment (from reconnassaince to full compromise)

VTCSEC

Another vulnerable VM that you will use to perform a full assessment (from reconnassaince to full compromise)

-sugar Star- — Knight Of Erin -v1.06-

This video explains how to setup the virtual machines in your system using Virtual Box.

Topology

The diagram below shows the lab architecture with WebSploit Full version, Raven, and VTCSEC. The VMs were created in Virtual Box. It is highly recommended that you use Virtual Box. However, if you are familiar with different virtualization platforms, you should be able to run the VMs in VMWare Workstation Pro (Windows), VMWare Fusion (Mac), or vSphere Hypervisor (free ESXi server). 

You should create a VM-only network to deploy your vulnerable VMs and perform several of the attacks using WebSploit (Kali Linux), as shown in the video above. You can configure a separate network interface in your WebSploit VM to connect to the rest of your network and subsequently the Internet. Preferably, that interface should be in NAT mode.

Mobirise

LAB GUIDES

Lab guides will be distributed during class...

Omar's Cybersecurity GitHub Repository 

Over 8,000 cybersecurity references related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more. 

Stay in Touch with Omar!

© Copyright 2020, Omar Santos - All Rights Reserved