{"id":"320a8cff-911b-4c99-a621-33e58b5907f6","shortId":"4kE38E","kind":"skill","title":"network-101","tagline":"Configure and test common network services (HTTP, HTTPS, SNMP, SMB) for penetration testing lab environments. Enable hands-on practice with service enumeration, log analysis, and security testing against properly configured target systems.","description":"# Network 101\n\n## Purpose\n\nConfigure and test common network services (HTTP, HTTPS, SNMP, SMB) for penetration testing lab environments. Enable hands-on practice with service enumeration, log analysis, and security testing against properly configured target systems.\n\n## Inputs/Prerequisites\n\n- Windows Server or Linux system for hosting services\n- Kali Linux or similar for testing\n- Administrative access to target system\n- Basic networking knowledge (IP addressing, ports)\n- Firewall access for port configuration\n\n## Outputs/Deliverables\n\n- Configured HTTP/HTTPS web server\n- SNMP service with accessible communities\n- SMB file shares with various permission levels\n- Captured logs for analysis\n- Documented enumeration results\n\n## Core Workflow\n\n### 1. Configure HTTP Server (Port 80)\n\nSet up a basic HTTP web server for testing:\n\n**Windows IIS Setup:**\n1. Open IIS Manager (Internet Information Services)\n2. Right-click Sites → Add Website\n3. Configure site name and physical path\n4. Bind to IP address and port 80\n\n**Linux Apache Setup:**\n\n```bash\n# Install Apache\nsudo apt update && sudo apt install apache2\n\n# Start service\nsudo systemctl start apache2\nsudo systemctl enable apache2\n\n# Create test page\necho \"<html><body><h1>Test Page</h1></body></html>\" | sudo tee /var/www/html/index.html\n\n# Verify service\ncurl http://localhost\n```\n\n**Configure Firewall for HTTP:**\n\n```bash\n# Linux (UFW)\nsudo ufw allow 80/tcp\n\n# Windows PowerShell\nNew-NetFirewallRule -DisplayName \"HTTP\" -Direction Inbound -Protocol TCP -LocalPort 80 -Action Allow\n```\n\n### 2. Configure HTTPS Server (Port 443)\n\nSet up secure HTTPS with SSL/TLS:\n\n**Generate Self-Signed Certificate:**\n\n```bash\n# Linux - Generate certificate\nsudo openssl req -x509 -nodes -days 365 -newkey rsa:2048 \\\n  -keyout /etc/ssl/private/apache-selfsigned.key \\\n  -out /etc/ssl/certs/apache-selfsigned.crt\n\n# Enable SSL module\nsudo a2enmod ssl\nsudo systemctl restart apache2\n```\n\n**Configure Apache for HTTPS:**\n\n```bash\n# Edit SSL virtual host\nsudo nano /etc/apache2/sites-available/default-ssl.conf\n\n# Enable site\nsudo a2ensite default-ssl\nsudo systemctl reload apache2\n```\n\n**Verify HTTPS Setup:**\n\n```bash\n# Check port 443 is open\nnmap -p 443 192.168.1.1\n\n# Test SSL connection\nopenssl s_client -connect 192.168.1.1:443\n\n# Check certificate\ncurl -kv https://192.168.1.1\n```\n\n### 3. Configure SNMP Service (Port 161)\n\nSet up SNMP for enumeration practice:\n\n**Linux SNMP Setup:**\n\n```bash\n# Install SNMP daemon\nsudo apt install snmpd snmp\n\n# Configure community strings\nsudo nano /etc/snmp/snmpd.conf\n\n# Add these lines:\n# rocommunity public\n# rwcommunity private\n\n# Restart service\nsudo systemctl restart snmpd\n```\n\n**Windows SNMP Setup:**\n1. Open Server Manager → Add Features\n2. Select SNMP Service\n3. Configure community strings in Services → SNMP Service → Properties\n\n**SNMP Enumeration Commands:**\n\n```bash\n# Basic SNMP walk\nsnmpwalk -c public -v1 192.168.1.1\n\n# Enumerate system info\nsnmpwalk -c public -v1 192.168.1.1 1.3.6.1.2.1.1\n\n# Get running processes\nsnmpwalk -c public -v1 192.168.1.1 1.3.6.1.2.1.25.4.2.1.2\n\n# SNMP check tool\nsnmp-check 192.168.1.1 -c public\n\n# Brute force community strings\nonesixtyone -c /usr/share/seclists/Discovery/SNMP/common-snmp-community-strings.txt 192.168.1.1\n```\n\n### 4. Configure SMB Service (Port 445)\n\nSet up SMB file shares for enumeration:\n\n**Windows SMB Share:**\n1. Create folder to share\n2. Right-click → Properties → Sharing → Advanced Sharing\n3. Enable sharing and set permissions\n4. Configure NTFS permissions\n\n**Linux Samba Setup:**\n\n```bash\n# Install Samba\nsudo apt install samba\n\n# Create share directory\nsudo mkdir -p /srv/samba/share\nsudo chmod 777 /srv/samba/share\n\n# Configure Samba\nsudo nano /etc/samba/smb.conf\n\n# Add share:\n# [public]\n#    path = /srv/samba/share\n#    browsable = yes\n#    guest ok = yes\n#    read only = no\n\n# Restart service\nsudo systemctl restart smbd\n```\n\n**SMB Enumeration Commands:**\n\n```bash\n# List shares anonymously\nsmbclient -L //192.168.1.1 -N\n\n# Connect to share\nsmbclient //192.168.1.1/share -N\n\n# Enumerate with smbmap\nsmbmap -H 192.168.1.1\n\n# Full enumeration\nenum4linux -a 192.168.1.1\n\n# Check for vulnerabilities\nnmap --script smb-vuln* 192.168.1.1\n```\n\n### 5. Analyze Service Logs\n\nReview logs for security analysis:\n\n**HTTP/HTTPS Logs:**\n\n```bash\n# Apache access log\nsudo tail -f /var/log/apache2/access.log\n\n# Apache error log\nsudo tail -f /var/log/apache2/error.log\n\n# Windows IIS logs\n# Location: C:\\inetpub\\logs\\LogFiles\\W3SVC1\\\n```\n\n**Parse Log for Credentials:**\n\n```bash\n# Search for POST requests\ngrep \"POST\" /var/log/apache2/access.log\n\n# Extract user agents\nawk '{print $12}' /var/log/apache2/access.log | sort | uniq -c\n```\n\n## Quick Reference\n\n### Essential Ports\n\n| Service | Port | Protocol |\n|---------|------|----------|\n| HTTP | 80 | TCP |\n| HTTPS | 443 | TCP |\n| SNMP | 161 | UDP |\n| SMB | 445 | TCP |\n| NetBIOS | 137-139 | TCP/UDP |\n\n### Service Verification Commands\n\n```bash\n# Check HTTP\ncurl -I http://target\n\n# Check HTTPS\ncurl -kI https://target\n\n# Check SNMP\nsnmpwalk -c public -v1 target\n\n# Check SMB\nsmbclient -L //target -N\n```\n\n### Common Enumeration Tools\n\n| Tool | Purpose |\n|------|---------|\n| nmap | Port scanning and scripts |\n| nikto | Web vulnerability scanning |\n| snmpwalk | SNMP enumeration |\n| enum4linux | SMB/NetBIOS enumeration |\n| smbclient | SMB connection |\n| gobuster | Directory brute forcing |\n\n## Constraints\n\n- Self-signed certificates trigger browser warnings\n- SNMP v1/v2c communities transmit in cleartext\n- Anonymous SMB access is often disabled by default\n- Firewall rules must allow inbound connections\n- Lab environments should be isolated from production\n\n## Examples\n\n### Example 1: Complete HTTP Lab Setup\n\n```bash\n# Install and configure\nsudo apt install apache2\nsudo systemctl start apache2\n\n# Create login page\ncat << 'EOF' | sudo tee /var/www/html/login.html\n<html>\n<body>\n<form method=\"POST\" action=\"login.php\">\nUsername: <input type=\"text\" name=\"user\"><br>\nPassword: <input type=\"password\" name=\"pass\"><br>\n<input type=\"submit\" value=\"Login\">\n</form>\n</body>\n</html>\nEOF\n\n# Allow through firewall\nsudo ufw allow 80/tcp\n```\n\n### Example 2: SNMP Testing Setup\n\n```bash\n# Quick SNMP configuration\nsudo apt install snmpd\necho \"rocommunity public\" | sudo tee -a /etc/snmp/snmpd.conf\nsudo systemctl restart snmpd\n\n# Test enumeration\nsnmpwalk -c public -v1 localhost\n```\n\n### Example 3: SMB Anonymous Access\n\n```bash\n# Configure anonymous share\nsudo apt install samba\nsudo mkdir /srv/samba/anonymous\nsudo chmod 777 /srv/samba/anonymous\n\n# Test access\nsmbclient //localhost/anonymous -N\n```\n\n## Troubleshooting\n\n| Issue | Solution |\n|-------|----------|\n| Port not accessible | Check firewall rules (ufw, iptables, Windows Firewall) |\n| Service not starting | Check logs with `journalctl -u service-name` |\n| SNMP timeout | Verify UDP 161 is open, check community string |\n| SMB access denied | Verify share permissions and user credentials |\n| HTTPS certificate error | Accept self-signed cert or add to trusted store |\n| Cannot connect remotely | Bind service to 0.0.0.0 instead of localhost |\n\n## When to Use\nThis skill is applicable to execute the workflow or actions described in the overview.","tags":["network","101","antigravity","awesome","skills","sickn33","agent-skills","agentic-skills","ai-agent-skills","ai-agents","ai-coding","ai-workflows"],"capabilities":["skill","source-sickn33","skill-network-101","topic-agent-skills","topic-agentic-skills","topic-ai-agent-skills","topic-ai-agents","topic-ai-coding","topic-ai-workflows","topic-antigravity","topic-antigravity-skills","topic-claude-code","topic-claude-code-skills","topic-codex-cli","topic-codex-skills"],"categories":["antigravity-awesome-skills"],"synonyms":[],"warnings":[],"endpointUrl":"https://skills.sh/sickn33/antigravity-awesome-skills/network-101","protocol":"skill","transport":"skills-sh","auth":{"type":"none","details":{"cli":"npx skills add sickn33/antigravity-awesome-skills","source_repo":"https://github.com/sickn33/antigravity-awesome-skills","install_from":"skills.sh"}},"qualityScore":"0.700","qualityRationale":"deterministic score 0.70 from registry signals: · indexed on github topic:agent-skills · 34666 github stars · SKILL.md body (7,216 chars)","verified":false,"liveness":"unknown","lastLivenessCheck":null,"agentReviews":{"count":0,"score_avg":null,"cost_usd_avg":null,"success_rate":null,"latency_p50_ms":null,"narrative_summary":null,"summary_updated_at":null},"enrichmentModel":"deterministic:skill-github:v1","enrichmentVersion":1,"enrichedAt":"2026-04-23T06:51:37.748Z","embedding":null,"createdAt":"2026-04-18T21:41:20.495Z","updatedAt":"2026-04-23T06:51:37.748Z","lastSeenAt":"2026-04-23T06:51:37.748Z","tsv":"'-101':2 '-139':644 '/192.168.1.1':538 '/192.168.1.1/share':544 '/etc/apache2/sites-available/default-ssl.conf':294 '/etc/samba/smb.conf':509 '/etc/snmp/snmpd.conf':362,791 '/etc/ssl/certs/apache-selfsigned.crt':272 '/etc/ssl/private/apache-selfsigned.key':270 '/localhost/anonymous':826 '/srv/samba/anonymous':818,822 '/srv/samba/share':500,504,514 '/target':671 '/usr/share/seclists/discovery/snmp/common-snmp-community-strings.txt':443 '/var/log/apache2/access.log':584,612,619 '/var/log/apache2/error.log':591 '/var/www/html/index.html':207 '/var/www/html/login.html':761 '0.0.0.0':890 '1':129,147,379,461,737 '1.3.6.1.2.1.1':418 '1.3.6.1.2.1.25.4.2.1.2':427 '101':37 '12':618 '137':643 '161':338,637,856 '192.168.1.1':318,326,332,409,417,426,434,444,551,556,565 '2':154,238,385,466,773 '2048':268 '3':161,333,389,474,804 '365':265 '4':168,445,480 '443':243,312,317,327,634 '445':450,640 '5':566 '777':503,821 '80':134,175,235,631 '80/tcp':222,771 'a2enmod':277 'a2ensite':298 'accept':874 'access':88,99,111,579,716,807,824,833,863 'action':236,906 'add':159,363,383,510,880 'address':96,172 'administr':87 'advanc':472 'agent':615 'allow':221,237,725,765,770 'analysi':27,63,123,574 'analyz':567 'anonym':535,714,806,810 'apach':177,181,284,578,585 'apache2':188,194,198,282,305,749,753 'applic':900 'apt':183,186,353,491,747,782,813 'awk':616 'bash':179,216,255,287,309,348,401,487,532,577,605,649,742,777,808 'basic':92,138,402 'bind':169,887 'browsabl':515 'browser':706 'brute':437,698 'c':406,414,423,435,442,596,622,663,799 'cannot':884 'captur':120 'cat':757 'cert':878 'certif':254,258,329,704,872 'check':310,328,429,433,557,650,655,660,667,834,844,859 'chmod':502,820 'cleartext':713 'click':157,469 'client':324 'command':400,531,648 'common':6,42,673 'communiti':112,358,391,439,710,860 'complet':738 'configur':3,33,39,69,102,104,130,162,212,239,283,334,357,390,446,481,505,745,780,809 'connect':321,325,540,695,727,885 'constraint':700 'core':127 'creat':199,462,494,754 'credenti':604,870 'curl':210,330,652,657 'daemon':351 'day':264 'default':300,721 'default-ssl':299 'deni':864 'describ':907 'direct':230 'directori':496,697 'disabl':719 'displaynam':228 'document':124 'echo':202,785 'edit':288 'enabl':18,54,197,273,295,475 'enum4linux':554,690 'enumer':25,61,125,343,399,410,457,530,546,553,674,689,692,797 'environ':17,53,729 'eof':758,764 'error':586,873 'essenti':625 'exampl':735,736,772,803 'execut':902 'extract':613 'f':583,590 'featur':384 'file':114,454 'firewal':98,213,722,767,835,840 'folder':463 'forc':438,699 'full':552 'generat':250,257 'get':419 'gobust':696 'grep':610 'guest':517 'h':550 'hand':20,56 'hands-on':19,55 'host':79,291 'http':9,45,131,139,215,229,630,651,739 'http/https':105,575 'https':10,46,240,247,286,307,633,656,871 'ii':145,149,593 'inbound':231,726 'inetpub':597 'info':412 'inform':152 'inputs/prerequisites':72 'instal':180,187,349,354,488,492,743,748,783,814 'instead':891 'internet':151 'ip':95,171 'iptabl':838 'isol':732 'issu':829 'journalctl':847 'kali':81 'keyout':269 'ki':658 'knowledg':94 'kv':331 'l':537,670 'lab':16,52,728,740 'level':119 'line':365 'linux':76,82,176,217,256,345,484 'list':533 'localhost':211,802,893 'localport':234 'locat':595 'log':26,62,121,569,571,576,580,587,594,598,602,845 'logfil':599 'login':755 'manag':150,382 'mkdir':498,817 'modul':275 'must':724 'n':539,545,672,827 'name':164,851 'nano':293,361,508 'netbio':642 'netfirewallrul':227 'network':1,7,36,43,93 'new':226 'new-netfirewallrul':225 'newkey':266 'nikto':683 'nmap':315,560,678 'node':263 'ntfs':482 'often':718 'ok':518 'onesixtyon':441 'open':148,314,380,858 'openssl':260,322 'outputs/deliverables':103 'overview':910 'p':316,499 'page':201,204,756 'pars':601 'password':763 'path':167,513 'penetr':14,50 'permiss':118,479,483,867 'physic':166 'port':97,101,133,174,242,311,337,449,626,628,679,831 'post':608,611 'powershel':224 'practic':22,58,344 'print':617 'privat':369 'process':421 'product':734 'proper':32,68 'properti':397,470 'protocol':232,629 'public':367,407,415,424,436,512,664,787,800 'purpos':38,677 'quick':623,778 'read':520 'refer':624 'reload':304 'remot':886 'req':261 'request':609 'restart':281,370,374,523,527,794 'result':126 'review':570 'right':156,468 'right-click':155,467 'rocommun':366,786 'rsa':267 'rule':723,836 'run':420 'rwcommun':368 'samba':485,489,493,506,815 'scan':680,686 'script':561,682 'search':606 'secur':29,65,246,573 'select':386 'self':252,702,876 'self-sign':251,701,875 'server':74,107,132,141,241,381 'servic':8,24,44,60,80,109,153,190,209,336,371,388,394,396,448,524,568,627,646,841,850,888 'service-nam':849 'set':135,244,339,451,478 'setup':146,178,308,347,378,486,741,776 'share':115,455,460,465,471,473,476,495,511,534,542,811,866 'sign':253,703,877 'similar':84 'site':158,163,296 'skill':898 'skill-network-101' 'smb':12,48,113,447,453,459,529,563,639,668,694,715,805,862 'smb-vuln':562 'smb/netbios':691 'smbclient':536,543,669,693,825 'smbd':528 'smbmap':548,549 'snmp':11,47,108,335,341,346,350,356,377,387,395,398,403,428,432,636,661,688,708,774,779,852 'snmp-check':431 'snmpd':355,375,784,795 'snmpwalk':405,413,422,662,687,798 'solut':830 'sort':620 'source-sickn33' 'ssl':274,278,289,301,320 'ssl/tls':249 'start':189,193,752,843 'store':883 'string':359,392,440,861 'sudo':182,185,191,195,205,219,259,276,279,292,297,302,352,360,372,490,497,501,507,525,581,588,746,750,759,768,781,788,792,812,816,819 'system':35,71,77,91,411 'systemctl':192,196,280,303,373,526,751,793 'tail':582,589 'target':34,70,90,654,659,666 'tcp':233,632,635,641 'tcp/udp':645 'tee':206,760,789 'test':5,15,30,41,51,66,86,143,200,203,319,775,796,823 'timeout':853 'tool':430,675,676 'topic-agent-skills' 'topic-agentic-skills' 'topic-ai-agent-skills' 'topic-ai-agents' 'topic-ai-coding' 'topic-ai-workflows' 'topic-antigravity' 'topic-antigravity-skills' 'topic-claude-code' 'topic-claude-code-skills' 'topic-codex-cli' 'topic-codex-skills' 'transmit':711 'trigger':705 'troubleshoot':828 'trust':882 'u':848 'udp':638,855 'ufw':218,220,769,837 'uniq':621 'updat':184 'use':896 'user':614,869 'usernam':762 'v1':408,416,425,665,801 'v1/v2c':709 'various':117 'verif':647 'verifi':208,306,854,865 'virtual':290 'vuln':564 'vulner':559,685 'w3svc1':600 'walk':404 'warn':707 'web':106,140,684 'websit':160 'window':73,144,223,376,458,592,839 'workflow':128,904 'x509':262 'yes':516,519","prices":[{"id":"0ad98c73-6bd5-4141-ae14-4a7cc052340a","listingId":"320a8cff-911b-4c99-a621-33e58b5907f6","amountUsd":"0","unit":"free","nativeCurrency":null,"nativeAmount":null,"chain":null,"payTo":null,"paymentMethod":"skill-free","isPrimary":true,"details":{"org":"sickn33","category":"antigravity-awesome-skills","install_from":"skills.sh"},"createdAt":"2026-04-18T21:41:20.495Z"}],"sources":[{"listingId":"320a8cff-911b-4c99-a621-33e58b5907f6","source":"github","sourceId":"sickn33/antigravity-awesome-skills/network-101","sourceUrl":"https://github.com/sickn33/antigravity-awesome-skills/tree/main/skills/network-101","isPrimary":false,"firstSeenAt":"2026-04-18T21:41:20.495Z","lastSeenAt":"2026-04-23T06:51:37.748Z"}],"details":{"listingId":"320a8cff-911b-4c99-a621-33e58b5907f6","quickStartSnippet":null,"exampleRequest":null,"exampleResponse":null,"schema":null,"openapiUrl":null,"agentsTxtUrl":null,"citations":[],"useCases":[],"bestFor":[],"notFor":[],"kindDetails":{"org":"sickn33","slug":"network-101","github":{"repo":"sickn33/antigravity-awesome-skills","stars":34666,"topics":["agent-skills","agentic-skills","ai-agent-skills","ai-agents","ai-coding","ai-workflows","antigravity","antigravity-skills","claude-code","claude-code-skills","codex-cli","codex-skills","cursor","cursor-skills","developer-tools","gemini-cli","gemini-skills","kiro","mcp","skill-library"],"license":"mit","html_url":"https://github.com/sickn33/antigravity-awesome-skills","pushed_at":"2026-04-23T06:41:03Z","description":"Installable GitHub library of 1,400+ agentic skills for Claude Code, Cursor, Codex CLI, Gemini CLI, Antigravity, and more. Includes installer CLI, bundles, workflows, and official/community skill collections.","skill_md_sha":"54200a7d8642fcbdba91a3d4d3e2fe4b1782e2d1","skill_md_path":"skills/network-101/SKILL.md","default_branch":"main","skill_tree_url":"https://github.com/sickn33/antigravity-awesome-skills/tree/main/skills/network-101"},"layout":"multi","source":"github","category":"antigravity-awesome-skills","frontmatter":{"name":"network-101","description":"Configure and test common network services (HTTP, HTTPS, SNMP, SMB) for penetration testing lab environments. Enable hands-on practice with service enumeration, log analysis, and security testing against properly configured target systems."},"skills_sh_url":"https://skills.sh/sickn33/antigravity-awesome-skills/network-101"},"updatedAt":"2026-04-23T06:51:37.748Z"}}