CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway. Learn More

CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway. Learn More

Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

Database Security

Prevent unauthorized access and exceed compliance requirements.

Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Offensive Security
Solutions to maximize your security ROI
Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats
SpiderLabs Blog

Welcome to the Spider’s Lair

"Will you step into my parlor?" said the spider to the fly;
"'Tis the prettiest little parlor that ever you did spy.
The way into my parlor is up a winding stair,
And I have many pretty things to show when you are there."

-by Mary Howitt (1799-1888)


Imagine given an opportunity to take an average normal everyday lab, and transform it into what Hollywood has led the general pubic to believe is the norm. Movies like Hackers, The Matrix, and even Johnny Mnemonic was the basis for SpiderLabs' Razor/Blade lab transformation.


The Razor/Blade lab was only a year old when this project was started in December 2012 as SpiderLabs' just moved into the new office space the end of December 2011. It took 6 months to complete this project as various items, or "ingredients", needed to be purchased, shipped, and put together.

LCD Monitors
Decorative Sheet Metal
Tubular Crin
Needle & Thread
Wall mount Articulating Arm Brackets for LCD Monitors

Neon Dry Erase Markers
Black Light Reflective Ink
Black Light Gaffer Tape
Black Lights
Color Changing LEDs from IKEA

Before project start…


Workbench with shelves.


Wall between bench and closet.


Back wall and rack.


Dry erase wall.


The side wall next to the work bench had everything removed from the wall, holes patched, and repainted a darker blue to create a blank canvas.


The short wall next to the rack was also painted a darker gray than the original for additional contrast.


The workbench area had color changing LED lights from IKEA added under the shelves to add light once the room was darkened. Decorative baskets were added to clean up the bottom shelf.


Opticz UV Black light Reactive Blue Invisible Ink was used on the dark wall. This was hand painted on with the help of a LCD projector to trace the design. A foam brush was used as the ink has the consistency of water. And a little went a long way. We'll be ableto have raves in the lab for years to come.


Three LCD monitors were mounted on the shorter wall by the rack with wall mount articulating arm brackets.


Black light reflective gaffer's tape was used to create a spider's web on the back wall behind the rack.

As Johnny Mnemonic and Tetsuo were called out explicitly for design inspiration, tubularcrin, which is generally used to create cyberlock hair pieces, was used.


Once more the gaffer's tape was used to make the monitors" pop" off the wall.12178_ddb2ec57-2674-4cd1-9862-95a84a57125e

Then, the ordinary lights were removed, and replaced with black lights.


What was subtle with normal light, is amazing with black light.


LCD wall with black light.


Rack and back wall with black light. At some point in the future, a second rack will be added to the back wall area and the network equipment moved off the top shelf over the workbench.


An old unused desktop was setup to play The Matrix, Hackers, and Johnny Mnemonic on a loop on the top monitor.


Additional tubular crin was added to the monitors and taken up to the rack.


Moreover, a keyboard tray was made from particle board, painted black, and gaffer's tape added to the trim. Then it was mounted onto the wall with an articulating arm bracket.


The arm is tilted downwards to simulate the keyboard being up on legs. Velcro was used to mount it directly to the tray so it won't fall off.



Additional gaffer tape was run along the overhead wiring rack.


Two clamp-on lights were attached to the wiring rack to provide actual light as needed in the lab.



LCD wall finished with black light.



And what fun would a dry erase wall be without neon dry erase markers to draw on it?




[Disclaimer: This is probably the cleanest work lab ever seen due to pictures being taken for this blogpost. Please don't expect to ever visit it and have it look this organized again.]

Latest SpiderLabs Blogs

EDR – The Multi-Tool of Security Defenses

This is Part 8 in my ongoing project to cover 30 cybersecurity topics in 30 weekly blog posts. The full series can be found here.

Read More

The Invisible Battleground: Essentials of EASM

Know your enemy – inside and out. External Attack Surface Management tools are an effective way to understand externally facing threats and help plan cyber defenses accordingly. Let’s discuss what...

Read More

Fake Dialog Boxes to Make Malware More Convincing

Let’s explore how SpiderLabs created and incorporated user prompts, specifically Windows dialog boxes into its malware loader to make it more convincing to phishing targets during a Red Team...

Read More