As we have mentioned earlier, the goal of building our pentesting ranges is to practice our skills. Therefore, we need to approach the architecture that we created and attack it at every location and entry point. Furthermore, it is very important that we practice attacking the targets directly, that is, on a flat network. Once we have attacked and identified the reactions of the targets from the different types of attacks, we change the approach and attack through the layered architecture to see what the reactions are and make a comparison of the results from the different locations.
Building Virtual Pentesting Labs for Advanced Penetration Testing
By :
Building Virtual Pentesting Labs for Advanced Penetration Testing
By:
Overview of this book
Table of Contents (20 chapters)
Building Virtual Pentesting Labs for Advanced Penetration Testing
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Free Chapter
Introducing Penetration Testing
Choosing the Virtual Environment
Planning a Range
Identifying Range Architecture
Identifying a Methodology
Creating an External Attack Architecture
Assessment of Devices
Architecting an IDS/IPS Range
Assessment of Web Servers and Web Applications
Testing Flat and Internal Networks
Attacking Servers
Exploring Client-side Attack Vectors
Building a Complete Cyber Range
Index
Customer Reviews