Book Image

Building Virtual Pentesting Labs for Advanced Penetration Testing

By : Kevin Cardwell
Book Image

Building Virtual Pentesting Labs for Advanced Penetration Testing

By: Kevin Cardwell

Overview of this book

Table of Contents (20 chapters)
Building Virtual Pentesting Labs for Advanced Penetration Testing
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Index

Recording the attack data for further training and analysis


Once you have built and attacked the range, it is highly recommended that you record the attacks so that you can use them to practice with and, more importantly, for training purposes. Each time you carry out attacks, you are creating extremely valuable data that should be captured and used again. One of the easiest ways to capture the data is to use Wireshark. Once you have captured the data, save it, and then you can use a tool to replay the captured traffic. There are a number of ways in which you can accomplish this. One of the easiest ways is to use the tcpreplay tool; it is part of the Kali Linux distribution. Additionally, there are a number of packet traces you can download that cover many different attacks if you prefer to not create your own. An example of the command used to replay the file from one of the earlier DEFCON conferences is shown in the following screenshot:

For those of you who want to use a GUI tool, there...