Book Image

Building Virtual Pentesting Labs for Advanced Penetration Testing

By : Kevin Cardwell
Book Image

Building Virtual Pentesting Labs for Advanced Penetration Testing

By: Kevin Cardwell

Overview of this book

Table of Contents (20 chapters)
Building Virtual Pentesting Labs for Advanced Penetration Testing
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Index

Summary


In this chapter, we have discussed the different types of virtualization, where type 1, also known as bare metal virtualization, provides the Hypervisor that can be directly accessed and installed in the hardware and with type 2, the Hypervisor installed in the operating system. One of the advantages of a type 1 solution is the fact that the Hypervisor directly installed in the hardware provides for improved performance; a drawback of this is the fact that the hardware has to integrate with the product's Hypervisor and you have to ensure that you check that it does so.

We looked at the different open source virtualization offerings that are possible, and we installed, configured basic settings, and created virtual machines in a number of tools. We downloaded and used an ISO image to create our virtual machine and booted the machine once it was created. Additionally, we downloaded the OWASP Broken Web Application Project virtual machine and used the existing configuration to run the...