Book Image

Building Virtual Pentesting Labs for Advanced Penetration Testing

By : Kevin Cardwell
Book Image

Building Virtual Pentesting Labs for Advanced Penetration Testing

By: Kevin Cardwell

Overview of this book

Table of Contents (20 chapters)
Building Virtual Pentesting Labs for Advanced Penetration Testing
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Index

Configuring firewall architectures


We have configured the one rule in our Smoothwall firewall, and this has been the only filtering we have configured. While we would love to test from an external location and not have any filtering in place which would effectively give us a flat network, in reality, this will rarely be the case. Therefore, we want a minimal set of filters set in our architecture that will resemble something that we may see in typical network architecture. There is an important point to make here: if we run into a well-configured layered and protected architecture, we will only get through on the ports that they have to allow to ingress to their services. This is the reality of testing; a well-configured architecture will not offer many vectors for us outside of the ones they have to allow. Consequently, this is not a bad thing because we know there will be openings and we will virtually always have a web server and web applications to work with.

With the current architecture...