Book Image

Building Virtual Pentesting Labs for Advanced Penetration Testing

By : Kevin Cardwell
Book Image

Building Virtual Pentesting Labs for Advanced Penetration Testing

By: Kevin Cardwell

Overview of this book

Table of Contents (20 chapters)
Building Virtual Pentesting Labs for Advanced Penetration Testing
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Index

iptables


For those of you who do not have a Cisco IOS, we can use the filtering features of iptables to create the firewall capability we used in the Dynamips virtual machine.

In Chapter 4, Identifying Range Architecture, we created a Debian distribution to serve as our iptables machine. We could also use iptables as our Bastion Host filter, but for the purposes of the book, we will stick with using the iptables machine at the first level of defense. Of course, you can build and plug machines in anywhere in the architecture because it is flexible and just a baseline-layered configuration.

Even if you have already built the Cisco Dynamips machine, you still should follow along and complete the steps to add the iptables machine to your architecture as it is something you might encounter. It is no secret that many organizations are adding Linux to their enterprise, and virtually all of them come with some form of filtering. Moreover, this iptables filtering capability is virtually a part of all...