As usual, we will need to set up our virtual lab to emulate this environment, as the penetration test we are performing is purely fictional. However, do not consider this effort to be in vain; many penetration testers will attempt to emulate the network of their client, in order to ensure the exploits they intend on using actually work and are stable (not to mention that this reduces the likelihood of diligent administrators and security professionals detecting your movements). Depending on the type of penetration test, this could prove critical.
Refer to the following diagram; we will set up the following environment in VMware:
Tip
If HDD space is at a premium, then try using pfsense-1 as a linked base. This can be accomplished by cloning pfsense-1 and choosing to link the devices. Check the box to reinitialize interface MAC addresses.
The following table shows the specifications for the various systems as seen in the previous diagram...