Book Image

Building Virtual Pentesting Labs for Advanced Penetration Testing - Second Edition

By : Kevin Cardwell
Book Image

Building Virtual Pentesting Labs for Advanced Penetration Testing - Second Edition

By: Kevin Cardwell

Overview of this book

Security flaws and new hacking techniques emerge overnight – security professionals need to make sure they always have a way to keep . With this practical guide, learn how to build your own virtual pentesting lab environments to practice and develop your security skills. Create challenging environments to test your abilities, and overcome them with proven processes and methodologies used by global penetration testing teams. Get to grips with the techniques needed to build complete virtual machines perfect for pentest training. Construct and attack layered architectures, and plan specific attacks based on the platforms you’re going up against. Find new vulnerabilities for different kinds of systems and networks, and what these mean for your clients. Driven by a proven penetration testing methodology that has trained thousands of testers, Building Virtual Labs for Advanced Penetration Testing, Second Edition will prepare you for participation in professional security teams.
Table of Contents (20 chapters)
Building Virtual Pentesting Labs for Advanced Penetration Testing - Second Edition
Credits
About the Author
Acknowledgments
About the Reviewer
www.PacktPub.com
Preface

Summary


In this chapter, we discussed the different types of virtualization, where type 1, also known as bare-metal virtualization, provides a hypervisor that can be directly accessed and installed on the hardware and type 2, where the hypervisor is installed in the operating system. One of the advantages of a type-1 solution is the fact that the hypervisor directly installed in the hardware provides improved performance; a drawback of this is the fact that the hardware has to integrate with the product's hypervisor, and you have to ensure that you check that it does so.

We looked at the different open source virtualization offerings available, and we installed, configured basic settings for, and created virtual machines in a number of tools. We downloaded and used an ISO image to create our virtual machine and booted the machine once it was created. Additionally, we downloaded the OWASP Broken Web Application Project virtual machine and used the existing configuration to run it. We also...