Book Image

Building Virtual Pentesting Labs for Advanced Penetration Testing - Second Edition

By : Kevin Cardwell
Book Image

Building Virtual Pentesting Labs for Advanced Penetration Testing - Second Edition

By: Kevin Cardwell

Overview of this book

Security flaws and new hacking techniques emerge overnight – security professionals need to make sure they always have a way to keep . With this practical guide, learn how to build your own virtual pentesting lab environments to practice and develop your security skills. Create challenging environments to test your abilities, and overcome them with proven processes and methodologies used by global penetration testing teams. Get to grips with the techniques needed to build complete virtual machines perfect for pentest training. Construct and attack layered architectures, and plan specific attacks based on the platforms you’re going up against. Find new vulnerabilities for different kinds of systems and networks, and what these mean for your clients. Driven by a proven penetration testing methodology that has trained thousands of testers, Building Virtual Labs for Advanced Penetration Testing, Second Edition will prepare you for participation in professional security teams.
Table of Contents (20 chapters)
Building Virtual Pentesting Labs for Advanced Penetration Testing - Second Edition
Credits
About the Author
Acknowledgments
About the Reviewer
www.PacktPub.com
Preface

Summary


In this chapter, we have examined the planning and preparation required for us to be able to build the range. We looked at the process of creating machines and also a plan of placing machines on our network that allows us to emulate a number of different layered architectures.

We then began a discussion on the range components and we identified the need for a routing device at the perimeter that had the capability to perform filtering. Additionally, we explored the options for a Bastion Host machine that could run our software. We concluded this section with a discussion about how to create a web server. For this, we downloaded the metasploitable virtual machine. As we discussed in the chapter, we will add more components to our range, but for now, the components we have added are enough to move forward. In the next chapter, we will look at a number of the testing methodologies that are available for us to follow when we perform our professional testing.