Book Image

Building Virtual Pentesting Labs for Advanced Penetration Testing - Second Edition

By : Kevin Cardwell
Book Image

Building Virtual Pentesting Labs for Advanced Penetration Testing - Second Edition

By: Kevin Cardwell

Overview of this book

Security flaws and new hacking techniques emerge overnight – security professionals need to make sure they always have a way to keep . With this practical guide, learn how to build your own virtual pentesting lab environments to practice and develop your security skills. Create challenging environments to test your abilities, and overcome them with proven processes and methodologies used by global penetration testing teams. Get to grips with the techniques needed to build complete virtual machines perfect for pentest training. Construct and attack layered architectures, and plan specific attacks based on the platforms you’re going up against. Find new vulnerabilities for different kinds of systems and networks, and what these mean for your clients. Driven by a proven penetration testing methodology that has trained thousands of testers, Building Virtual Labs for Advanced Penetration Testing, Second Edition will prepare you for participation in professional security teams.
Table of Contents (20 chapters)
Building Virtual Pentesting Labs for Advanced Penetration Testing - Second Edition
Credits
About the Author
Acknowledgments
About the Reviewer
www.PacktPub.com
Preface

Summary


In this chapter, we have built a layered architecture to serve the requirements of the potential variety of scenarios that we might encounter. We started the chapter with a layered approach to meet the needs of our external testing.

Following the defined layers, we began with adding the required components to each of the segments of the architecture. We also looked at the filtering and routing requirements and built and configured a Cisco router emulator to meet our filtering requirements.

Once we configured and tested our first layer components, we moved to the task of adding a firewall to the architecture. We used the popular tools Smoothwall and pfSense as our two bastion hosts and configured it to support one service for testing purposes.

After we built the firewall and tested the configuration, we next took on the task of adding monitoring capability to the range. We built and configured Snort.

Finally, we closed the chapter with a challenge to you for the integration of the different...