Book Image

Building Virtual Pentesting Labs for Advanced Penetration Testing - Second Edition

By : Kevin Cardwell
Book Image

Building Virtual Pentesting Labs for Advanced Penetration Testing - Second Edition

By: Kevin Cardwell

Overview of this book

Security flaws and new hacking techniques emerge overnight – security professionals need to make sure they always have a way to keep . With this practical guide, learn how to build your own virtual pentesting lab environments to practice and develop your security skills. Create challenging environments to test your abilities, and overcome them with proven processes and methodologies used by global penetration testing teams. Get to grips with the techniques needed to build complete virtual machines perfect for pentest training. Construct and attack layered architectures, and plan specific attacks based on the platforms you’re going up against. Find new vulnerabilities for different kinds of systems and networks, and what these mean for your clients. Driven by a proven penetration testing methodology that has trained thousands of testers, Building Virtual Labs for Advanced Penetration Testing, Second Edition will prepare you for participation in professional security teams.
Table of Contents (20 chapters)
Building Virtual Pentesting Labs for Advanced Penetration Testing - Second Edition
Credits
About the Author
Acknowledgments
About the Reviewer
www.PacktPub.com
Preface

Readers' challenge


Throughout this chapter, we have identified a number of methods of setting up Intrusion Detection and Prevention Systems on our networks to attempt to evade them. Your challenge is as follows:

  • Using the techniques we discussed in this chapter, expand on the Security Onion deployment, and experiment with different policy settings, and see what you can bypass without being detected. Be sure to create the documentation from the task so you can maintain it for future reference.

  • Download the Symantec Endpoint Protection tool and set it up on your range, and explore the Network IPS capability and the host-based protections that are offered. Once you have explored it, experiment with the different techniques to obfuscate and attempt to bypass detection. To assist you in this you can refer to the Veil framework at https://www.veil-framework.com/ as a reference; an example of the website is shown in the following screenshot:

This challenge will allow you to practice the evasion methods...