Another option in many of the tools that can be used to help us when we create machines is the physical to virtual functionality, sometimes referred to as the P2V concept; furthermore, this provides us with the capability to build any machine, run the conversion process to take the physical machine, and then convert it to a virtual machine. This functionality allows you to build a custom pentesting platform machine and then perform the conversion and carry the machine anywhere you go out in the field. We have a couple of options that we will discuss. There is a free option that we can use provided by VMware called vCenter Converter. With this tool, you can convert not only physical Windows machines, but also Linux. To try it out and see how well it works, you can download it from http://www.vmware.com/products/converter/. We have another option, that is, use the feature from our VMware Workstation installation. This is our preferred option...
Building Virtual Pentesting Labs for Advanced Penetration Testing
By :
Building Virtual Pentesting Labs for Advanced Penetration Testing
By:
Overview of this book
Table of Contents (20 chapters)
Building Virtual Pentesting Labs for Advanced Penetration Testing
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Free Chapter
Introducing Penetration Testing
Choosing the Virtual Environment
Planning a Range
Identifying Range Architecture
Identifying a Methodology
Creating an External Attack Architecture
Assessment of Devices
Architecting an IDS/IPS Range
Assessment of Web Servers and Web Applications
Testing Flat and Internal Networks
Attacking Servers
Exploring Client-side Attack Vectors
Building a Complete Cyber Range
Index
Customer Reviews