Book Image

Building Virtual Pentesting Labs for Advanced Penetration Testing - Second Edition

By : Kevin Cardwell
Book Image

Building Virtual Pentesting Labs for Advanced Penetration Testing - Second Edition

By: Kevin Cardwell

Overview of this book

Security flaws and new hacking techniques emerge overnight – security professionals need to make sure they always have a way to keep . With this practical guide, learn how to build your own virtual pentesting lab environments to practice and develop your security skills. Create challenging environments to test your abilities, and overcome them with proven processes and methodologies used by global penetration testing teams. Get to grips with the techniques needed to build complete virtual machines perfect for pentest training. Construct and attack layered architectures, and plan specific attacks based on the platforms you’re going up against. Find new vulnerabilities for different kinds of systems and networks, and what these mean for your clients. Driven by a proven penetration testing methodology that has trained thousands of testers, Building Virtual Labs for Advanced Penetration Testing, Second Edition will prepare you for participation in professional security teams.
Table of Contents (20 chapters)
Building Virtual Pentesting Labs for Advanced Penetration Testing - Second Edition
Credits
About the Author
Acknowledgments
About the Reviewer
www.PacktPub.com
Preface

Selecting network connections


In this section, we will look at the networking choices we have when it comes to building our environment. It is critical that we use the networking features of the VMware Workstation tool and take advantage of the capabilities it provides for us. Open your VMware Workstation software and open a virtual machine of your choice. When you do this, you will see a network adapter that is a part of the configuration. We will look at this later. Navigate to Edit virtual machine settings | Network Adapter. This will bring up the configuration window for the adapter, as shown in the following screenshot:

As you can see in the preceding screenshot, there are a number of settings that we can make on the network. What we want to do is to understand that each of these settings represents a switch, and when you create a network adapter with that setting, it is equivalent to connecting that machine to a switch. We will take a closer look at this once we discuss the different...