Building Virtual Pentesting Labs for Advanced Penetration Testing


Building Virtual Pentesting Labs for Advanced Penetration Testing
eBook: $35.99
Formats: PDF, PacktLib, ePub and Mobi formats
$30.59
save 15%!
Print + free eBook + free PacktLib access to the book: $95.98    Print cover: $59.99
$59.99
save 37%!
Free Shipping!
UK, US, Europe and selected countries in Asia.
Also available on:
Overview
Table of Contents
Author
Support
Sample Chapters
  • Build and enhance your existing pentesting methods and skills
  • Get a solid methodology and approach to testing
  • Step-by-step tutorial helping you build complex virtual architecture

Book Details

Language : English
Paperback : 430 pages [ 235mm x 191mm ]
Release Date : June 2014
ISBN : 1783284773
ISBN 13 : 9781783284771
Author(s) : Kevin Cardwell
Topics and Technologies : All Books, Networking and Servers, Open Source


Table of Contents

Preface
Chapter 1: Introducing Penetration Testing
Chapter 2: Choosing the Virtual Environment
Chapter 3: Planning a Range
Chapter 4: Identifying Range Architecture
Chapter 5: Identifying a Methodology
Chapter 6: Creating an External Attack Architecture
Chapter 7: Assessment of Devices
Chapter 8: Architecting an IDS/IPS Range
Chapter 9: Assessment of Web Servers and Web Applications
Chapter 10: Testing Flat and Internal Networks
Chapter 11: Attacking Servers
Chapter 12: Exploring Client-side Attack Vectors
Chapter 13: Building a Complete Cyber Range
Index
  • Chapter 1: Introducing Penetration Testing
    • Security testing
      • Authentication
      • Authorization
      • Confidentiality
      • Integrity
      • Availability
      • Non-repudiation
    • Abstract testing methodology
      • Planning
      • Nonintrusive target search
      • Intrusive target search
      • Data analysis
      • Reporting
    • Myths and misconceptions of pen testing
    • Summary
  • Chapter 2: Choosing the Virtual Environment
    • Open source and free environments
      • VMware Player
      • VirtualBox
      • Xen
      • Hyper-V
      • vSphere Hypervisor
    • Commercial environments
      • vSphere
      • VMware Player Plus
      • XenServer
      • VMware Workstation
    • Image conversion
    • Converting from a physical to virtual environment
    • Summary
  • Chapter 3: Planning a Range
    • Planning
      • What are we trying to accomplish?
      • By when do we have to accomplish it?
    • Identifying vulnerabilities
      • Vulnerability sites
      • Vendor sites
    • Summary
  • Chapter 4: Identifying Range Architecture
    • Building the machines
      • Building new machines
      • Conversion
      • Cloning a virtual machine
    • Selecting network connections
      • The bridged setting
      • Network Address Translation
      • The host-only switch
      • The custom settings
    • Choosing range components
      • The attacker machine
      • Router
      • Firewall
      • Web server
    • Summary
  • Chapter 5: Identifying a Methodology
    • The OSSTMM
      • The Posture Review
      • Logistics
      • Active detection verification
      • Visibility Audit
      • Access verification
      • Trust verification
      • Control verification
      • Process verification
      • Configuration verification
      • Property validation
      • Segregation review
      • Exposure verification
      • Competitive intelligence scouting
      • Quarantine verification
      • Privileges audit
      • Survivability validation
      • Alert and log review
    • CHECK
    • NIST SP-800-115
      • The information security assessment methodology
      • Technical assessment techniques
      • Comparing tests and examinations
      • Testing viewpoints
      • Overt and covert
      • Offensive Security
      • Other methodologies
      • Customization
    • Summary
  • Chapter 6: Creating an External Attack Architecture
    • Establishing layered architectures
    • Configuring firewall architectures
    • iptables
      • Deploying IDS/IPS and load balancers
      • Intrusion Detection System (IDS)
      • Intrusion Prevention System (IPS)
      • Load balancers
      • Integrating web application firewalls
    • Summary
  • Chapter 7: Assessment of Devices
    • Assessing routers
    • Evaluating switches
      • MAC attacks
      • VLAN hopping attacks
      • GARP attacks
    • Attacking the firewall
    • Identifying the firewall rules
    • Tricks to penetrate filters
    • Summary
  • Chapter 8: Architecting an IDS/IPS Range
    • Deploying a network-based IDS
    • Implementing the host-based IDS and endpoint security
    • Working with virtual switches
    • Evasion
      • Determining thresholds
      • Stress testing
      • Shell code obfuscation
    • Summary
  • Chapter 9: Assessment of Web Servers and Web Applications
    • Analyzing the OWASP Top Ten attacks
      • Injection flaws
      • Broken authentication and session management
      • Cross-Site Scripting
      • Insecure direct object references
      • Security misconfiguration
      • Sensitive data exposure
      • Missing function-level access control
      • Cross-Site Request Forgery
      • Using known vulnerable components
      • Invalidated redirects and forwards
    • Identifying web application firewalls
    • Penetrating web application firewalls
    • Tools
    • Summary
  • Chapter 10: Testing Flat and Internal Networks
    • The role of Vulnerability Scanners
      • Microsoft Baseline Security Analyzer
      • Open Vulnerability Assessment Language
      • Scanning without credentials
      • Nessus
      • Scanning with credentials
    • Dealing with host protection
      • User Account Control
      • The host firewall
      • Endpoint protection
      • Enhanced Mitigation Experience Toolkit
    • Summary
  • Chapter 11: Attacking Servers
    • Common protocols and applications for servers
      • Web
      • File Transfer Protocol
      • Protocol research
      • Secure Shell
      • Mail
    • Database assessment
      • MSSQL
      • MySQL
      • Oracle
    • OS platform specifics
      • Windows legacy
      • Windows Server 2008 and 2012
      • Unix
      • Linux
      • MAC
    • Summary
  • Chapter 12: Exploring Client-side Attack Vectors
    • Client-side attack methods
      • Bait
      • Lure
    • Pilfering data from the client
    • Using the client as a pivot point
      • Pivoting
      • Proxy exploitation
      • Leveraging the client configuration
    • Client-side exploitation
    • Binary payloads
    • Malicious PDF files
    • Bypassing antivirus and other protection tools
    • Obfuscation and encoding
    • Summary
  • Chapter 13: Building a Complete Cyber Range
    • Creating the layered architecture
      • Architecting the switching
        • Segmenting the architecture
    • Integrating decoys and honeypots
    • Attacking the cyber range
    • Recording the attack data for further training and analysis
    • Summary

Kevin Cardwell

Kevin Cardwell currently works as a freelance consultant and provides consulting services for companies all over the world. He developed the Strategy and Training Development Plan for the first Government CERT in the country of Oman and developed the team to man the first Commercial Security Operations Center there. He has worked extensively with banks and financial institutions throughout the Middle East, Africa, Europe, and the UK. He currently provides consultancy services to commercial companies, governments, major banks, and financial institutions across the globe. He is the author of the book Backtrack – Testing Wireless Network Security, Packt Publishing.

Sorry, we don't have any reviews for this title yet.

Submit Errata

Please let us know if you have found any errors not listed on this list by completing our errata submission form. Our editors will check them and add them to this list. Thank you.

Sample chapters

You can view our sample chapters and prefaces of this title on PacktLib or download sample chapters in PDF format.

Frequently bought together

Building Virtual Pentesting Labs for Advanced Penetration Testing +    Oracle E-Business Suite 12 Financials Cookbook =
50% Off
the second eBook
Price for both: £34.45

Buy both these recommended eBooks together and get 50% off the cheapest eBook.

What you will learn from this book

  • Build routers, firewalls, and web servers to hone your pentesting skills
  • Deploy and then find the weaknesses in a firewall architecture
  • Construct a layered architecture and perform a systematic process and methodology to use for conducting an external test
  • Get introduced to several of the different security testing methodologies
  • Design monitored environments and evade them
  • Create complex architecture
  • Bypass antivirus and other protection
  • Practice methods of evasion against today's top defenses
  • Leverage the client configuration

In Detail

A penetration test, also known as pentest, is a method of assessing computer and network security by replicating an attack on a computer system or network from the outside world and internal threats. With the increase of advanced hackers and threats to our virtual world, pentesting is an absolute necessity.

Building Virtual Pentesting Labs for Advanced Penetration Testing will teach you how to build your own labs and give you a proven process to test these labs; a process that is currently used in industry by global pentesting teams. You will also learn a systematic approach to professional security testing, building routers, firewalls, and web servers to hone your pentesting skills.

Approach

Written in an easy-to-follow approach using hands-on examples, this book helps you create virtual environments for advanced penetration testing, enabling you to build a multi-layered architecture to include firewalls, IDS/IPS, web application firewalls, and endpoint protection, which is essential in the penetration testing world.

Who this book is for

If you are a penetration tester, security consultant, security test engineer, or analyst who wants to practice and perfect penetration testing skills by building virtual pentesting labs in varying industry scenarios, this is the book for you. This book is ideal if you want to build and enhance your existing pentesting methods and skills. Basic knowledge of network security features is expected along with web application testing experience.

Code Download and Errata
Packt Anytime, Anywhere
Register Books
Print Upgrades
eBook Downloads
Video Support
Contact Us
Awards Voting Nominations Previous Winners
Judges Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software
Resources
Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software