Building Virtual Pentesting Labs for Advanced Penetration Testing

Build intricate virtual architecture to practice any penetration testing technique virtually
Preview in Mapt
Code Files

Building Virtual Pentesting Labs for Advanced Penetration Testing

Kevin Cardwell

1 customer reviews
Build intricate virtual architecture to practice any penetration testing technique virtually
Mapt Subscription
FREE
$29.99/m after trial
eBook
$7.20
RRP $35.99
Save 79%
Print + eBook
$59.99
RRP $59.99
What do I get with a Mapt Pro subscription?
  • Unlimited access to all Packt’s 5,000+ eBooks and Videos
  • Early Access content, Progress Tracking, and Assessments
  • 1 Free eBook or Video to download and keep every month after trial
What do I get with an eBook?
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with Print & eBook?
  • Get a paperback copy of the book delivered to you
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with a Video?
  • Download this Video course in MP4 format
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
$0.00
$7.20
$59.99
$29.99p/m after trial
RRP $35.99
RRP $59.99
Subscription
eBook
Print + eBook
Start 30 Day Trial

Frequently bought together


Building Virtual Pentesting Labs for Advanced Penetration Testing Book Cover
Building Virtual Pentesting Labs for Advanced Penetration Testing
$ 35.99
$ 7.20
Building Virtual Pentesting Labs for Advanced Penetration Testing - Second Edition Book Cover
Building Virtual Pentesting Labs for Advanced Penetration Testing - Second Edition
$ 47.99
$ 33.60
Buy 2 for $24.70
Save $59.28
Add to Cart
Subscribe and access every Packt eBook & Video.
 
  • 5,000+ eBooks & Videos
  • 50+ New titles a month
  • 1 Free eBook/Video to keep every month
Start Free Trial
 

Book Details

ISBN 139781783284771
Paperback430 pages

Book Description

A penetration test, also known as pentest, is a method of assessing computer and network security by replicating an attack on a computer system or network from the outside world and internal threats. With the increase of advanced hackers and threats to our virtual world, pentesting is an absolute necessity.

Building Virtual Pentesting Labs for Advanced Penetration Testing will teach you how to build your own labs and give you a proven process to test these labs; a process that is currently used in industry by global pentesting teams. You will also learn a systematic approach to professional security testing, building routers, firewalls, and web servers to hone your pentesting skills.

Table of Contents

Chapter 1: Introducing Penetration Testing
Security testing
Abstract testing methodology
Myths and misconceptions of pen testing
Summary
Chapter 2: Choosing the Virtual Environment
Open source and free environments
Commercial environments
Image conversion
Converting from a physical to virtual environment
Summary
Chapter 3: Planning a Range
Planning
Identifying vulnerabilities
Summary
Chapter 4: Identifying Range Architecture
Building the machines
Selecting network connections
Choosing range components
Summary
Chapter 5: Identifying a Methodology
The OSSTMM
CHECK
NIST SP-800-115
Summary
Chapter 6: Creating an External Attack Architecture
Establishing layered architectures
Configuring firewall architectures
iptables
Summary
Chapter 7: Assessment of Devices
Assessing routers
Evaluating switches
Attacking the firewall
Identifying the firewall rules
Tricks to penetrate filters
Summary
Chapter 8: Architecting an IDS/IPS Range
Deploying a network-based IDS
Implementing the host-based IDS and endpoint security
Working with virtual switches
Evasion
Summary
Chapter 9: Assessment of Web Servers and Web Applications
Analyzing the OWASP Top Ten attacks
Identifying web application firewalls
Penetrating web application firewalls
Tools
Summary
Chapter 10: Testing Flat and Internal Networks
The role of Vulnerability Scanners
Dealing with host protection
Summary
Chapter 11: Attacking Servers
Common protocols and applications for servers
Database assessment
OS platform specifics
Summary
Chapter 12: Exploring Client-side Attack Vectors
Client-side attack methods
Pilfering data from the client
Using the client as a pivot point
Client-side exploitation
Binary payloads
Malicious PDF files
Bypassing antivirus and other protection tools
Obfuscation and encoding
Summary
Chapter 13: Building a Complete Cyber Range
Creating the layered architecture
Integrating decoys and honeypots
Attacking the cyber range
Recording the attack data for further training and analysis
Summary

What You Will Learn

  • Build routers, firewalls, and web servers to hone your pentesting skills
  • Deploy and then find the weaknesses in a firewall architecture
  • Construct a layered architecture and perform a systematic process and methodology to use for conducting an external test
  • Get introduced to several of the different security testing methodologies
  • Design monitored environments and evade them
  • Create complex architecture
  • Bypass antivirus and other protection
  • Practice methods of evasion against today's top defenses
  • Leverage the client configuration

Authors

Table of Contents

Chapter 1: Introducing Penetration Testing
Security testing
Abstract testing methodology
Myths and misconceptions of pen testing
Summary
Chapter 2: Choosing the Virtual Environment
Open source and free environments
Commercial environments
Image conversion
Converting from a physical to virtual environment
Summary
Chapter 3: Planning a Range
Planning
Identifying vulnerabilities
Summary
Chapter 4: Identifying Range Architecture
Building the machines
Selecting network connections
Choosing range components
Summary
Chapter 5: Identifying a Methodology
The OSSTMM
CHECK
NIST SP-800-115
Summary
Chapter 6: Creating an External Attack Architecture
Establishing layered architectures
Configuring firewall architectures
iptables
Summary
Chapter 7: Assessment of Devices
Assessing routers
Evaluating switches
Attacking the firewall
Identifying the firewall rules
Tricks to penetrate filters
Summary
Chapter 8: Architecting an IDS/IPS Range
Deploying a network-based IDS
Implementing the host-based IDS and endpoint security
Working with virtual switches
Evasion
Summary
Chapter 9: Assessment of Web Servers and Web Applications
Analyzing the OWASP Top Ten attacks
Identifying web application firewalls
Penetrating web application firewalls
Tools
Summary
Chapter 10: Testing Flat and Internal Networks
The role of Vulnerability Scanners
Dealing with host protection
Summary
Chapter 11: Attacking Servers
Common protocols and applications for servers
Database assessment
OS platform specifics
Summary
Chapter 12: Exploring Client-side Attack Vectors
Client-side attack methods
Pilfering data from the client
Using the client as a pivot point
Client-side exploitation
Binary payloads
Malicious PDF files
Bypassing antivirus and other protection tools
Obfuscation and encoding
Summary
Chapter 13: Building a Complete Cyber Range
Creating the layered architecture
Integrating decoys and honeypots
Attacking the cyber range
Recording the attack data for further training and analysis
Summary

Book Details

ISBN 139781783284771
Paperback430 pages
Read More
From 1 reviews

Read More Reviews

Recommended for You

Instant Penetration Testing: Setting Up a Test Lab How-to Book Cover
Instant Penetration Testing: Setting Up a Test Lab How-to
$ 14.99
$ 10.50
Web Penetration Testing with Kali Linux Book Cover
Web Penetration Testing with Kali Linux
$ 29.99
$ 21.00
Kali Linux - Assuring Security by Penetration Testing Book Cover
Kali Linux - Assuring Security by Penetration Testing
$ 26.99
$ 18.90
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide Book Cover
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
$ 35.99
$ 7.20
Mastering Kali Linux for Advanced Penetration Testing Book Cover
Mastering Kali Linux for Advanced Penetration Testing
$ 32.99
$ 23.10
Network Analysis using Wireshark Cookbook Book Cover
Network Analysis using Wireshark Cookbook
$ 29.99
$ 6.00