Book description
Learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect it
About This Book
- Explore and build intricate architectures that allow you to emulate an enterprise network
- Test and enhance your security skills against complex and hardened virtual architecture
- Learn methods to bypass common enterprise defenses and leverage them to test the most secure environments.
Who This Book Is For
While the book targets advanced penetration testing, the process is systematic and as such will provide even beginners with a solid methodology and approach to testing.
You are expected to have network and security knowledge. The book is intended for anyone who wants to build and enhance their existing professional security and penetration testing methods and skills.
What You Will Learn
- Learning proven security testing and penetration testing techniques
- Building multi-layered complex architectures to test the latest network designs
- Applying a professional testing methodology
- Determining whether there are filters between you and the target and how to penetrate them
- Deploying and finding weaknesses in common firewall architectures.
- Learning advanced techniques to deploy against hardened environments
- Learning methods to circumvent endpoint protection controls
In Detail
Security flaws and new hacking techniques emerge overnight ? security professionals need to make sure they always have a way to keep . With this practical guide, learn how to build your own virtual pentesting lab environments to practice and develop your security skills. Create challenging environments to test your abilities, and overcome them with proven processes and methodologies used by global penetration testing teams.
Get to grips with the techniques needed to build complete virtual machines perfect for pentest training. Construct and attack layered architectures, and plan specific attacks based on the platforms you're going up against. Find new vulnerabilities for different kinds of systems and networks, and what these mean for your clients.
Driven by a proven penetration testing methodology that has trained thousands of testers, Building Virtual Labs for Advanced Penetration Testing, Second Edition will prepare you for participation in professional security teams.
Style and approach
The book is written in an easy-to-follow format that provides a step?by-step, process-centric approach. Additionally, there are numerous hands-on examples and additional references for readers who might want to learn even more. The process developed throughout the book has been used to train and build teams all around the world as professional security and penetration testers.
Table of contents
-
Building Virtual Pentesting Labs for Advanced Penetration Testing - Second Edition
- Building Virtual Pentesting Labs for Advanced Penetration Testing - Second Edition
- Credits
- About the Author
- Acknowledgments
- About the Reviewer
- www.PacktPub.com
- Preface
- 1. Introducing Penetration Testing
- 2. Choosing the Virtual Environment
- 3. Planning a Range
- 4. Identifying Range Architectures
-
5. Identifying a Methodology
-
The OSSTMM
- The Posture Review
- Logistics
- Active detection verification
- Visibility Audit
- Access verification
- Trust verification
- Control verification
- Process verification
- Configuration verification
- Property validation
- Segregation review
- Exposure verification
- Competitive intelligence scouting
- Quarantine verification
- Privileges audit
- Survivability validation
- Alert and log review
- CHECK
- NIST SP-800-115
- Readers' challenge
- Summary
-
The OSSTMM
- 6. Creating an External Attack Architecture
- 7. Assessment of Devices
- 8. Architecting an IDS/IPS Range
- 9. Assessment of Web Servers and Web Applications
- 10. Testing Flat and Internal Networks
- 11. Testing Servers
- 12. Exploring Client-Side Attack Vectors
- 13. Building a Complete Cyber Range
Product information
- Title: Building Virtual Pentesting Labs for Advanced Penetration Testing - Second Edition
- Author(s):
- Release date: August 2016
- Publisher(s): Packt Publishing
- ISBN: 9781785883491
You might also like
book
Hands-On Web Penetration Testing with Metasploit
Identify, exploit, and test web application security with ease Key Features Get up to speed with …
book
Metasploit Penetration Testing Cookbook - Third Edition
Over 100 recipes for penetration testing using Metasploit and virtual machines About This Book Special focus …
book
Build Your Own Cybersecurity Testing Lab: Low-cost Solutions for Testing in Virtual and Cloud-based Environments
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, …
book
Mastering Kali Linux for Advanced Penetration Testing - Third Edition
A practical guide to testing your infrastructure security with Kali Linux, the preferred choice of pentesters …