Chapter 9
Building a Penetration Testing Lab
- Only through practice can someone improve his skills.
- Keep things as simple as possible—don’t unnecessarily complicate.
- Re-creating old exploits is great practice.
- A pen test lab must be completely isolated from any other network.
- Cabled and wireless pen test labs should be isolated from one another.
- Once you break into your wireless, move to your cabled.
- You could put in shielding to have your secure lab not leak wireless signals.
- You must secure the pen test lab from any and all unauthorized access.
- Some of the things a malicious user would like to know is:
- IP addresses of machines
- Operating system versions
- Patch versions
- Configuration files
- Login files
- Start-up scripts
- Be paranoid.
- Change appliance ...
Get Conducting Network Penetration and Espionage in a Global Environment now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.