Skip to Content
Securing the Virtual Environment: How to Defend the Enterprise Against Attack, Included DVD
book

Securing the Virtual Environment: How to Defend the Enterprise Against Attack, Included DVD

by Davi Ottenheimer, Matthew Wallace
May 2012
Intermediate to advanced
456 pages
12h 6m
English
Wiley
Content preview from Securing the Virtual Environment: How to Defend the Enterprise Against Attack, Included DVD

Appendix A

Building a Virtual Attack Test Lab

The space within becomes the reality of the building.

— Frank Lloyd Wright

We all live every day in virtual environments, defined by our ideas.

— Michael Crichton

After reading this book, you probably have an idea of how vast the set of technologies involved in virtualized and cloud environments is. It contains numerous hypervisors, dozens of management tools, and almost countless overall configurations.

This appendix describes setting up a lab environment for testing and experimentation, for both the virtualization components and virtualized servers. As an example of using the environment, this appendix further describes setting up the Backtrack Linux penetration testing virtual machine (VM) and some intentionally vulnerable VMs available from metasploit.com. The lab environment basically is divided into three tiers:

  • One gateway host that does NAT but does not allow inbound connections
  • Three hypervisors (Xen, ESXi, KVM)
  • Various VMs

Every part of this setup is optional. For example, you can eschew setting up the gateway host and connect your hypervisors directly to your network. You can opt to use only one of the three hypervisors. You can set up all, some, or none of the virtual machines that are described.

Components of the Virtual Penetration Testing Lab

Before you dig into the thick of installing components, you can read through some general architectural considerations. It may be worthwhile to read through this appendix once ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Internet Security: How to Defend Against Attackers on the Web, 2nd Edition

Internet Security: How to Defend Against Attackers on the Web, 2nd Edition

Mike Harwood
Cisco Network Admission Control, Volume I: NAC Framework Architecture and Design

Cisco Network Admission Control, Volume I: NAC Framework Architecture and Design

Denise Helfrich, Lou Ronnau, Jason Frazier, Paul Forbes

Publisher Resources

ISBN: 9781118239261Purchase book