官术网_书友最值得收藏!

Setting Up Your Test Lab

In this chapter, we look at setting up a lab environment for our penetration tests. Many of the tests should first be performed in this confined lab environment before attempting them in a production environment. Remember that you must obtain written permission when working on a live environment, as well as following all local laws when carrying out any stage of the penetration test on a network. It may also be a good idea to have a lawyer review any contract and engagement details before you commence to avoid any issues that may arise during or after the exercise. Some insurance companies also offer coverage to penetration testers in the event of unexpected damages.

To avoid running into legal issues and unnecessary expenditure as a result of penetration testing, it's highly recommended that you build a test environment, whether physical or virtual, in an effort to familiarize yourself with the tests and their results, as well as understand the impact of the tests on hardware, software, and bandwidth, as many of these tests are disruptive to devices and organizations.

We will cover the following topics in detail:

  • Setting up a Windows environment in a VM
  • Installing vulnerable servers
  • Installing additional tools in Kali Linux
  • Network services in Kali Linux
  • Additional labs and resources
主站蜘蛛池模板: 雅江县| 德兴市| 广丰县| 蓬安县| 聂拉木县| 礼泉县| 波密县| 灌云县| 徐水县| 云林县| 广东省| 东海县| 拉萨市| 会同县| 明水县| 施甸县| 炎陵县| 精河县| 驻马店市| 林西县| 武胜县| 灵寿县| 蓬莱市| 彝良县| 托里县| 宝丰县| 久治县| 靖安县| 盱眙县| 武义县| 阜宁县| 于田县| 崇文区| 界首市| 郓城县| 梨树县| 泗洪县| 桐乡市| 大化| 兴安盟| 神农架林区|