官术网_书友最值得收藏!

Summary

In this chapter, we looked at creating a lab environment for penetration testing. As explained, your lab setup will depend solely on the resources available to you, such as CPU, RAM, and HDD space. It's a good idea to experiment with as many different OSes as you can, including Windows, Linux, Mac, Android, and even ARM OSes (available at https://www.vulnhub.com/) to be able to get yourself some experience in a controlled environment where you may legally carry out tests.

If using the Metasploitable server, we recommend that beginners, including professionals with limited time, use the Metasploitable 2 OS as the Metasploitable 3 OS setup is highly complicated—the builds can be built for specific host operating systems.

Users with limited resources can also use smaller vulnerable OSes such as BadStore and DVL which, like Metasploitable 2, come as pre-built servers available in ISO format and are ready to install with only minor setup.

It's recommended to have at least one Windows and one Linux OS for your lab for testing and learning. Up next, we'll look at the various methodologies available for penetration testing.

主站蜘蛛池模板: 屏南县| 霍城县| 永平县| 监利县| 平陆县| 吴桥县| 中卫市| 岑溪市| 广平县| 大安市| 陇西县| 北碚区| 新泰市| 丽江市| 当涂县| 武隆县| 五常市| 沙洋县| 乡城县| 西宁市| 巴林左旗| 佳木斯市| 溧水县| 葫芦岛市| 化州市| 仪陇县| 开平市| 东源县| 平陆县| 百色市| 苗栗县| 永州市| 绥江县| 从化市| 安国市| 江孜县| 峨眉山市| 牙克石市| 丹阳市| 绿春县| 邛崃市|