- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- Lee Allen Kevin Cardwell
- 135字
- 2021-07-09 20:20:36
Chapter 2. Preparing a Test Environment
In this chapter, we will discuss the test environment and how we will select the chosen platform. We will discuss the following:
- Introduction to the VMware Workstation
- Explanation of the reasoning behind selecting the platform
- Reviewing and implementing the design of the network
- Developing the structure to support the course and putting everything together
In the first edition of the book, the process was to develop the range in each chapter of the book. In this second edition, the process is to develop the range, at least at the network architecture level, to support the different exercises throughout the book. We will still revisit the design, but the intent is to get the layers of defense to meet the needs of the network designs throughout the book.
推薦閱讀
- Kali Linux CTF Blueprints
- 腦洞大開:滲透測試另類實戰攻略
- 可信計算3.0工程初步
- 暗戰亮劍:黑客滲透與防御全程實錄
- Web安全與攻防入門很輕松(實戰超值版)
- Learning Veeam? Backup & Replication for VMware vSphere
- Kali Linux Wireless Penetration Testing Cookbook
- 網絡安全技術與實訓(第4版)(微課版)
- Learning Devise for Rails
- Digital Forensics with Kali Linux
- End to End GUI Development with Qt5
- 數字政府網絡安全合規性建設指南:密碼應用與數據安全
- Kali Linux無線網絡滲透測試詳解
- 社會工程:防范釣魚欺詐(卷3)
- 從實踐中學習Nmap滲透測試