1/20/2023 0 Comments Vmware workstation 11 x86A gaming laptop (MSI Ghost Pro) with 16 GB of RAM and an Intel Core i7-4710HQ CPU was used to fit this need. While a cloud-based server might suffice, it is important to keep safety in mind as well as have availability when Internet access is limited. In addition, mobility was an important factor as the lab needed to be able to move with the author. Due to the type of work performed and the potential research needs within the platform, a robust piece of hardware would be ideal versus running the lab on a PC. Since our objective is to support a variety of systems, we’ll need to make sure that the architecture can support Windows as well as Linux and provide a solid test bed for a number of different applications. We did not need to emulate any specific client’s architecture, so we have a pretty free hand on the technologies used. In this case, the objective of the lab is to be fully featured and support a variety of different target systems for testing. This, naturally, is a great example of how a penetration test lab can be designed and built to support a number of different penetration testing scenarios. Jeremy Faircloth, in Penetration Tester's Open Source Toolkit (Fourth Edition), 2017 Case Study: The Tools in Actionįor this case study, we’re going to go through the process that was used to build the penetration testing lab used for a majority of the exercises in this book.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |