Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Advanced Penetration Testing for Highly-Secured Environments, Second Edition
Advanced Penetration Testing for Highly-Secured Environments, Second Edition

Advanced Penetration Testing for Highly-Secured Environments, Second Edition: Employ the most advanced pentesting techniques and tools to build highly-secured systems and environments , Second Edition

Arrow left icon
Profile Icon Cardwell Profile Icon Allen
Arrow right icon
€18.99 per month
Full star icon Empty star icon Empty star icon Empty star icon Empty star icon 1 (1 Ratings)
Paperback Mar 2016 428 pages 2nd Edition
eBook
€27.98 €39.99
Paperback
€49.99
Subscription
Free Trial
Renews at €18.99p/m
Arrow left icon
Profile Icon Cardwell Profile Icon Allen
Arrow right icon
€18.99 per month
Full star icon Empty star icon Empty star icon Empty star icon Empty star icon 1 (1 Ratings)
Paperback Mar 2016 428 pages 2nd Edition
eBook
€27.98 €39.99
Paperback
€49.99
Subscription
Free Trial
Renews at €18.99p/m
eBook
€27.98 €39.99
Paperback
€49.99
Subscription
Free Trial
Renews at €18.99p/m

What do you get with a Packt Subscription?

Free for first 7 days. $19.99 p/m after that. Cancel any time!
Product feature icon Unlimited ad-free access to the largest independent learning library in tech. Access this title and thousands more!
Product feature icon 50+ new titles added per month, including many first-to-market concepts and exclusive early access to books as they are being written.
Product feature icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Product feature icon Thousands of reference materials covering every tech concept you need to stay up to date.
Subscribe now
View plans & pricing
Table of content icon View table of contents Preview book icon Preview Book

Advanced Penetration Testing for Highly-Secured Environments, Second Edition

Chapter 2. Preparing a Test Environment

In this chapter, we will discuss the test environment and how we will select the chosen platform. We will discuss the following:

  • Introduction to the VMware Workstation
  • Explanation of the reasoning behind selecting the platform
  • Reviewing and implementing the design of the network
  • Developing the structure to support the course and putting everything together

In the first edition of the book, the process was to develop the range in each chapter of the book. In this second edition, the process is to develop the range, at least at the network architecture level, to support the different exercises throughout the book. We will still revisit the design, but the intent is to get the layers of defense to meet the needs of the network designs throughout the book.

Introducing VMware Workstation

The selected platform for the book is the tool from VMware, and one of the early players in the virtualization market. The VMware Workstation provides us with the capability to emulate a number of different complex architectures, and this will allow us to architect the most sophisticated of networks as we build highly secure environments, so we can test the different penetration techniques against them.

At the time of writing this book, the VMware Workstation Version 11 is the current version, and it comes with a number of different features that allow for not only the creation of the complex architectures that we require, but also the capability to clone and build groups of machines for our test environment.

Why VMware Workstation?

We will not elaborate in great detail about why the decision was made to use VMware Workstation. For an in-depth discussion as well as a comparison of a number of the different virtualization tools that are available, you can refer...

Installing VMware Workstation

To obtain the software, go to the http://www.VMware.com site and download it; you will be required to register if you have not done this before. The one good thing about registering is that they will send you discount codes, and you can potentially acquire the software for a reduced price. Once you downloaded the software, install it. The installation is simple and straightforward, so we will not cover this here.

Tip

You can use the free version of software VMware Player, but it does not provide the same capability to build complex and complete architectures; however, if you do want to use it, then you can build the layers of your architecture as independent entities with the provided switches that are available after your installation.

To access the switches for the network configuration in the VMware Workstation tool click on Edit | Virtual Network Editor | Add Network. An example of this is shown in the following image:

Installing VMware Workstation

If you click on the drop down next to...

Network design

Before we start the design of the network, we will review the existing network switches that are installed by default. When you install the VMware Workstation, there are three switches installed by default. These are the following:

  • VMnet0
  • VMnet1
  • VMnet8

VMnet0

The VMnet0 switch is the Bridged switch, and it is the one that is connected to the physical network. That is not what we normally will configure in our test architecture. This is because the connection requires that there be a connected network to obtain an IP address from, and a DHCP server available. Another reason for not using the physical connection is the fact that it is the connection to the network, and as such, we could inadvertently direct an attack into the network and this could result in us attacking someone that we do not have permission to test. Furthermore, this connection is often connected to the Internet. An example of the VMnet0 switch is shown in the following image.

VMnet0

An important thing to note from the...

Understanding the default architecture

With the default configuration of the VMware Workstation, we can create a multiple layer design. If we counted the VMnet0 switch, then we could architect three segments, but, since we have discussed the downside of doing this, we will just use the first two switches to set the initial phase of the architecture for the book. As we continue, we will add additional switches until we have the final design of the network that we wish to achieve.

Installing Kali Linux

We have a number of choices when it comes to installing Kali, and the one we select is largely a personal preference; the preferred method as a tester is to install the machine from the iso image, because that will provide you with the most control over the configuration of the machine. This method can also present challenges, but for the most part, it should not be too painful. Kali can be downloaded from http://www.kali.org, and once you are there, you have a number of options for the installation...

Creating the switches

We know that we have three switches that were created when we carried out the installation. This will allow us to create a number of different architectures, but we still need more switches for our design. The system has assigned our IP addresses for the VMnet1 and VMnet8 switches, respectively. We want to customize the switches to meet the IP addresses that we will use throughout the book. We have four subnets that we use throughout the book, and we will configure them now. This does not include the last chapter, and we will customize four switches just for that. In your VMware Workstation, click on Edit | Virtual Network Editor. This will bring up the network configuration window, and we want to configure the following:

Name

Subnet Address

VMnet1

192.168.50

VMnet2

192.168.25

VMnet3

192.168.101

VMnet4

192.168.10

VMnet5

192.168.20

VMnet6

192.168.30

VMnet7

192.168.40

VMnet8

192.168.75

This will provide us with the four subnets for the...

Introducing VMware Workstation


The selected platform for the book is the tool from VMware, and one of the early players in the virtualization market. The VMware Workstation provides us with the capability to emulate a number of different complex architectures, and this will allow us to architect the most sophisticated of networks as we build highly secure environments, so we can test the different penetration techniques against them.

At the time of writing this book, the VMware Workstation Version 11 is the current version, and it comes with a number of different features that allow for not only the creation of the complex architectures that we require, but also the capability to clone and build groups of machines for our test environment.

Why VMware Workstation?

We will not elaborate in great detail about why the decision was made to use VMware Workstation. For an in-depth discussion as well as a comparison of a number of the different virtualization tools that are available, you can refer...

Installing VMware Workstation


To obtain the software, go to the http://www.VMware.com site and download it; you will be required to register if you have not done this before. The one good thing about registering is that they will send you discount codes, and you can potentially acquire the software for a reduced price. Once you downloaded the software, install it. The installation is simple and straightforward, so we will not cover this here.

Tip

You can use the free version of software VMware Player, but it does not provide the same capability to build complex and complete architectures; however, if you do want to use it, then you can build the layers of your architecture as independent entities with the provided switches that are available after your installation.

To access the switches for the network configuration in the VMware Workstation tool click on Edit | Virtual Network Editor | Add Network. An example of this is shown in the following image:

If you click on the drop down next to the...

Left arrow icon Right arrow icon

Key benefits

  • Learn how to build your own pentesting lab environment to practice advanced techniques
  • Customize your own scripts, and learn methods to exploit 32-bit and 64-bit programs
  • Explore a vast variety of stealth techniques to bypass a number of protections when penetration testing

Description

The defences continue to improve and become more and more common, but this book will provide you with a number or proven techniques to defeat the latest defences on the networks. The methods and techniques contained will provide you with a powerful arsenal of best practices to increase your penetration testing successes. The processes and methodology will provide you techniques that will enable you to be successful, and the step by step instructions of information gathering and intelligence will allow you to gather the required information on the targets you are testing. The exploitation and post-exploitation sections will supply you with the tools you would need to go as far as the scope of work will allow you. The challenges at the end of each chapter are designed to challenge you and provide real-world situations that will hone and perfect your penetration testing skills. You will start with a review of several well respected penetration testing methodologies, and following this you will learn a step-by-step methodology of professional security testing, including stealth, methods of evasion, and obfuscation to perform your tests and not be detected! The final challenge will allow you to create your own complex layered architecture with defences and protections in place, and provide the ultimate testing range for you to practice the methods shown throughout the book. The challenge is as close to an actual penetration test assignment as you can get!

Who is this book for?

This book is for anyone who wants to improve their skills in penetration testing. As it follows a step-by-step approach, anyone from a novice to an experienced security tester can learn effective techniques to deal with highly secured environments. Whether you are brand new or a seasoned expert, this book will provide you with the skills you need to successfully create, customize, and plan an advanced penetration test.

What you will learn

  • A step-by-step methodology to identify and penetrate secured environments
  • Get to know the process to test network services across enterprise architecture when defences are in place
  • Grasp different web application testing methods and how to identify web application protections that are deployed
  • Understand a variety of concepts to exploit software
  • Gain proven post-exploitation techniques to exfiltrate data from the target
  • Get to grips with various stealth techniques to remain undetected and defeat the latest defences
  • Be the first to find out the latest methods to bypass firewalls
  • Follow proven approaches to record and save the data from tests for analysis

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : Mar 29, 2016
Length: 428 pages
Edition : 2nd
Language : English
ISBN-13 : 9781784395810
Vendor :
VMware
Category :
Tools :

What do you get with a Packt Subscription?

Free for first 7 days. $19.99 p/m after that. Cancel any time!
Product feature icon Unlimited ad-free access to the largest independent learning library in tech. Access this title and thousands more!
Product feature icon 50+ new titles added per month, including many first-to-market concepts and exclusive early access to books as they are being written.
Product feature icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Product feature icon Thousands of reference materials covering every tech concept you need to stay up to date.
Subscribe now
View plans & pricing

Product Details

Publication date : Mar 29, 2016
Length: 428 pages
Edition : 2nd
Language : English
ISBN-13 : 9781784395810
Vendor :
VMware
Category :
Tools :

Packt Subscriptions

See our plans and pricing
Modal Close icon
€18.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
€189.99 billed annually
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just €5 each
Feature tick icon Exclusive print discounts
€264.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just €5 each
Feature tick icon Exclusive print discounts

Frequently bought together


Stars icon
Total 124.97
Kali Linux 2:  Windows Penetration Testing
€41.99
Effective Python Penetration Testing
€32.99
Advanced Penetration Testing for Highly-Secured Environments, Second Edition
€49.99
Total 124.97 Stars icon
Banner background image

Table of Contents

13 Chapters
1. Penetration Testing Essentials Chevron down icon Chevron up icon
2. Preparing a Test Environment Chevron down icon Chevron up icon
3. Assessment Planning Chevron down icon Chevron up icon
4. Intelligence Gathering Chevron down icon Chevron up icon
5. Network Service Attacks Chevron down icon Chevron up icon
6. Exploitation Chevron down icon Chevron up icon
7. Web Application Attacks Chevron down icon Chevron up icon
8. Exploitation Concepts Chevron down icon Chevron up icon
9. Post-Exploitation Chevron down icon Chevron up icon
10. Stealth Techniques Chevron down icon Chevron up icon
11. Data Gathering and Reporting Chevron down icon Chevron up icon
12. Penetration Testing Challenge Chevron down icon Chevron up icon
Index Chevron down icon Chevron up icon

Customer reviews

Rating distribution
Full star icon Empty star icon Empty star icon Empty star icon Empty star icon 1
(1 Ratings)
5 star 0%
4 star 0%
3 star 0%
2 star 0%
1 star 100%
Randal T. Rioux Jul 07, 2016
Full star icon Empty star icon Empty star icon Empty star icon Empty star icon 1
This is the first book I've ever returned after buying and reading.It does not cover "Advanced Penetration Testing," nor does it deal in any way with "Highly-Secured Environments." It is an introduction to the business side of security testing, including permission, scope and contracts (rules of engagement). Most of the text is an explanation of how to setup VMware, pfSense, Kali, Ubuntu and other host systems used in test scenarios.The only "penetration testing" covered is through the use of popular scanning and exploitation tools such as Metasploit and nmap, both of which are given far greater detail in other publications.It felt like this book was written as a beginner's guide to getting into the field of penetration testing, but was given a new title at the last minute. For about $60, I found this book to be a completely overpriced collection of common knowledge.
Amazon Verified review Amazon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

What is included in a Packt subscription? Chevron down icon Chevron up icon

A subscription provides you with full access to view all Packt and licnesed content online, this includes exclusive access to Early Access titles. Depending on the tier chosen you can also earn credits and discounts to use for owning content

How can I cancel my subscription? Chevron down icon Chevron up icon

To cancel your subscription with us simply go to the account page - found in the top right of the page or at https://subscription.packtpub.com/my-account/subscription - From here you will see the ‘cancel subscription’ button in the grey box with your subscription information in.

What are credits? Chevron down icon Chevron up icon

Credits can be earned from reading 40 section of any title within the payment cycle - a month starting from the day of subscription payment. You also earn a Credit every month if you subscribe to our annual or 18 month plans. Credits can be used to buy books DRM free, the same way that you would pay for a book. Your credits can be found in the subscription homepage - subscription.packtpub.com - clicking on ‘the my’ library dropdown and selecting ‘credits’.

What happens if an Early Access Course is cancelled? Chevron down icon Chevron up icon

Projects are rarely cancelled, but sometimes it's unavoidable. If an Early Access course is cancelled or excessively delayed, you can exchange your purchase for another course. For further details, please contact us here.

Where can I send feedback about an Early Access title? Chevron down icon Chevron up icon

If you have any feedback about the product you're reading, or Early Access in general, then please fill out a contact form here and we'll make sure the feedback gets to the right team. 

Can I download the code files for Early Access titles? Chevron down icon Chevron up icon

We try to ensure that all books in Early Access have code available to use, download, and fork on GitHub. This helps us be more agile in the development of the book, and helps keep the often changing code base of new versions and new technologies as up to date as possible. Unfortunately, however, there will be rare cases when it is not possible for us to have downloadable code samples available until publication.

When we publish the book, the code files will also be available to download from the Packt website.

How accurate is the publication date? Chevron down icon Chevron up icon

The publication date is as accurate as we can be at any point in the project. Unfortunately, delays can happen. Often those delays are out of our control, such as changes to the technology code base or delays in the tech release. We do our best to give you an accurate estimate of the publication date at any given time, and as more chapters are delivered, the more accurate the delivery date will become.

How will I know when new chapters are ready? Chevron down icon Chevron up icon

We'll let you know every time there has been an update to a course that you've bought in Early Access. You'll get an email to let you know there has been a new chapter, or a change to a previous chapter. The new chapters are automatically added to your account, so you can also check back there any time you're ready and download or read them online.

I am a Packt subscriber, do I get Early Access? Chevron down icon Chevron up icon

Yes, all Early Access content is fully available through your subscription. You will need to have a paid for or active trial subscription in order to access all titles.

How is Early Access delivered? Chevron down icon Chevron up icon

Early Access is currently only available as a PDF or through our online reader. As we make changes or add new chapters, the files in your Packt account will be updated so you can download them again or view them online immediately.

How do I buy Early Access content? Chevron down icon Chevron up icon

Early Access is a way of us getting our content to you quicker, but the method of buying the Early Access course is still the same. Just find the course you want to buy, go through the check-out steps, and you’ll get a confirmation email from us with information and a link to the relevant Early Access courses.

What is Early Access? Chevron down icon Chevron up icon

Keeping up to date with the latest technology is difficult; new versions, new frameworks, new techniques. This feature gives you a head-start to our content, as it's being created. With Early Access you'll receive each chapter as it's written, and get regular updates throughout the product's development, as well as the final course as soon as it's ready.We created Early Access as a means of giving you the information you need, as soon as it's available. As we go through the process of developing a course, 99% of it can be ready but we can't publish until that last 1% falls in to place. Early Access helps to unlock the potential of our content early, to help you start your learning when you need it most. You not only get access to every chapter as it's delivered, edited, and updated, but you'll also get the finalized, DRM-free product to download in any format you want when it's published. As a member of Packt, you'll also be eligible for our exclusive offers, including a free course every day, and discounts on new and popular titles.