Advanced Pentest Labs
Hardware Considerations
Routers
Firewalls
Firewall evasion is an advanced skill that needs practice
Stateful and stateless firewalls present different problems as well
Intrusion Detection
the most widely used IDS/IPS is the Open Source software application called Snort
www.snort.org
System/Intrusion
Prevention System
Hardware Configuration
De-ICE Network
Challenges
Network Architecture
Operating Systems and Applications
Operating Systems
www.packetstormsecurity.org/UNIX/penetration/rootkits/
Packet Storm links to downloadable rootkits
Applications
remote-db.com
Analyzing Malware—Viruses and Worms
Virtual Versus Nonvirtual Labs
Creating a Controlled Environment
www.xen.org,
Possible lab configuration using Xen hypervisor.
all wireless communication must be disabled
Harvesting Malware
connecting a honeypot directly to the Internet
This allows Nepenthes to harvest malware directly from Internet attacks
Information Analysis
tools
Wireshark
reverse engineering
Other Target Ideas
CTF Events
DefCon CTF
www.openctf.com
www.captf.com/wiki/Main_Page
Web-Based Challenges
www.hackthissite.org/
Crackmes.de
www.hellboundhackers.org
www.try2hack.nl/