Advanced Pentest Labs

Hardware Considerations

Routers

Firewalls

Firewall evasion is an advanced skill that needs practice

Stateful and stateless firewalls present different problems as well

Intrusion Detection

the most widely used IDS/IPS is the Open Source software application called Snort

www.snort.org

System/Intrusion

Prevention System

Hardware Configuration

De-ICE Network

Challenges

Network Architecture

Operating Systems and Applications

Operating Systems

www.packetstormsecurity.org/UNIX/penetration/rootkits/

Packet Storm links to downloadable rootkits

Applications

remote-db.com

Analyzing Malware—Viruses and Worms

Virtual Versus Nonvirtual Labs

Creating a Controlled Environment

www.xen.org,

Possible lab configuration using Xen hypervisor.

all wireless communication must be disabled

Harvesting Malware

connecting a honeypot directly to the Internet

This allows Nepenthes to harvest malware directly from Internet attacks

Information Analysis

tools

Wireshark

reverse engineering

Other Target Ideas

CTF Events

DefCon CTF

www.openctf.com

www.captf.com/wiki/Main_Page

Web-Based Challenges

www.hackthissite.org/

Crackmes.de

www.hellboundhackers.org

www.try2hack.nl/

Vulnerability Announcements

results matching ""

    No results matching ""