Chapter 12. Penetration Testing Challenge

Throughout the book, we discussed various techniques and methodologies that, with practice, continual research, and diligence, will allow you to perform a penetration test from start to finish. This chapter allows you to put some of that information to work and bring it into perspective.

We will discuss the following items in this chapter:

  • Setting up the practice environment
  • Using penetration testing techniques to move from one system to another
  • An example of a penetration test in a fictional company

Firewall lab setup

As we prepare for the challenge, we need to build the core firewalls; there will be three firewalls that we will use in this chapter. They are as follows:

  • M0n0wall
  • Pfsense-1
  • Pfsense-2

The concept ...

Get Advanced Penetration Testing for Highly-Secured Environments - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.