O'Reilly logo

Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide by Lee Allen

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Adding complexity or emulating target environments

At times it may become beneficial to mimic a customer's network in order to perform offline testing prior to the real test. This practice can allow you to sometimes determine the path of least resistance after some simple enumeration.

Let's take a look at the following network example:

Adding complexity or emulating target environments

Looking at the diagram we can determine that there are at least four known subnets, two firewalls, and six machines that fulfill various duties. Also found are a web application firewall and an intrusion detection system that is located between 192.168.25.0/24 and 192.168.50.0/24 and the DMZ'd Web1 server. It would ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required