O'Reilly logo

Building Virtual Pentesting Labs for Advanced Penetration Testing by Kevin Cardwell

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 6. Creating an External Attack Architecture

In this chapter, we will build an external architecture that we will use as we progress through the different phases of attack. We will discuss the following topics in this chapter:

  • Establishing layered architectures
  • Configuring firewall architectures
  • Deploying IDS/IPS and load balancers
  • Integrating web application firewalls

This chapter will provide us with an external attack architecture that will provide the capability to emulate a number of different testing environments. In the chapter, we will work through the process of configuring the range core devices that are the connecting devices for the architectures such as the router, switches, and the firewall machine. Consequently, we can easily ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required