O'Reilly logo

Building Virtual Pentesting Labs for Advanced Penetration Testing by Kevin Cardwell

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

iptables

For those of you who do not have a Cisco IOS, we can use the filtering features of iptables to create the firewall capability we used in the Dynamips virtual machine.

In Chapter 4, Identifying Range Architecture, we created a Debian distribution to serve as our iptables machine. We could also use iptables as our Bastion Host filter, but for the purposes of the book, we will stick with using the iptables machine at the first level of defense. Of course, you can build and plug machines in anywhere in the architecture because it is flexible and just a baseline-layered configuration.

Even if you have already built the Cisco Dynamips machine, you still should follow along and complete the steps to add the iptables machine to your architecture ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required