O'Reilly logo

Building Virtual Pentesting Labs for Advanced Penetration Testing by Kevin Cardwell

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Attacking the firewall

Next, we want to attack the firewall, like we did earlier when we encountered the router. Our success will be determined by the administrator and how they have configured their environment.

We will use the Smoothwall firewall that we created, and we will attack it from the red interface that is connected to the VMnet2 switch. We will use the same process we used against the router and see what we can discover when we go against the firewall. Our testing range is shown in the following diagram:

Attacking the firewall

As the previous diagram shows, we will just concentrate on the external interface of the Smoothwall machine. The first thing we want ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required