O'Reilly logo

Building Virtual Pentesting Labs for Advanced Penetration Testing by Kevin Cardwell

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 13. Building a Complete Cyber Range

In this chapter, we will put all of the components together and discuss the architecture that can support the scenarios we have covered throughout the book. In this chapter, we will be discussing the following topics:

  • Creating the layered architecture
  • Integrating decoys and honeypots
  • Attacking the cyber range
  • Recording the attack data for further training and analysis

This chapter will provide us with a complete architecture that we can use to preform our testing. This design will allow us to plug in any required components that we might have. Furthermore, it will provide you with the capability to test all types of testing that you might need.

Creating the layered architecture

As we have discussed throughout ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required