官术网_书友最值得收藏!

Summary

In this chapter, we looked at creating a lab environment for penetration testing. As explained, your lab setup will depend solely on the resources available to you, such as CPU, RAM, and HDD space. It's a good idea to experiment with as many different OSes as you can, including Windows, Linux, Mac, Android, and even ARM OSes (available at https://www.vulnhub.com/) to be able to get yourself some experience in a controlled environment where you may legally carry out tests.

If using the Metasploitable server, we recommend that beginners, including professionals with limited time, use the Metasploitable 2 OS as the Metasploitable 3 OS setup is highly complicated—the builds can be built for specific host operating systems.

Users with limited resources can also use smaller vulnerable OSes such as BadStore and DVL which, like Metasploitable 2, come as pre-built servers available in ISO format and are ready to install with only minor setup.

It's recommended to have at least one Windows and one Linux OS for your lab for testing and learning. Up next, we'll look at the various methodologies available for penetration testing.

主站蜘蛛池模板: 马尔康县| 志丹县| 绩溪县| 若羌县| 芦溪县| 安宁市| 南开区| 昆山市| 新乐市| 巢湖市| 三门峡市| 嘉定区| 乌恰县| 土默特右旗| 海安县| 高唐县| 宜宾市| 冀州市| 崇州市| 新竹市| 枣阳市| 刚察县| 浮梁县| 澜沧| 南丹县| 海门市| 玉树县| 安义县| 石泉县| 清水县| 赤壁市| 青州市| 汝南县| 莎车县| 南汇区| 靖安县| 谷城县| 招远市| 衡东县| 罗甸县| 巢湖市|