官术网_书友最值得收藏!

Summary

In this chapter, we looked at creating a lab environment for penetration testing. As explained, your lab setup will depend solely on the resources available to you, such as CPU, RAM, and HDD space. It's a good idea to experiment with as many different OSes as you can, including Windows, Linux, Mac, Android, and even ARM OSes (available at https://www.vulnhub.com/) to be able to get yourself some experience in a controlled environment where you may legally carry out tests.

If using the Metasploitable server, we recommend that beginners, including professionals with limited time, use the Metasploitable 2 OS as the Metasploitable 3 OS setup is highly complicated—the builds can be built for specific host operating systems.

Users with limited resources can also use smaller vulnerable OSes such as BadStore and DVL which, like Metasploitable 2, come as pre-built servers available in ISO format and are ready to install with only minor setup.

It's recommended to have at least one Windows and one Linux OS for your lab for testing and learning. Up next, we'll look at the various methodologies available for penetration testing.

主站蜘蛛池模板: 通化市| 安平县| 乃东县| 蒙阴县| 合水县| 榆社县| 衡阳市| 宁明县| 张掖市| 山西省| 深泽县| 江源县| 吴江市| 九台市| 金乡县| 沙坪坝区| 祁连县| 镇远县| 沅陵县| 遂溪县| 安陆市| 鄢陵县| 武宣县| 丽水市| 上虞市| 乐都县| 新郑市| 巴林右旗| 尖扎县| 资溪县| 大连市| 柞水县| 嵊泗县| 和田县| 安仁县| 曲周县| 嘉定区| 辽宁省| 美姑县| 德阳市| 景东|