- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- Lee Allen Kevin Cardwell
- 238字
- 2021-07-09 20:20:36
Introducing VMware Workstation
The selected platform for the book is the tool from VMware, and one of the early players in the virtualization market. The VMware Workstation provides us with the capability to emulate a number of different complex architectures, and this will allow us to architect the most sophisticated of networks as we build highly secure environments, so we can test the different penetration techniques against them.
At the time of writing this book, the VMware Workstation Version 11 is the current version, and it comes with a number of different features that allow for not only the creation of the complex architectures that we require, but also the capability to clone and build groups of machines for our test environment.
Why VMware Workstation?
We will not elaborate in great detail about why the decision was made to use VMware Workstation. For an in-depth discussion as well as a comparison of a number of the different virtualization tools that are available, you can refer to Building Virtual Pentesting Labs for Advanced Penetration Testing.
One of the main reasons for using the software is the history of the tool and the fact that it has very mature software and provides us with a robust platform that can provide a number of different architectures; furthermore, based on experience and testing of the tool, we discovered that it can provide a much more robust networking capability than many other tools.
- 白話網(wǎng)絡(luò)安全2:網(wǎng)安戰(zhàn)略篇
- 白帽子講Web安全(紀(jì)念版)
- 信息系統(tǒng)安全檢測與風(fēng)險評估
- 計算機使用安全與防護(hù)
- 反黑命令與攻防從新手到高手(微課超值版)
- 數(shù)據(jù)安全實踐指南
- 防火墻技術(shù)與應(yīng)用(第2版)
- 數(shù)據(jù)保護(hù):工作負(fù)載的可恢復(fù)性
- 信息技術(shù)基礎(chǔ):提高篇·實驗與習(xí)題
- 捍衛(wèi)隱私
- Hands-On Artificial Intelligence for Cybersecurity
- Android Application Security Essentials
- 安全網(wǎng)絡(luò)構(gòu)建
- Hands-On Bug Hunting for Penetration Testers
- 深入探索區(qū)塊鏈