- Building Virtual Pentesting Labs for Advanced Penetration Testing
- Kevin Cardwell
- 327字
- 2021-07-16 11:42:12
Summary
In this chapter, we have discussed the different types of virtualization, where type 1, also known as bare metal virtualization, provides the Hypervisor that can be directly accessed and installed in the hardware and with type 2, the Hypervisor installed in the operating system. One of the advantages of a type 1 solution is the fact that the Hypervisor directly installed in the hardware provides for improved performance; a drawback of this is the fact that the hardware has to integrate with the product's Hypervisor and you have to ensure that you check that it does so.
We looked at the different open source virtualization offerings that are possible, and we installed, configured basic settings, and created virtual machines in a number of tools. We downloaded and used an ISO image to create our virtual machine and booted the machine once it was created. Additionally, we downloaded the OWASP Broken Web Application Project virtual machine and used the existing configuration to run the machine.
We also looked at some of the commercial offerings with respect to virtualization, and it is here that we explained the reason why we will work with the virtualization product VMware Workstation from this point forward. Additionally, we discussed the powerful features of both the XenServer and vSphere products.
One of the challenges we face is taking old and existing machines and using them with the different virtualization offerings that are out there, so we discussed a tool from the group at Starwind Software that can be used to convert from VMDK to VHD files and VHD to VMDK files, and with the exception of some, conversions work extremely well.
We concluded this chapter with the concept of P2V, or physical to virtual conversion, which provides a way for us to take an existing or a new physical machine and convert it to a virtual one. In the next chapter, we will look at the challenge of planning and building our range.
- RESTful Java Web Services Security
- Practical Network Scanning
- 開發者的Web安全戒律:真實威脅與防御實踐
- 計算機使用安全與防護
- 深入淺出隱私計算:技術解析與應用實踐
- Enterprise Cloud Security and Governance
- INSTANT Windows PowerShell
- 工業控制網絡安全技術
- 代碼審計:企業級Web代碼安全架構
- Digital Forensics with Kali Linux
- 從實踐中學習Kali Linux滲透測試
- 信息安全等級保護測評與整改指導手冊
- 網絡安全態勢感知
- CTF特訓營:技術詳解、解題方法與競賽技巧
- 構建新型網絡形態下的網絡空間安全體系