官术网_书友最值得收藏!

Planning

An essential step to complete is the plan; also, the concept of what we are trying to achieve and how we are going to get there will be discussed. This is one of the areas that many do not spend enough time in. As we discussed in Chapter 1, Introducing Penetration Testing, we cannot take six to nine months in planning, like a potential attacker would more than likely do, for our abstract methodology. Having said that, we can spend a great deal of time planning the architectures we want to build for our advanced pen testing labs. So, we will start with what goes into the plan. The plan we are going to discuss consists of the areas mentioned in the following sections.

What are we trying to accomplish?

Are we trying to test a web application, an application, a device, or something else? This is where we start to identify what our virtualized environment is going to require; also, we identify how we are going to configure and build the required components.

By when do we have to accomplish it?

This is the step where we will define what the time frame is for what we are attempting to create. In this area, it is important to have a defined timeline; otherwise, we could continue building with no set outcome. While some inconsistency or unknowns are part of the process, the better we define the time, the more productive we will be. It is like goal setting; if you set goals, but you never specify a time frame, then it is not a well-defined goal.

As you read this, you may wonder how goal setting made its way into these pages. For those of you who are wondering, I will provide an example. While developing labs for a training course for a client, I was trying to create and build a Cisco router emulation capability that works very well. As I had not decided on the number of tries, and more importantly, a time frame for this activity, this resulted in three days of fruitless activity. I will cover this and provide steps on how you can build your own later in this chapter.

The virtual platform required for the course was going to be Hyper-V. I had used this solution for more than five years in a VMware environment, but no matter how much I tried, it was not working when I started to build the platform in Hyper-V. I first tried to convert one of my virtual machine VMDK files using the Starwind software, and that did not work. The network could not talk to the router emulator, and it could also not talk to the host. Therefore, in short, there was no connectivity. I then built the virtual machine from scratch thinking that it might work, and that did not work either. I worked on it for three days, reading every blog posting, whitepaper, or anything I could get my hands on. A better plan would have been to give it one day, or limit it to a number of tries, but when I started the plan, I did not have any timeline to it, and as such it cost me three days of time. I am sharing this with you now, so that you hopefully do not make the same mistakes that I had made.

A good way to quantify and track your planning is to use a form of a time chart or project tool. There are several available, but it is beyond the scope of this book to cover them. It really does not matter which one you use. If you are like me, you would want to use a simple one and not have to learn another program. So, the one I use is the calendar within Microsoft Outlook. Some of you probably use Microsoft Project; that is fine, use whatever works for you. I believe that most, if not all, of us have used a mail program at some point of time, and if the capability is in the mail program, then it is something worth exploring.

We will look at an example. I use the tasks and event components together, so if you start your Microsoft Outlook program, you can click on New Items at the top of the menu. This will bring up the menu to create a new item. An example of this is shown in the following screenshot:

By when do we have to accomplish it?

Menu to create a new item in Outlook (the cropped text is not important)

We want to create a new task; to do that, we click on the Task option, and this will open a new menu, as shown in the following screenshot:

By when do we have to accomplish it?

Menu screen after clicking on the Task option (the cropped text is not important)

From this point, it is a relatively easy process to create tasks and then be able to track them; furthermore, you can, at any time, refer to your task list and see what tasks still remain. You are encouraged to use tasks and events as you plan your building of network architectures. We will provide you with step-by-step processes to build your environment within this book, but when you stray outside of the book, there are chances you could run into challenges like the one with creating router emulations. When you do, it is essential that you plan for possible time delays and other unforeseen instances. The more time you spend in the planning phase, the fewer obstacles you will encounter as you progress to the later stages of development.

主站蜘蛛池模板: 洞口县| 滦平县| 横峰县| 马鞍山市| 惠水县| 绥中县| 宜川县| 察隅县| 双辽市| 手游| 镇安县| 司法| 钦州市| 温州市| 盐池县| 丽水市| 如皋市| 红河县| 大荔县| 莱阳市| 荥阳市| 金乡县| 资溪县| 察雅县| 六盘水市| 中山市| 黄大仙区| 常宁市| 仁布县| 民和| 翼城县| 西峡县| 洛扎县| 巫溪县| 三台县| 博爱县| 东至县| 临海市| 高尔夫| 汶上县| 镶黄旗|