Join Cybrary

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATION
Already a Member Login Here

S3SS10N Wednesday – Build Your Own Pen Testing Lab


< Back to Blog Posts

S3SS10N Wednesday – Build Your Own Pen Testing Lab

Published: March 2, 2016 | By: Tatianna | Views: 5085
save

What is S3SS10N Wednesday?

S3SS10N Wednesdays are our weekly 15 minute lessons put together by Instructors and Cybrary Staff to offer you valuable information relevant to your life. Every Wednesday morning (Eastern time) a new session will be available for you to view, read, and discuss with others. Make sure to come back weekly and see what’s new!

 

You must be a Cybrary member to view this S3SS10N Wednesday video. Join for free.

Join Now

Login

Instructor Bio –

Dean Pompilio

Instructor Dean Pompilio has been in the IT field since 1989 and has both US and international experience working in the banking and credit card industries. After spending most of this life in Chicago, he came to the Washington, DC area in 2005 and has worked with the Department of Justice as well as the State Department in senior analyst roles as well as The World Bank. He took on a teaching role to share his experience both from an IT perspective as well as an educator. You can view his (1.5 minute) bio here.

Whiteboard Notes

(Click the picture below to open in a new tab)

 
Dean Session
 

Purpose of this Session:
A Pen testing lab is a great way for programmers to begin learning about the kind of technology that is available in this field and there are many advantages to having your own lab in that not only is it portable; always having access allows you to practice and learn as much as you desire. This video offers participants step by step instructions in how to build an all in one, complete testing system and everything is virtualized so it’s on one device such as a laptop.

Building your Virtual Machine –
Virtual machines are strong for this purpose because they are secure as long as you are careful with the network settings. Building a virtual machine isn’t hard as long as you possess the right tools, starting with a powerful laptop with a minimum of 8 GB of RAM and then begin downloading VM building tools to start building your lab.

Configuring virtual machine settings –
There are several options for the way virtual machines can communicate and the instructor discusses three:
1. Bridge mode
2. NAT Mode
3. Host Only Mode
Finally, the instructor talks about KALI and Web Goat, which are free and powerful tools that can be used to build a virtual machine. Participants can also found vulnerable virtual machines on vulnhub.com, these tools give participants a chance to practice their techniques.



Listen to/Download the MP3


< Back to Blog Posts
Enjoy this blog post? Want more Cybytes?
Invite a Friend
and share now
Facebook Twitter Google+ LinkedIn Email
Join Cybrary
66 Comments
  1. In the beginning of the video there was mention of a more extensive lab setup with an attacking machine and several host machines. I’m trying to create something like this. What would you suggest I install on several host machines? And how would I set up the network? Is there any videos or tutorials on a physical home lab setups for vulnerability testing / ethical hacking?

    Thank you!

  2. Thanks for this video. It’s really understandable.

    I’m waiting for the next.

Page 11 of 11« First...«7891011
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel