h4cker/build_your_own_lab
2020-07-01 13:20:00 -04:00
..
ansible Create inventory-example 2019-09-26 22:42:31 -04:00
websploit Update Vagrantfile 2019-09-26 22:35:51 -04:00
docker_resources.md Update docker_resources.md 2019-09-05 17:01:00 -04:00
README.md Update README.md 2020-07-01 13:20:00 -04:00
security-onion-proxmox.md Update security-onion-proxmox.md 2020-03-30 00:13:58 -04:00

Building Your Own Penetration Testing Lab

The following are some tips and instructions on how you can build your own lab for penetration testing and to practice different defensive techniques helpful for incident response and digital forensics.

Pen Testing Linux Distributions

While most of the penetration testing tools can be downloaded in isolation and installed in many different operating systems, several popular security-related Linux distributions package hundreds of tools. These distributions make it easy for you to get started and not having to worry about many dependencies, libraries, and compatibility issues you may encounter. The following are the three most popular Linux distributions for ethical hacking (penetration testing):

  • Kali Linux: probably the most popular distribution of the three. This distribution is primarily supported and maintained by Offensive Security and can be downloaded from https://www.kali.org. You can easily install it in bare-metal systems, virtual machines, and even in devices like the Raspberry Pi, Chromebooks, and many others. Note: The folks at Offensive Security have created a free training and book that guides you how to install it in your system. Those resources can be accessed at: https://kali.training

  • Parrot: is another popular Linux distribution used by many pen testers and security researchers. You can also install it in bare-metal and in virtual machines. You can download Parrot from https://www.parrotsec.org

  • BlackArch Linux: this distribution comes with over 2300 different tools and packages and it is also gaining popularity. You can download BlackArch Linux from: https://blackarch.org

Vulnerable Servers and Applications

There are several intentionally vulnerable applications and virtual machines that you can deploy in a lab (safe) environment to practice your skills. You can also run some of them in Docker containers.

Go to the Vulnerable Servers Section of this GitHub repository to obtain a list of dozens of vulnerable applications and VMs that can be used to practice your skills.

WebSploit

WebSploit is a virtual machine (VM) created by Omar Santos for different Cybersecurity Ethical Hacking (Web Penetration Testing) training sessions delivered at DEFCON, Live Training in Safari, video on demand LiveLessons, and others.

The purpose of this VM is to have a lightweight (single VM) with a few web application penetration testing tools, as well as vulnerable applications.

Getting Started

  1. Download VirtualBox.
  2. Download the .ova file from http://websploit.org and import it in VirtualBox. Alternatively, download Kali or Parrot and then run curl -sSL https://websploit.org/install.sh | sudo bash.

The following are the vulnerable applications included in WebSploit:

  • Damn Vulnerable Web Application (DVWA)
  • Damn Vulnerable Node Application (DVNA)
  • WebGoat
  • Hackazon
  • OWASP Juice Shop
  • OWASP Mutillidae 2
  • bWapp2
  • hackme-rtov

Cloud-Based Cyber Ranges