SlideShare une entreprise Scribd logo
1  sur  139
Step On In,
The Water’s Fine!
An Introduction To
Security Testing Within A
Virtualized Environment
About Me:
• Tom Moore – Twitter: @c0ncealed
• Christian, Husband, & Father
• Red Team / Penetration Tester
• Security Awareness Evangelist
• Prior Marshall University Student
• High Hack Society / Proverbs Hackers
• Unrelenting G33K
• 2nd Amendment Supporter
• Should in NO WAY be considered an
expert in anything that I may say. =)
• SUPPORT HACKERS FOR CHARITY!
Agenda:
My goal is to provide
meaningful information in
the area of virtualized testing
environment options. I also wish
to convey why an understanding
of this subject is vastly needed
and for the most part easily
attainable, even though the
subject is often avoided
or overlooked.
Role Playing:
You are applying for a role within my
organization’s Information Security
Group...
One of the questions that I’m going to
ask you would be:
“What you are doing to either maintain,
or increase your relevant skill-set.”
What is your response?
What Is Seen:
Candidates for employment that have a
degree or relevant certifications, but
have learned the given curriculum in a
manner that allows them to test well on
the content.
What Is Needed:
Candidates for employment that not only
have a degree or relevant certifications,
but also possess a true working
knowledge of how to leverage their
toolsets to achieve the expected goal.
What Can Be Done:
Security Professionals in training need to
take a more direct approach towards
ensuring that they understand not only
the tools introduced to them, but also
the underlying architectures that they
operate on and sometimes exploit.
A more informed candidate is what is
being sought after in today’s Information
Security job market.
How This Can Be
Accomplished:In addition to book learning, hands-on
experience with these toolsets should be
the recipient of your invested time.
What Is Needed:
Candidates for employment that not only
have a degree or relevant certifications,
but also possess a true working
knowledge of how to leverage their
toolsets to achieve the expected goal.
Credit: CSOOnline.com - http://www.csoonline.com/article/2146363/security-leadership/self-taught-hackers-rule.html
What Is Needed:
Candidates for employment that not only
have a degree or relevant certifications,
but also possess a true working
knowledge of how to leverage their
toolsets to achieve the expected goal.
Credit: CSOOnline.com - http://www.csoonline.com/article/2146363/security-leadership/self-taught-hackers-rule.html
What Is Needed:
Candidates for employment that not only
have a degree or relevant certifications,
but also possess a true working
knowledge of how to leverage their
toolsets to achieve the expected goal.
Credit: CSOOnline.com - http://www.csoonline.com/article/2146363/security-leadership/self-taught-hackers-rule.html
How You Can Get There:
Practice… Practice… Practice…
Where You Can Practice:
Set up your own virtual lab!
• The cost is well worth the gain
• There are many open-source solutions
• Many toolset distributions now use
virtual machines as primary medium
• A wide variety of vulnerable
environments are also available for
your learning pleasure
Need Another Reason?:
More and more, the physical system
environments are going away!
Some might argue that familiarizing
yourself within a virtual environment will
be a more relevant method of training
and will give you experience that
employers are already looking for in
their next-generation of security
professionals.
Definition of Terms:
Hypervisor:
A hypervisor is a virtual machine
monitor (VMM).
It is generally a piece of computer
software, firmware, or hardware that
creates and runs virtual machines.
A computer on which a hypervisor is
running is defined as a host machine.
The virtual machines that run on this
host are referred to as guest machines.
Definition of Terms:
Virtual Machine:
A virtual machine (VM) is a software
based emulation of a computer.
Virtual machines generally operate
based on the architecture and functions
of a real computer.
Definition of Terms:
Snapshot:
A snapshot preserves the state and data
of a virtual machine at a specific point in
time.
The state includes the VM’s power state.
(ex: powered-on, powered-off, or
suspended)
The data includes all of the files that
make up the VM. This includes disks,
memory, and other devices, such as
virtual network interface cards.
Definition of Terms:
Bridged / NAT / Host Only :
The options available to configure virtual
network adapters within VM’s.
Bridged: Binds the virtual network adapter directly
to your physical ethernet adapter. The VM will obtain
DHCP lease from the physical network.
NAT: Binds the virtual network adapter behind a NAT
environment. Obtains internal DHCP address and
shares the physical ethernet adapter’s public IP
address for external communication.
Host Only: Allows internal network communication
only. DHCP lease obtained behind internal NAT.
Let’s Get Technical:
Enough with the hypothetical, let’s get
into the bits… cause this bytes… =P
Structure for the approach:
• Hardware considerations
• Virtualization platform options
• Example set-up of Vmware ESXi
• Offensive or Forensic Distributions
• Ex: Kali or SamuraiWTF
• Virtual Appliances
• Vulnerable Distributions
• Ex: Metasploitable 2 or NOWASP
Hardware Considerations:
• While the CPU speeds do matter, they
will not be your primary concern.
• A quad-core CPU is recommended.
• What you will need plenty of are:
• Memory (RAM)
• Hypervisors are memory hogs.
• Hard Drive Capacity (HDD)
• VM’s range drastically in size,
especially when Snapshotted.
• A sufficient Power Supply will need to
be accounted for based on the above
specifications.
Virtualization Platforms:
• VMware Fusion (Mac)
• VMware Player/Workstation (Win/Linux)
• VMware ESXi (Server)
• Parallels (Mac)
• Oracle VirtualBox (Mac/Win/Linux)
• ProxMox (Server)
• XenServer (Server, running OpenVZ as guest)
This list should not be considered all-inclusive.
These are simply platforms that I have tested.
VMware ESXi Setup:
• For our example, I have set up a
VMware ESXi Hypervisor on this
MacBook Pro system.
• System Specs:
• CPU: Quad-core Intel i7 2GHz
• RAM: 16GB 1333MHz DDR3
• HDD: WD Black 500GB 7200 RPM
• VMware ESXi is free for educational
purposes. Register on vmware.com for
a license key.
• Here are some screenshots of the ESXi
setup process for your reference.
VMware ESXi Setup:
• Further Information…
• This installation is performed by
using the following configuration:
•VMware ESXi .iso image is on host
MacBook Pro.
•Created a New virtual machine
within VMware Fusion.
•Set the ESXi .iso as the boot media
for the VM.
• (This is being done this way for
demonstration purposes. If you have
physical hardware for ESXi, use that)
VMware ESXi Setup:
• Brace yourselves! Screenshots!
VMware ESXi Management:
• The one disadvantage to using
VMware ESXi, in my opinion, is that
the most effective management
interface is in the form of a Windows
fat client.
• Due to this, we will also go through
the process of setting up a Windows 8
VM with the VMware vSphere Client as
well as the VMware vCenter Converter
Standalone application.
• This will be our ESXi management VM.
VMware ESXi Management:
• Further Information…
• This installation is performed by
using the following configuration:
•Windows 8.1 .iso image is on host
MacBook Pro.
•Created a New virtual machine
within VMware Fusion.
•Set the Windows 8.1 .iso as the
boot media for the VM.
• (This is done so that we don’t have to
have a physical Windows box for ESXi
Management.)
VMware ESXi Management:
• More Screenshots?
VMware ESXi Management:
• Now we will register VMware vSphere
Client.
• The key should have been obtained
when you registered for your
vmware.com account and downloaded
your ESXi iso files and binaries.
• When its registered, you will see the
status message in the bottom right-
hand corner of the client disappear.
VMware ESXi Management:
• Now we will setup VMware vCenter
Converter Standalone.
• This will be used to convert VMware
images into an ESXi format.
• It will also transfer VM’s over to our
ESXi Server after conversion.
Offensive / Forensic
Distributions:• Kali Linux
• BlackArch Linux
• Backbox Linux
• Pentoo
• SamuraiWTF
• MobiSec
• SIFT Workstation
• DEFT Linux
• REMnux
Offensive / Forensic
Distributions:• Screenshots!
Virtual Appliances:
• Routers / Switches
• Vyatta
• Firewalls
• pfSense
• Intrusion Prevention Systems
• Intrusion Detection Systems
• SecurityOnion
• Security Incident and Event Monitoring
• AlienVault OSSIM
Vulnerable Distributions:
• Metasploitable 2
• NOWASP Mutillidae
• OWASP Broken Web Apps
• Web Security DoJo
• HADES
• VulnVOiP
• VulnVPN
• Dexter
• Brainpan
• Relativity
Vulnerable Distributions:
• VulnHub
www.vulnhub.com
• Credit: g0tm1lk
Vulnerable Distributions:
• Leveraging VulnHub.com, we will pull
down a copy of Metasploitable2 as our
vulnerable guest distribution.
• Now we will use VMware vCenter
Converter Standalone to convert our
new vulnerable image and then push
it to our ESXi server.
Vulnerable Distributions:
• Now let’s spin it up!
• Once we have the Metasploitable 2 VM
powered on, we will go back to our
Kali VM within VMware Fusion.
• From the Kali offensive VM, let’s scan
the virtual DHCP range looking for our
new vulnerable guest machine!
Congratulations!:
• You have just gone through the
process of setting up a virtual testing
lab with a VMware ESXi hypervisor!
• You have a Windows VM set up to
manage your hypervisor.
• You know where to obtain your
Offensive, Appliance, and Vulnerable
distributions and VMs.
• You also know how to convert and
transfer them to your ESXi server!
• You then saw how easy it was to
enumerate guests from your Kali VM!
Summary:
• InfoSec Recruiters for organizations
are looking for candidates that KNOW
how to leverage the needed tools to
perform an assessment.
• You can teach yourself skills that may
not be covered in most curriculums
through the use of Virtual
Environments.
• It takes time, it’s not easy, but it will
pay off.
• YOU CAN DO THIS!
One More Thing:
• If you would like to support or present
at a BSides conference, please consider
presenting at BSides Charlotte!
• When: June 21, 2014 (Sat)
• Where: Charlotte, NC
• Web: www.bsidesclt.org
• Twitter: @BSidesCLT
I’m Out:
THANK YOU!
Contact Info:
• Name: Tom Moore
• E-mail: c0ncealedx64@gmail.com
• Twitter: @c0ncealed
* Send hate mail to Bill Gardner
THANK YOU!

Contenu connexe

Tendances

Hacking the future with USB HID
Hacking the future with USB HIDHacking the future with USB HID
Hacking the future with USB HIDNikhil Mittal
 
Disaster Planning Backup, Backup, Backup
Disaster Planning Backup, Backup, BackupDisaster Planning Backup, Backup, Backup
Disaster Planning Backup, Backup, BackupTechSoup
 
The Internet Of Insecure Things: 10 Most Wanted List - Derbycon 2014
The Internet Of Insecure Things: 10 Most Wanted List - Derbycon 2014The Internet Of Insecure Things: 10 Most Wanted List - Derbycon 2014
The Internet Of Insecure Things: 10 Most Wanted List - Derbycon 2014Security Weekly
 
Red team upgrades using sccm for malware deployment
Red team upgrades   using sccm for malware deploymentRed team upgrades   using sccm for malware deployment
Red team upgrades using sccm for malware deploymentenigma0x3
 
Defcon 22-david-wyde-client-side-http-cookie-security
Defcon 22-david-wyde-client-side-http-cookie-securityDefcon 22-david-wyde-client-side-http-cookie-security
Defcon 22-david-wyde-client-side-http-cookie-securityPriyanka Aash
 
Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Pr...
Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Pr...Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Pr...
Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Pr...Security Weekly
 
How to Secure your WordPress Website - WordCamp UK 2014
How to Secure your WordPress Website - WordCamp UK 2014How to Secure your WordPress Website - WordCamp UK 2014
How to Secure your WordPress Website - WordCamp UK 2014Primary Image Ltd
 
Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?Rob Fuller
 
SSL: Past, Present and Future
SSL: Past, Present and FutureSSL: Past, Present and Future
SSL: Past, Present and FutureLuis Grangeia
 
Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...Luis Grangeia
 
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2Rob Fuller
 
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014Jakub Kałużny
 
“_____ Is Not a Security Boundary: Things I Have Learned and Things That Have...
“_____ Is Not a Security Boundary: Things I Have Learned and Things That Have...“_____ Is Not a Security Boundary: Things I Have Learned and Things That Have...
“_____ Is Not a Security Boundary: Things I Have Learned and Things That Have...enigma0x3
 
Secure Authentication and Session Management in Java EE
Secure Authentication and Session Management in Java EESecure Authentication and Session Management in Java EE
Secure Authentication and Session Management in Java EEPatrycja Wegrzynowicz
 
Zeronights 2015 - Big problems with big data - Hadoop interfaces security
Zeronights 2015 - Big problems with big data - Hadoop interfaces securityZeronights 2015 - Big problems with big data - Hadoop interfaces security
Zeronights 2015 - Big problems with big data - Hadoop interfaces securityJakub Kałużny
 
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...Benjamin Delpy
 
Is code review the solution?
Is code review the solution?Is code review the solution?
Is code review the solution?Tiago Mendo
 
Protect Your Payloads: Modern Keying Techniques
Protect Your Payloads: Modern Keying TechniquesProtect Your Payloads: Modern Keying Techniques
Protect Your Payloads: Modern Keying TechniquesLeo Loobeek
 

Tendances (20)

Hacking the future with USB HID
Hacking the future with USB HIDHacking the future with USB HID
Hacking the future with USB HID
 
Disaster Planning Backup, Backup, Backup
Disaster Planning Backup, Backup, BackupDisaster Planning Backup, Backup, Backup
Disaster Planning Backup, Backup, Backup
 
Cloud Economics
Cloud EconomicsCloud Economics
Cloud Economics
 
The Internet Of Insecure Things: 10 Most Wanted List - Derbycon 2014
The Internet Of Insecure Things: 10 Most Wanted List - Derbycon 2014The Internet Of Insecure Things: 10 Most Wanted List - Derbycon 2014
The Internet Of Insecure Things: 10 Most Wanted List - Derbycon 2014
 
Red team upgrades using sccm for malware deployment
Red team upgrades   using sccm for malware deploymentRed team upgrades   using sccm for malware deployment
Red team upgrades using sccm for malware deployment
 
Defcon 22-david-wyde-client-side-http-cookie-security
Defcon 22-david-wyde-client-side-http-cookie-securityDefcon 22-david-wyde-client-side-http-cookie-security
Defcon 22-david-wyde-client-side-http-cookie-security
 
Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Pr...
Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Pr...Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Pr...
Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Pr...
 
How to Secure your WordPress Website - WordCamp UK 2014
How to Secure your WordPress Website - WordCamp UK 2014How to Secure your WordPress Website - WordCamp UK 2014
How to Secure your WordPress Website - WordCamp UK 2014
 
Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?
 
SSL: Past, Present and Future
SSL: Past, Present and FutureSSL: Past, Present and Future
SSL: Past, Present and Future
 
Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...
 
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
 
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
 
“_____ Is Not a Security Boundary: Things I Have Learned and Things That Have...
“_____ Is Not a Security Boundary: Things I Have Learned and Things That Have...“_____ Is Not a Security Boundary: Things I Have Learned and Things That Have...
“_____ Is Not a Security Boundary: Things I Have Learned and Things That Have...
 
Luis Grangeia IBWAS
Luis Grangeia IBWASLuis Grangeia IBWAS
Luis Grangeia IBWAS
 
Secure Authentication and Session Management in Java EE
Secure Authentication and Session Management in Java EESecure Authentication and Session Management in Java EE
Secure Authentication and Session Management in Java EE
 
Zeronights 2015 - Big problems with big data - Hadoop interfaces security
Zeronights 2015 - Big problems with big data - Hadoop interfaces securityZeronights 2015 - Big problems with big data - Hadoop interfaces security
Zeronights 2015 - Big problems with big data - Hadoop interfaces security
 
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...
 
Is code review the solution?
Is code review the solution?Is code review the solution?
Is code review the solution?
 
Protect Your Payloads: Modern Keying Techniques
Protect Your Payloads: Modern Keying TechniquesProtect Your Payloads: Modern Keying Techniques
Protect Your Payloads: Modern Keying Techniques
 

En vedette

Made in india sunpreet kaur cushions
Made in india   sunpreet kaur cushionsMade in india   sunpreet kaur cushions
Made in india sunpreet kaur cushionsSunpreet Kaur
 
It all had to start somewhere!
It all had to start somewhere!It all had to start somewhere!
It all had to start somewhere!Kenneth Mann
 
Made in india sunpreet kaur placemats
Made in india  sunpreet kaur placematsMade in india  sunpreet kaur placemats
Made in india sunpreet kaur placematsSunpreet Kaur
 
Red Teaming Your Bug-out Bag - Hack3rCon^4
Red Teaming Your Bug-out Bag - Hack3rCon^4Red Teaming Your Bug-out Bag - Hack3rCon^4
Red Teaming Your Bug-out Bag - Hack3rCon^4Tom Moore
 
Per una societat conscienciada, reflexiva i compromesa
Per una societat conscienciada, reflexiva i compromesaPer una societat conscienciada, reflexiva i compromesa
Per una societat conscienciada, reflexiva i compromesaSergio Cebolla Mínguez
 
Obligaciones del despacho y rutas fiscales autorizadas para efectuar el tráns...
Obligaciones del despacho y rutas fiscales autorizadas para efectuar el tráns...Obligaciones del despacho y rutas fiscales autorizadas para efectuar el tráns...
Obligaciones del despacho y rutas fiscales autorizadas para efectuar el tráns...Fiorella Chuquipul Palomino
 
Титульный слайд в презентации
Титульный слайд в презентацииТитульный слайд в презентации
Титульный слайд в презентацииInspired presentation
 
Тренинг "Эффективная презентация"
Тренинг "Эффективная презентация"Тренинг "Эффективная презентация"
Тренинг "Эффективная презентация"Inspired presentation
 

En vedette (15)

Made in india sunpreet kaur cushions
Made in india   sunpreet kaur cushionsMade in india   sunpreet kaur cushions
Made in india sunpreet kaur cushions
 
Bilangan kompleks
Bilangan kompleksBilangan kompleks
Bilangan kompleks
 
It all had to start somewhere!
It all had to start somewhere!It all had to start somewhere!
It all had to start somewhere!
 
Unit 4 pp3
Unit 4 pp3Unit 4 pp3
Unit 4 pp3
 
Presentation1
Presentation1Presentation1
Presentation1
 
Unit 3 pp2
Unit 3 pp2Unit 3 pp2
Unit 3 pp2
 
Week1
Week1Week1
Week1
 
Made in india sunpreet kaur placemats
Made in india  sunpreet kaur placematsMade in india  sunpreet kaur placemats
Made in india sunpreet kaur placemats
 
Red Teaming Your Bug-out Bag - Hack3rCon^4
Red Teaming Your Bug-out Bag - Hack3rCon^4Red Teaming Your Bug-out Bag - Hack3rCon^4
Red Teaming Your Bug-out Bag - Hack3rCon^4
 
Per una societat conscienciada, reflexiva i compromesa
Per una societat conscienciada, reflexiva i compromesaPer una societat conscienciada, reflexiva i compromesa
Per una societat conscienciada, reflexiva i compromesa
 
Unit three pp 3
Unit three pp 3Unit three pp 3
Unit three pp 3
 
Obligaciones del despacho y rutas fiscales autorizadas para efectuar el tráns...
Obligaciones del despacho y rutas fiscales autorizadas para efectuar el tráns...Obligaciones del despacho y rutas fiscales autorizadas para efectuar el tráns...
Obligaciones del despacho y rutas fiscales autorizadas para efectuar el tráns...
 
C новым годом!
C новым годом!C новым годом!
C новым годом!
 
Титульный слайд в презентации
Титульный слайд в презентацииТитульный слайд в презентации
Титульный слайд в презентации
 
Тренинг "Эффективная презентация"
Тренинг "Эффективная презентация"Тренинг "Эффективная презентация"
Тренинг "Эффективная презентация"
 

Similaire à Virtual Security Testing Lab Setup Using VMware ESXi

Building a low cost hack lab
Building a low cost hack labBuilding a low cost hack lab
Building a low cost hack labJoe McCray
 
Malware Analysis For The Enterprise
Malware Analysis For The EnterpriseMalware Analysis For The Enterprise
Malware Analysis For The EnterpriseJason Ross
 
Virtualization auditing & security deck v1.0
Virtualization auditing & security deck v1.0Virtualization auditing & security deck v1.0
Virtualization auditing & security deck v1.0Concentrated Technology
 
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...Robert Conti Jr.
 
Cloud Device Insecurity
Cloud Device InsecurityCloud Device Insecurity
Cloud Device InsecurityJeremy Brown
 
Creating Havoc using Human Interface Device
Creating Havoc using Human Interface DeviceCreating Havoc using Human Interface Device
Creating Havoc using Human Interface DevicePositive Hack Days
 
BSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad GuysBSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad GuysJoff Thyer
 
System hardening - OS and Application
System hardening - OS and ApplicationSystem hardening - OS and Application
System hardening - OS and Applicationedavid2685
 
CloudStack - Top 5 Technical Issues and Troubleshooting
CloudStack - Top 5 Technical Issues and TroubleshootingCloudStack - Top 5 Technical Issues and Troubleshooting
CloudStack - Top 5 Technical Issues and TroubleshootingShapeBlue
 
Abusing bleeding edge web standards for appsec glory
Abusing bleeding edge web standards for appsec gloryAbusing bleeding edge web standards for appsec glory
Abusing bleeding edge web standards for appsec gloryPriyanka Aash
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareQuick Heal Technologies Ltd.
 
DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...
DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...
DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...Felipe Prado
 
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wnedLayer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wnedfangjiafu
 
WordPress Security and Best Practices
WordPress Security and Best PracticesWordPress Security and Best Practices
WordPress Security and Best PracticesRobert Vidal
 
[HES2013] Virtually secure, analysis to remote root 0day on an industry leadi...
[HES2013] Virtually secure, analysis to remote root 0day on an industry leadi...[HES2013] Virtually secure, analysis to remote root 0day on an industry leadi...
[HES2013] Virtually secure, analysis to remote root 0day on an industry leadi...Hackito Ergo Sum
 
Sitecore on Azure
Sitecore on AzureSitecore on Azure
Sitecore on AzureClearPeople
 
The Notorious 9: Is Your Data Secure in the Cloud?
The Notorious 9: Is Your Data Secure in the Cloud?The Notorious 9: Is Your Data Secure in the Cloud?
The Notorious 9: Is Your Data Secure in the Cloud?BCS ProSoft
 
You think your WiFi is safe?
You think your WiFi is safe?You think your WiFi is safe?
You think your WiFi is safe?Rob Gillen
 

Similaire à Virtual Security Testing Lab Setup Using VMware ESXi (20)

Building a low cost hack lab
Building a low cost hack labBuilding a low cost hack lab
Building a low cost hack lab
 
Malware Analysis For The Enterprise
Malware Analysis For The EnterpriseMalware Analysis For The Enterprise
Malware Analysis For The Enterprise
 
Virtualization auditing & security deck v1.0
Virtualization auditing & security deck v1.0Virtualization auditing & security deck v1.0
Virtualization auditing & security deck v1.0
 
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
 
Cloud Device Insecurity
Cloud Device InsecurityCloud Device Insecurity
Cloud Device Insecurity
 
Creating Havoc using Human Interface Device
Creating Havoc using Human Interface DeviceCreating Havoc using Human Interface Device
Creating Havoc using Human Interface Device
 
BSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad GuysBSIDES-PR Keynote Hunting for Bad Guys
BSIDES-PR Keynote Hunting for Bad Guys
 
System hardening - OS and Application
System hardening - OS and ApplicationSystem hardening - OS and Application
System hardening - OS and Application
 
CloudStack - Top 5 Technical Issues and Troubleshooting
CloudStack - Top 5 Technical Issues and TroubleshootingCloudStack - Top 5 Technical Issues and Troubleshooting
CloudStack - Top 5 Technical Issues and Troubleshooting
 
Abusing bleeding edge web standards for appsec glory
Abusing bleeding edge web standards for appsec gloryAbusing bleeding edge web standards for appsec glory
Abusing bleeding edge web standards for appsec glory
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry Ransomware
 
Confidence web
Confidence webConfidence web
Confidence web
 
DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...
DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...
DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...
 
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wnedLayer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
Layer one 2011-joe-mccray-you-spent-all-that-money-and-still-got-0wned
 
WordPress Security and Best Practices
WordPress Security and Best PracticesWordPress Security and Best Practices
WordPress Security and Best Practices
 
[HES2013] Virtually secure, analysis to remote root 0day on an industry leadi...
[HES2013] Virtually secure, analysis to remote root 0day on an industry leadi...[HES2013] Virtually secure, analysis to remote root 0day on an industry leadi...
[HES2013] Virtually secure, analysis to remote root 0day on an industry leadi...
 
Sitecore on Azure
Sitecore on AzureSitecore on Azure
Sitecore on Azure
 
The Notorious 9: Is Your Data Secure in the Cloud?
The Notorious 9: Is Your Data Secure in the Cloud?The Notorious 9: Is Your Data Secure in the Cloud?
The Notorious 9: Is Your Data Secure in the Cloud?
 
You think your WiFi is safe?
You think your WiFi is safe?You think your WiFi is safe?
You think your WiFi is safe?
 
Ntxissacsc5 red 1 & 2 basic hacking tools ncc group
Ntxissacsc5 red 1 & 2   basic hacking tools ncc groupNtxissacsc5 red 1 & 2   basic hacking tools ncc group
Ntxissacsc5 red 1 & 2 basic hacking tools ncc group
 

Dernier

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Dernier (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Virtual Security Testing Lab Setup Using VMware ESXi

  • 1. Step On In, The Water’s Fine! An Introduction To Security Testing Within A Virtualized Environment
  • 2. About Me: • Tom Moore – Twitter: @c0ncealed • Christian, Husband, & Father • Red Team / Penetration Tester • Security Awareness Evangelist • Prior Marshall University Student • High Hack Society / Proverbs Hackers • Unrelenting G33K • 2nd Amendment Supporter • Should in NO WAY be considered an expert in anything that I may say. =) • SUPPORT HACKERS FOR CHARITY!
  • 3. Agenda: My goal is to provide meaningful information in the area of virtualized testing environment options. I also wish to convey why an understanding of this subject is vastly needed and for the most part easily attainable, even though the subject is often avoided or overlooked.
  • 4. Role Playing: You are applying for a role within my organization’s Information Security Group... One of the questions that I’m going to ask you would be: “What you are doing to either maintain, or increase your relevant skill-set.” What is your response?
  • 5. What Is Seen: Candidates for employment that have a degree or relevant certifications, but have learned the given curriculum in a manner that allows them to test well on the content.
  • 6. What Is Needed: Candidates for employment that not only have a degree or relevant certifications, but also possess a true working knowledge of how to leverage their toolsets to achieve the expected goal.
  • 7. What Can Be Done: Security Professionals in training need to take a more direct approach towards ensuring that they understand not only the tools introduced to them, but also the underlying architectures that they operate on and sometimes exploit. A more informed candidate is what is being sought after in today’s Information Security job market.
  • 8. How This Can Be Accomplished:In addition to book learning, hands-on experience with these toolsets should be the recipient of your invested time.
  • 9. What Is Needed: Candidates for employment that not only have a degree or relevant certifications, but also possess a true working knowledge of how to leverage their toolsets to achieve the expected goal. Credit: CSOOnline.com - http://www.csoonline.com/article/2146363/security-leadership/self-taught-hackers-rule.html
  • 10. What Is Needed: Candidates for employment that not only have a degree or relevant certifications, but also possess a true working knowledge of how to leverage their toolsets to achieve the expected goal. Credit: CSOOnline.com - http://www.csoonline.com/article/2146363/security-leadership/self-taught-hackers-rule.html
  • 11. What Is Needed: Candidates for employment that not only have a degree or relevant certifications, but also possess a true working knowledge of how to leverage their toolsets to achieve the expected goal. Credit: CSOOnline.com - http://www.csoonline.com/article/2146363/security-leadership/self-taught-hackers-rule.html
  • 12. How You Can Get There: Practice… Practice… Practice… Where You Can Practice: Set up your own virtual lab! • The cost is well worth the gain • There are many open-source solutions • Many toolset distributions now use virtual machines as primary medium • A wide variety of vulnerable environments are also available for your learning pleasure
  • 13. Need Another Reason?: More and more, the physical system environments are going away! Some might argue that familiarizing yourself within a virtual environment will be a more relevant method of training and will give you experience that employers are already looking for in their next-generation of security professionals.
  • 14. Definition of Terms: Hypervisor: A hypervisor is a virtual machine monitor (VMM). It is generally a piece of computer software, firmware, or hardware that creates and runs virtual machines. A computer on which a hypervisor is running is defined as a host machine. The virtual machines that run on this host are referred to as guest machines.
  • 15. Definition of Terms: Virtual Machine: A virtual machine (VM) is a software based emulation of a computer. Virtual machines generally operate based on the architecture and functions of a real computer.
  • 16. Definition of Terms: Snapshot: A snapshot preserves the state and data of a virtual machine at a specific point in time. The state includes the VM’s power state. (ex: powered-on, powered-off, or suspended) The data includes all of the files that make up the VM. This includes disks, memory, and other devices, such as virtual network interface cards.
  • 17. Definition of Terms: Bridged / NAT / Host Only : The options available to configure virtual network adapters within VM’s. Bridged: Binds the virtual network adapter directly to your physical ethernet adapter. The VM will obtain DHCP lease from the physical network. NAT: Binds the virtual network adapter behind a NAT environment. Obtains internal DHCP address and shares the physical ethernet adapter’s public IP address for external communication. Host Only: Allows internal network communication only. DHCP lease obtained behind internal NAT.
  • 18. Let’s Get Technical: Enough with the hypothetical, let’s get into the bits… cause this bytes… =P Structure for the approach: • Hardware considerations • Virtualization platform options • Example set-up of Vmware ESXi • Offensive or Forensic Distributions • Ex: Kali or SamuraiWTF • Virtual Appliances • Vulnerable Distributions • Ex: Metasploitable 2 or NOWASP
  • 19. Hardware Considerations: • While the CPU speeds do matter, they will not be your primary concern. • A quad-core CPU is recommended. • What you will need plenty of are: • Memory (RAM) • Hypervisors are memory hogs. • Hard Drive Capacity (HDD) • VM’s range drastically in size, especially when Snapshotted. • A sufficient Power Supply will need to be accounted for based on the above specifications.
  • 20. Virtualization Platforms: • VMware Fusion (Mac) • VMware Player/Workstation (Win/Linux) • VMware ESXi (Server) • Parallels (Mac) • Oracle VirtualBox (Mac/Win/Linux) • ProxMox (Server) • XenServer (Server, running OpenVZ as guest) This list should not be considered all-inclusive. These are simply platforms that I have tested.
  • 21. VMware ESXi Setup: • For our example, I have set up a VMware ESXi Hypervisor on this MacBook Pro system. • System Specs: • CPU: Quad-core Intel i7 2GHz • RAM: 16GB 1333MHz DDR3 • HDD: WD Black 500GB 7200 RPM • VMware ESXi is free for educational purposes. Register on vmware.com for a license key. • Here are some screenshots of the ESXi setup process for your reference.
  • 22. VMware ESXi Setup: • Further Information… • This installation is performed by using the following configuration: •VMware ESXi .iso image is on host MacBook Pro. •Created a New virtual machine within VMware Fusion. •Set the ESXi .iso as the boot media for the VM. • (This is being done this way for demonstration purposes. If you have physical hardware for ESXi, use that)
  • 23. VMware ESXi Setup: • Brace yourselves! Screenshots!
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42. VMware ESXi Management: • The one disadvantage to using VMware ESXi, in my opinion, is that the most effective management interface is in the form of a Windows fat client. • Due to this, we will also go through the process of setting up a Windows 8 VM with the VMware vSphere Client as well as the VMware vCenter Converter Standalone application. • This will be our ESXi management VM.
  • 43. VMware ESXi Management: • Further Information… • This installation is performed by using the following configuration: •Windows 8.1 .iso image is on host MacBook Pro. •Created a New virtual machine within VMware Fusion. •Set the Windows 8.1 .iso as the boot media for the VM. • (This is done so that we don’t have to have a physical Windows box for ESXi Management.)
  • 44. VMware ESXi Management: • More Screenshots?
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67.
  • 68.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77. VMware ESXi Management: • Now we will register VMware vSphere Client. • The key should have been obtained when you registered for your vmware.com account and downloaded your ESXi iso files and binaries. • When its registered, you will see the status message in the bottom right- hand corner of the client disappear.
  • 78.
  • 79.
  • 80.
  • 81.
  • 82.
  • 83.
  • 84.
  • 85. VMware ESXi Management: • Now we will setup VMware vCenter Converter Standalone. • This will be used to convert VMware images into an ESXi format. • It will also transfer VM’s over to our ESXi Server after conversion.
  • 86.
  • 87.
  • 88.
  • 89.
  • 90.
  • 91.
  • 92.
  • 93.
  • 94.
  • 95.
  • 96.
  • 97.
  • 98.
  • 99.
  • 100.
  • 101. Offensive / Forensic Distributions:• Kali Linux • BlackArch Linux • Backbox Linux • Pentoo • SamuraiWTF • MobiSec • SIFT Workstation • DEFT Linux • REMnux
  • 102.
  • 104. Virtual Appliances: • Routers / Switches • Vyatta • Firewalls • pfSense • Intrusion Prevention Systems • Intrusion Detection Systems • SecurityOnion • Security Incident and Event Monitoring • AlienVault OSSIM
  • 105.
  • 106.
  • 107. Vulnerable Distributions: • Metasploitable 2 • NOWASP Mutillidae • OWASP Broken Web Apps • Web Security DoJo • HADES • VulnVOiP • VulnVPN • Dexter • Brainpan • Relativity
  • 109. Vulnerable Distributions: • Leveraging VulnHub.com, we will pull down a copy of Metasploitable2 as our vulnerable guest distribution. • Now we will use VMware vCenter Converter Standalone to convert our new vulnerable image and then push it to our ESXi server.
  • 110.
  • 111.
  • 112.
  • 113.
  • 114.
  • 115.
  • 116.
  • 117.
  • 118.
  • 119.
  • 120.
  • 121.
  • 122.
  • 123.
  • 124.
  • 125.
  • 126.
  • 127.
  • 128.
  • 129.
  • 130.
  • 131. Vulnerable Distributions: • Now let’s spin it up! • Once we have the Metasploitable 2 VM powered on, we will go back to our Kali VM within VMware Fusion. • From the Kali offensive VM, let’s scan the virtual DHCP range looking for our new vulnerable guest machine!
  • 132.
  • 133.
  • 134.
  • 135. Congratulations!: • You have just gone through the process of setting up a virtual testing lab with a VMware ESXi hypervisor! • You have a Windows VM set up to manage your hypervisor. • You know where to obtain your Offensive, Appliance, and Vulnerable distributions and VMs. • You also know how to convert and transfer them to your ESXi server! • You then saw how easy it was to enumerate guests from your Kali VM!
  • 136. Summary: • InfoSec Recruiters for organizations are looking for candidates that KNOW how to leverage the needed tools to perform an assessment. • You can teach yourself skills that may not be covered in most curriculums through the use of Virtual Environments. • It takes time, it’s not easy, but it will pay off. • YOU CAN DO THIS!
  • 137. One More Thing: • If you would like to support or present at a BSides conference, please consider presenting at BSides Charlotte! • When: June 21, 2014 (Sat) • Where: Charlotte, NC • Web: www.bsidesclt.org • Twitter: @BSidesCLT
  • 139. Contact Info: • Name: Tom Moore • E-mail: c0ncealedx64@gmail.com • Twitter: @c0ncealed * Send hate mail to Bill Gardner THANK YOU!

Notes de l'éditeur

  1. Another reason why training yourself to test in virtual environments is so valuable, is that most companies are now
  2. All of this is relative.I’ll be setting up an ESXi VM on my MBPIt is running a Quad-core i7 2GHz CPUand has 16GB 1333 MHz DDR3 RamWestern Digital Black 500gb 7200 RPM HDD
  3. All of this is relative.I’ll be setting up an ESXi VM on my MBPIt is running a Quad-core i7 2GHz CPUand has 16GB 1333 MHz DDR3 RamWestern Digital Black 500gb 7200 RPM HDD
  4. All of this is relative.I’ll be setting up an ESXi VM on my MBPIt is running a Quad-core i7 2GHz CPUand has 16GB 1333 MHz DDR3 RamWestern Digital Black 500gb 7200 RPM HDD