Chapter guide
This chapter is much longer than the previous chapters, and is therefore split into smaller chunks. The chunks are made up of the following:
A rough approach and guidelines to creating test environments: The aim here is to create a single laptop or piece of infrastructure capable of hosting the full attack range.
A scenario focused on chain-of-attack education: The idea here is to create a range that forces the attack to pivot multiple times to achieve their goal. Expect cunning uses of IPtables and the like. We will be creating an example, and I'll be providing examples of various exploits to be hosted as we go along. I don't want to just give you one solution and say, "that's how it's done," because there are very few things you can actually do that with.
A scenario based on a standard penetration test: The idea here is to host a number of different systems with varying degrees of vulnerability. The aim is to allow the tutor or pen-tester-in-charge to have options for how...