The setup
As usual, we will need to set up our virtual lab to emulate this environment as the penetration test we are performing is purely fictional. However, do not consider this effort in vain; many penetration testers will attempt to emulate the network of their client in order to ensure the exploits they intend on using actually work and are stable, not to mention this reduces the likelihood of diligent administrators and security professionals detecting your movements. Depending on the type of penetration test this could prove critical.
NewAlts Research Labs' virtual network
We will set up the following environment in VirtualBox:
System name: pfsense1
OS: pfSense 2.0 (FreeBSD)
Virtual disk size: 1 GB
RAM: 128
Three network adapters (Internal):
WAN = 192.168.10.1 (Int10)
LAN = 192.168.20.1 (DMZ20)
OPT1 = 192.168.30.1(DEV30)
OPT2 = NAT (This is an optional step which allows you to easily download and install the necessary packages. This adapter should be disabled ASAP.)
Installed packages:
Snort...