Chapter 19: Lab Setup
In this chapter, we will set up a lab environment that allows us to test our tools, techniques, and attacks on some real equipment, without risking taking down production. I will be presenting a rather extensive lab setup. Not all of this is necessary to follow along with the exercises in this book, but having a test environment like this allows you to take your newly acquired skills to the next level and expand on what you have learned.
We will be covering the following topics:
- Discussing the lab architecture
- Details about the enterprise environment lab setup
- Details about the industrial environment lab setup
- Simulating (Chinese) attackers
- Discussing the role of lab firewalls
- How to install the malware for the lab environment
- Configuring packet capturing for passive security tools
Let's start the discussion with an overview of the lab architecture.