Simulating penetration testing in the isolated network environment
Given that our lab environment in AWS has been set up successfully, we can now proceed with having a penetration testing simulation to verify that everything has been configured correctly. Of course, we will work with a simplified penetration testing process as our primary goal is to assess if the lab environment has been set up and configured properly.
Before we start the simulation, let’s quickly discuss the relevant concepts, terminologies, and tools we need to know for this section:
- Network pivoting: Network pivoting refers to the technique of using a compromised system as a gateway to access other interconnected systems or segments within a network. Using various network pivoting techniques and tools, an attacker can extend their reach, navigate through internal resources, and potentially escalate privileges.
- Lateral movement: Lateral movement refers to the act of an attacker moving horizontally...