SlideShare a Scribd company logo
Step On In, 
The Water’s Fine! 
An Introduction To 
Security Testing Within A 
Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Thank You! 
…to all of the crew that has a 
part in this amazing 
conference!
About Me: 
• Tom Moore – Twitter: @c0ncealed 
• Christian, Husband, & Father 
• Red Team / Penetration Tester 
• High Hack Society / Proverbs Hackers 
/ 304Geek 
• Unrelenting G33K 
• 2nd Amendment Supporter 
• Should in NO WAY be considered an 
expert in anything that I may say. =) 
• SUPPORT HACKERS FOR CHARITY!
Agenda: 
My goal is to provide 
meaningful information in 
the area of virtualized testing 
environment options. I also wish 
to convey why an understanding 
of this subject is vastly needed 
and for the most part easily 
attainable, even though the 
subject is often avoided 
or overlooked.
Disclaimer:
Disclaimer:
Disclaimer:
Disclaimer:
Role Playing: 
You are applying for a role within an 
organization’s Information Security 
Group... 
One of the questions that a reputable 
organization ‘should’ ask you would be: 
“What you are doing to either maintain, 
or increase your relevant skill-set?” 
What is your response?
What Is Needed: 
Candidates for employment that not only 
have a degree or relevant certifications, 
but also possess a true working 
knowledge of how to leverage their 
toolsets to achieve the expected goal.
What Can Be Done: 
Security Professionals in training need to 
take a more direct approach towards 
ensuring that they understand not only 
the tools introduced to them, but also 
the underlying architectures that they 
operate on. 
A more informed candidate is what is 
being sought after in today’s Information 
Security job market.
How This Can Be 
Accomplished:
What Is Needed: 
Candidates for employment that not only 
have a degree or relevant certifications, 
but also possess a true working 
knowledge of how to leverage their 
toolsets to achieve the expected goal. 
Credit: CSOOnline.com - http://www.csoonline.com/article/2146363/security-leadership/self-taught-hackers-rule.html
What Is Needed: 
Candidates for employment that not only 
have a degree or relevant certifications, 
but also possess a true working 
knowledge of how to leverage their 
toolsets to achieve the expected goal. 
Credit: CSOOnline.com - http://www.csoonline.com/article/2146363/security-leadership/self-taught-hackers-rule.html
What Is Needed: 
Candidates for employment that not only 
have a degree or relevant certifications, 
but also possess a true working 
knowledge of how to leverage their 
toolsets to achieve the expected goal. 
Credit: CSOOnline.com - http://www.csoonline.com/article/2146363/security-leadership/self-taught-hackers-rule.html
How You Can Get There: 
Practice… Practice… Practice… 
Where You Can Practice:
How You Can Get There: 
Practice… Practice… Practice… 
Where You Can Practice:
How You Can Get There: 
Practice… Practice… Practice… 
Where You Can Practice: 
Set up your own virtual lab! 
• The cost is well worth the gain 
• There are many open-source solutions 
• Many toolset distributions now use 
virtual machines as primary medium 
• A wide variety of vulnerable 
environments are also available for 
your learning pleasure
Need Another Reason?: 
More and more, the 
physical environments 
are going away!
Definition of Terms: 
Hypervisor: 
A hypervisor is a virtual machine 
monitor (VMM). 
It is generally a piece of computer 
software, firmware, or hardware that 
creates and runs virtual machines. 
A computer on which a hypervisor is 
running is defined as a host machine. 
The virtual machines that run on this 
host are referred to as guest machines.
Definition of Terms: 
Virtual Machine: 
A virtual machine (VM) is a software 
based emulation of a computer. 
Virtual machines generally operate 
based on the architecture and functions 
of a real computer.
Definition of Terms: 
Snapshot: 
A snapshot preserves the state and data 
of a virtual machine at a specific point in 
time. 
The state includes the VM’s power state. 
(ex: powered-on, powered-off, or 
suspended) 
The data includes all of the files that 
make up the VM. This includes disks, 
memory, and other devices, such as 
virtual network interface cards.
Definition of Terms: 
Snapshot: 
A snapshot preserves the state and data 
of a virtual machine at a specific point in 
time. 
The state includes the VM’s power state. 
(ex: powered-on, powered-off, or 
suspended) 
The data includes all of the files that 
make up the VM. This includes disks, 
memory, and other devices, such as 
virtual network interface cards.
Definition of Terms: 
Snapshot: 
A snapshot preserves the state and data 
of a virtual machine at a specific point in 
time. 
The state includes the VM’s power state. 
(ex: powered-on, powered-off, or 
suspended) 
The data includes all of the files that 
make up the VM. This includes disks, 
memory, and other devices, such as 
virtual network interface cards.
Definition of Terms: 
Bridged / NAT / Host Only : 
The options available to configure virtual 
network adapters within VM’s. 
Bridged: Binds the virtual network adapter directly 
to your physical ethernet adapter. The VM will obtain 
DHCP lease from the physical network. 
NAT: Binds the virtual network adapter behind a NAT 
environment. Obtains internal DHCP address and 
shares the physical ethernet adapter’s public IP 
address for external communication. 
Host Only: Allows internal network communication 
only. DHCP lease obtained behind internal NAT.
Let’s Get Technical: 
Enough with the hypothetical, let’s get 
into the bits… cause this bytes… =P 
Structure for the approach: 
• Hardware considerations 
• Virtualization platform options 
• Example set-up of Vmware ESXi 
• Offensive or Forensic Distributions 
• Ex: Kali, SamuraiWTF, SIFT, etc. 
• Virtual Appliances 
• Vulnerable Distributions 
• Ex: Metasploitable 2 or NOWASP
Hardware Considerations: 
• While the CPU speeds do matter, they 
will not be your primary concern. 
• A quad-core CPU is recommended. 
• What you will need plenty of are: 
• Memory (RAM) 
• Hypervisors are memory hogs. 
• Hard Drive Capacity (HDD) 
• VM’s range drastically in size, 
especially when Snapshotted. 
• A sufficient Power Supply will need to 
be accounted for based on the above 
specifications.
Virtualization Platforms: 
• VMware Fusion (Mac) 
• VMware Player/Workstation (Win/Linux) 
• VMware ESXi/ESX (Server) 
• Parallels (Mac) 
• Oracle VirtualBox (Mac/Win/Linux) 
• ProxMox (Server, running OpenVZ as guest) 
• XenServer (Server, running OpenVZ as guest) 
This list should not be considered all-inclusive. 
These are simply platforms that I have tested and 
that are for the most part easily attainable.
VMware ESXi Setup: 
• For our example, I have set up a 
VMware ESXi Hypervisor on this 
MacBook Pro system. 
• System Specs: 
• CPU: Quad-core Intel i7 2GHz 
• RAM: 16GB 1333MHz DDR3 
• HDD: WD Black 500GB 7200 RPM 
• VMware ESXi is free for educational 
purposes. Register on vmware.com for 
a license key.
VMware ESXi Setup: 
• Further Information… 
• This installation is performed by 
using the following configuration: 
•VMware ESXi .iso image is on host 
MacBook Pro. 
•Created a New virtual machine 
within VMware Fusion. 
•Set the ESXi .iso as the boot media 
for the VM. 
• (This is being done this way for 
demonstration purposes. If you have 
physical hardware for ESXi, use that)
VMware ESXi Setup:
VMware ESXi Setup:
VMware ESXi Setup:
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
VMware ESXi Management: 
• The one disadvantage to using 
VMware ESXi, in my opinion, is that 
the most effective management 
interface is in the form of a Windows 
fat client. 
• Due to this, we will also go through 
the process of setting up a Windows 8 
VM with the VMware vSphere Client as 
well as the VMware vCenter Converter 
Standalone application. 
• This will be our ESXi management VM.
VMware ESXi Management: 
• Further Information… 
• This installation is performed by 
using the following configuration: 
•Windows 8.1 .iso image is on host 
MacBook Pro. 
•Created a New virtual machine 
within VMware Fusion. 
•Set the Windows 8.1 .iso as the 
boot media for the VM. 
• (This is done so that we don’t have to 
have a physical Windows box for ESXi 
Management.)
VMware ESXi Management:
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
VMware ESXi Management:
VMware ESXi Management: 
• Now we will register VMware ESXi 
Server through the vSphere Client. 
• The key should have been obtained 
when you registered for your 
vmware.com account and downloaded 
your ESXi iso files and binaries. 
• When its registered, you will see the 
status message in the bottom right-hand 
corner of the client disappear.
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
VMware ESXi Management: 
• Now we will setup VMware vCenter 
Converter Standalone. 
• This will be used to convert VMware 
images into an ESXi format. 
• It will also transfer VM’s over to our 
ESXi Server after conversion.
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Offensive / Forensic 
D• isKtarlii bLuintuiox ns: 
• Arch Assault 
• Pentoo 
• SamuraiWTF 
• MobiSec 
• Backbox Linux 
• Blackbuntu 
• BlackArch Linux 
• REMnux 
• SIFT Workstation 
• DEFT Linux 
• CAINE
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Offensive / Forensic 
D• isStcrriebeunstihoontss! :
Virtual Appliances: 
• Routers / Switches 
• Vyatta 
• Firewalls 
• pfSense 
• Intrusion Prevention Systems 
• Intrusion Detection Systems 
• SecurityOnion 
• Security Incident and Event Monitoring 
• AlienVault OSSIM
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Vulnerable Distributions: 
• Metasploitable 2 
• NOWASP Mutillidae 
• OWASP Broken Web Apps 
• Web Security DoJo 
• HADES 
• VulnVOiP 
• VulnVPN 
• Dexter 
• Brainpan 
• Relativity
Vulnerable Distributions: 
• VulnHub 
www.vulnhub.com 
• Credit: g0tm1lk
Vulnerable Distributions:
Vulnerable Distributions: 
• Leveraging VulnHub.com, we will pull 
down a copy of Metasploitable2 as our 
vulnerable guest distribution. 
• Now we will use VMware vCenter 
Converter Standalone to convert our 
new vulnerable image and then push 
it to our ESXi server.
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Vulnerable Distributions: 
• Now let’s spin it up! 
• Once we have the Metasploitable 2 VM 
powered on, we will go back to our 
Kali VM within VMware Fusion. 
• From the Kali offensive VM, let’s scan 
the virtual DHCP range looking for our 
new vulnerable guest machine!
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment
Congratulations!:
Congratulations!: 
• You have just gone through the 
process of setting up a virtual testing 
lab with a VMware ESXi hypervisor! 
• You have a Windows VM set up to 
manage your hypervisor. 
• You know where to obtain your 
Offensive, Appliance, and Vulnerable 
distributions and VMs. 
• You also know how to convert and 
transfer them to your ESXi server! 
• You then saw how easy it was to 
enumerate guests from your Kali VM!
Summary: 
• InfoSec Recruiters for organizations 
are looking for candidates that KNOW 
how to leverage the needed tools to 
perform an assessment. 
• You can teach yourself skills that may 
not be covered in most curriculums 
through the use of Virtual 
Environments. 
• It takes time, it’s not easy, but it will 
pay off. 
• YOU CAN DO IT!
Summary: 
• InfoSec Recruiters for organizations 
are looking for candidates that KNOW 
how to leverage the needed tools to 
perform an assessment. 
• You can teach yourself skills that may 
not be covered in most curriculums 
through the use of Virtual 
Environments. 
• It takes time, it’s not easy, but it will 
pay off. 
• YOU CAN DO IT!
Resources: 
• Virtualization Platforms 
• VMware ESXi Download - 
https://my.vmware.com/web/vmware/info/slug/datacenter_clo 
ud_infrastructure/vmware_vsphere_hypervisor_esxi/5_5 
• VMware Free vSphere Registration - 
https://my.vmware.com/web/vmware/evalcenter?p=free-esxi5& 
lp=default 
• VMware Player - 
https://my.vmware.com/web/vmware/free#desktop_end_user 
_computing/vmware_player/4_0 
• VMware Fusion - http://www.vmware.com/products/fusion 
• VMware Workstation - 
https://my.vmware.com/web/vmware/info/slug/desktop_end_u 
ser_computing/vmware_workstation/10_0 
• Parallels - http://www.parallels.com/landingpage/pd/general/ 
• Oracle VirtualBox - 
https://www.virtualbox.org/wiki/Downloads 
• ProxMox VE - http://www.proxmox.com/downloads/ 
• Citrix XenServer - 
http://www.citrix.com/products/xenserver/try.html
Resources: 
• Offensive Distributions 
• Kali Linux - http://www.kali.org/downloads/ 
• Arch Assault - https://archassault.org/download/ 
• Pentoo - http://www.pentoo.ch/download/ 
• SamuraiWTF - http://sourceforge.net/projects/samurai/ 
• MobiSec - http://sourceforge.net/projects/mobisec/files/ 
• Backbox Linux - http://www.backbox.org/downloads 
• Blackbuntu - http://sourceforge.net/projects/blackbuntu/ 
• Blackarch Linux - http://blackarch.org/download.html 
• REMnux - http://sourceforge.net/projects/remnux/ 
• SIFT Workstation - http://digital-forensics. 
sans.org/community/downloads 
• Deft Linux - http://www.deftlinux.net/download/ 
• CAINE - http://www.caine-live.net/page5/page5.html
Resources: 
• Virtual Appliances 
• VMware VA Marketplace - 
https://solutionexchange.vmware.com/store/category_groups/ 
19 
• Turnkey Linux - http://www.turnkeylinux.org/it-infrastructure 
• ShareVM - http://sharevm.wordpress.com/2009/09/25/top-ten- 
vmware-virtual-appliances-for-security/ 
• Vyatta - http://www.brocade.com/forms/jsp/vyatta-download/ 
index.jsp 
• pfSense - https://www.pfsense.org/download/ 
• Security Onion - http://sourceforge.net/projects/security-onion/ 
• AlienVault OSSIM - http://www.alienvault.com/open-threat-exchange/ 
projects
Resources: 
• Vulnerable Distributions 
• VulnHub- http://www.vulnhub.com 
(Many worth mentioning, but this site will get you there)
One More Thing: 
• If you want to experience another 
amazing conference with the same feel 
as DerbyCon, go to Hack3rCon! 
• When: November 14-16, 2014 
• Where: Charleston, WV 
• Web: www.hack3rcon.org 
• Twitter: @hack3rcon
I’m Out: 
THANK YOU!
Contact Info: 
• Name: Tom Moore 
• E-mail: c0ncealedx64@gmail.com 
• Twitter: @c0ncealed 
• Slides: 
THANK YOU!

More Related Content

What's hot (20)

VMware Interview questions and answers
VMware Interview questions and answersVMware Interview questions and answers
VMware Interview questions and answers
vivaankumar
 
100 most vmware q&a
100 most vmware q&a100 most vmware q&a
100 most vmware q&a
Venkata Ramana
 
Virtualization securityv2
Virtualization securityv2Virtualization securityv2
Virtualization securityv2
vivekbhat
 
Vmware interview
Vmware interviewVmware interview
Vmware interview
sundaresanmani
 
VMware App Volumes Troubleshooting
VMware App Volumes TroubleshootingVMware App Volumes Troubleshooting
VMware App Volumes Troubleshooting
Denis Gundarev
 
Prepare and Manage Remote Applications through Virtualization
Prepare and Manage Remote Applications through Virtualization      Prepare and Manage Remote Applications through Virtualization
Prepare and Manage Remote Applications through Virtualization
Rubal Sagwal
 
WHITE PAPER: Threats to Virtual Environments - Symantec Security Response Team
WHITE PAPER: Threats to Virtual Environments - Symantec Security Response TeamWHITE PAPER: Threats to Virtual Environments - Symantec Security Response Team
WHITE PAPER: Threats to Virtual Environments - Symantec Security Response Team
Symantec
 
Virtualization using VMWare Workstation
Virtualization using VMWare WorkstationVirtualization using VMWare Workstation
Virtualization using VMWare Workstation
Hitesh Gupta
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
EMC
 
Security Best Practices For Hyper V And Server Virtualization
Security Best Practices For Hyper V And Server VirtualizationSecurity Best Practices For Hyper V And Server Virtualization
Security Best Practices For Hyper V And Server Virtualization
rsnarayanan
 
Ws80 using VMware
Ws80 using VMwareWs80 using VMware
Ws80 using VMware
Umesh Gupta
 
How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment....
How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment....How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment....
How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment....
Denis Gundarev
 
SYN507: Reducing desktop infrastructure management overhead using “old school...
SYN507: Reducing desktop infrastructure management overhead using “old school...SYN507: Reducing desktop infrastructure management overhead using “old school...
SYN507: Reducing desktop infrastructure management overhead using “old school...
Denis Gundarev
 
Vmware inter
Vmware interVmware inter
Vmware inter
Venkata Ramana
 
Transitioning to vmWare ESXi
Transitioning to vmWare ESXiTransitioning to vmWare ESXi
Transitioning to vmWare ESXi
Jose Antonio Chavez Verdin
 
Vsp 41 config_max
Vsp 41 config_maxVsp 41 config_max
Vsp 41 config_max
Venkata Ramana
 
images_of_windows_xp_for_system_deployment_using_windows_pe
images_of_windows_xp_for_system_deployment_using_windows_peimages_of_windows_xp_for_system_deployment_using_windows_pe
images_of_windows_xp_for_system_deployment_using_windows_pe
iartem
 
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...
Benjamin Delpy
 
Vmware admin interview questions
Vmware admin interview questionsVmware admin interview questions
Vmware admin interview questions
Ritesh Rushiya
 
How to configure esx to pass an audit
How to configure esx to pass an auditHow to configure esx to pass an audit
How to configure esx to pass an audit
Concentrated Technology
 
VMware Interview questions and answers
VMware Interview questions and answersVMware Interview questions and answers
VMware Interview questions and answers
vivaankumar
 
Virtualization securityv2
Virtualization securityv2Virtualization securityv2
Virtualization securityv2
vivekbhat
 
VMware App Volumes Troubleshooting
VMware App Volumes TroubleshootingVMware App Volumes Troubleshooting
VMware App Volumes Troubleshooting
Denis Gundarev
 
Prepare and Manage Remote Applications through Virtualization
Prepare and Manage Remote Applications through Virtualization      Prepare and Manage Remote Applications through Virtualization
Prepare and Manage Remote Applications through Virtualization
Rubal Sagwal
 
WHITE PAPER: Threats to Virtual Environments - Symantec Security Response Team
WHITE PAPER: Threats to Virtual Environments - Symantec Security Response TeamWHITE PAPER: Threats to Virtual Environments - Symantec Security Response Team
WHITE PAPER: Threats to Virtual Environments - Symantec Security Response Team
Symantec
 
Virtualization using VMWare Workstation
Virtualization using VMWare WorkstationVirtualization using VMWare Workstation
Virtualization using VMWare Workstation
Hitesh Gupta
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
EMC
 
Security Best Practices For Hyper V And Server Virtualization
Security Best Practices For Hyper V And Server VirtualizationSecurity Best Practices For Hyper V And Server Virtualization
Security Best Practices For Hyper V And Server Virtualization
rsnarayanan
 
Ws80 using VMware
Ws80 using VMwareWs80 using VMware
Ws80 using VMware
Umesh Gupta
 
How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment....
How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment....How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment....
How to hack Citrix (So, You Just Inherited Someone Else's Citrix Environment....
Denis Gundarev
 
SYN507: Reducing desktop infrastructure management overhead using “old school...
SYN507: Reducing desktop infrastructure management overhead using “old school...SYN507: Reducing desktop infrastructure management overhead using “old school...
SYN507: Reducing desktop infrastructure management overhead using “old school...
Denis Gundarev
 
images_of_windows_xp_for_system_deployment_using_windows_pe
images_of_windows_xp_for_system_deployment_using_windows_peimages_of_windows_xp_for_system_deployment_using_windows_pe
images_of_windows_xp_for_system_deployment_using_windows_pe
iartem
 
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...
Benjamin Delpy
 
Vmware admin interview questions
Vmware admin interview questionsVmware admin interview questions
Vmware admin interview questions
Ritesh Rushiya
 

Viewers also liked (15)

Unit 4 pp3
Unit 4 pp3Unit 4 pp3
Unit 4 pp3
brian farley
 
Bilangan kompleks
Bilangan kompleksBilangan kompleks
Bilangan kompleks
wayan anugrah
 
Per una societat conscienciada, reflexiva i compromesa
Per una societat conscienciada, reflexiva i compromesaPer una societat conscienciada, reflexiva i compromesa
Per una societat conscienciada, reflexiva i compromesa
Sergio Cebolla Mínguez
 
It all had to start somewhere!
It all had to start somewhere!It all had to start somewhere!
It all had to start somewhere!
Kenneth Mann
 
Unit 3 pp2
Unit 3 pp2Unit 3 pp2
Unit 3 pp2
brian farley
 
Made in india sunpreet kaur placemats
Made in india  sunpreet kaur placematsMade in india  sunpreet kaur placemats
Made in india sunpreet kaur placemats
Sunpreet Kaur
 
Red Teaming Your Bug-out Bag - Hack3rCon^4
Red Teaming Your Bug-out Bag - Hack3rCon^4Red Teaming Your Bug-out Bag - Hack3rCon^4
Red Teaming Your Bug-out Bag - Hack3rCon^4
Tom Moore
 
Made in india sunpreet kaur cushions
Made in india   sunpreet kaur cushionsMade in india   sunpreet kaur cushions
Made in india sunpreet kaur cushions
Sunpreet Kaur
 
Week1
Week1Week1
Week1
wayan anugrah
 
Unit three pp 3
Unit three pp 3Unit three pp 3
Unit three pp 3
brian farley
 
Obligaciones del despacho y rutas fiscales autorizadas para efectuar el tráns...
Obligaciones del despacho y rutas fiscales autorizadas para efectuar el tráns...Obligaciones del despacho y rutas fiscales autorizadas para efectuar el tráns...
Obligaciones del despacho y rutas fiscales autorizadas para efectuar el tráns...
Fiorella Chuquipul Palomino
 
C новым годом!
C новым годом!C новым годом!
C новым годом!
Inspired presentation
 
Титульный слайд в презентации
Титульный слайд в презентацииТитульный слайд в презентации
Титульный слайд в презентации
Inspired presentation
 
Тренинг "Эффективная презентация"
Тренинг "Эффективная презентация"Тренинг "Эффективная презентация"
Тренинг "Эффективная презентация"
Inspired presentation
 
Per una societat conscienciada, reflexiva i compromesa
Per una societat conscienciada, reflexiva i compromesaPer una societat conscienciada, reflexiva i compromesa
Per una societat conscienciada, reflexiva i compromesa
Sergio Cebolla Mínguez
 
It all had to start somewhere!
It all had to start somewhere!It all had to start somewhere!
It all had to start somewhere!
Kenneth Mann
 
Made in india sunpreet kaur placemats
Made in india  sunpreet kaur placematsMade in india  sunpreet kaur placemats
Made in india sunpreet kaur placemats
Sunpreet Kaur
 
Red Teaming Your Bug-out Bag - Hack3rCon^4
Red Teaming Your Bug-out Bag - Hack3rCon^4Red Teaming Your Bug-out Bag - Hack3rCon^4
Red Teaming Your Bug-out Bag - Hack3rCon^4
Tom Moore
 
Made in india sunpreet kaur cushions
Made in india   sunpreet kaur cushionsMade in india   sunpreet kaur cushions
Made in india sunpreet kaur cushions
Sunpreet Kaur
 
Obligaciones del despacho y rutas fiscales autorizadas para efectuar el tráns...
Obligaciones del despacho y rutas fiscales autorizadas para efectuar el tráns...Obligaciones del despacho y rutas fiscales autorizadas para efectuar el tráns...
Obligaciones del despacho y rutas fiscales autorizadas para efectuar el tráns...
Fiorella Chuquipul Palomino
 
Титульный слайд в презентации
Титульный слайд в презентацииТитульный слайд в презентации
Титульный слайд в презентации
Inspired presentation
 
Тренинг "Эффективная презентация"
Тренинг "Эффективная презентация"Тренинг "Эффективная презентация"
Тренинг "Эффективная презентация"
Inspired presentation
 

Similar to Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment (20)

Virtually Secure: Uncovering the risks of virtualization
Virtually Secure: Uncovering the risks of virtualizationVirtually Secure: Uncovering the risks of virtualization
Virtually Secure: Uncovering the risks of virtualization
Seccuris Inc.
 
VMware Technical Overview (2012)
VMware Technical Overview (2012)VMware Technical Overview (2012)
VMware Technical Overview (2012)
Steven Aiello
 
Virtualization, A Concept Implementation of Cloud
Virtualization, A Concept Implementation of CloudVirtualization, A Concept Implementation of Cloud
Virtualization, A Concept Implementation of Cloud
Nishant Munjal
 
VMware
VMware VMware
VMware
Ghufran Hasan
 
Vtguru v mware-v-sphere-administration-training
Vtguru v mware-v-sphere-administration-trainingVtguru v mware-v-sphere-administration-training
Vtguru v mware-v-sphere-administration-training
fosilalive2
 
Vmware seminar_report
Vmware seminar_reportVmware seminar_report
Vmware seminar_report
Ashwani Kumar
 
Virtualization_TechTalk
Virtualization_TechTalkVirtualization_TechTalk
Virtualization_TechTalk
Arif k
 
Overview of System Virtualization
Overview of System VirtualizationOverview of System Virtualization
Overview of System Virtualization
Andre Odendaal
 
Virtualization is the simulation of the software
Virtualization is the simulation of the softwareVirtualization is the simulation of the software
Virtualization is the simulation of the software
ellec281
 
VMware DCV_ICM_Architectural Differences, Virtual Machines, Guest OS Install
VMware DCV_ICM_Architectural Differences, Virtual Machines, Guest OS InstallVMware DCV_ICM_Architectural Differences, Virtual Machines, Guest OS Install
VMware DCV_ICM_Architectural Differences, Virtual Machines, Guest OS Install
GnanaKumarBitra1
 
virtualization-220403085202.pdf
virtualization-220403085202.pdfvirtualization-220403085202.pdf
virtualization-220403085202.pdf
SamiUllahSaqib3
 
Virtualization.ppt
Virtualization.pptVirtualization.ppt
Virtualization.ppt
vishal choudhary
 
virtualization PPT for introduction and explaination
virtualization PPT for introduction and explainationvirtualization PPT for introduction and explaination
virtualization PPT for introduction and explaination
chenna313
 
virtualization PPT for introduction and explaination
virtualization PPT for introduction and explainationvirtualization PPT for introduction and explaination
virtualization PPT for introduction and explaination
chenna313
 
virtualization work presentation ppt.ppt
virtualization work presentation ppt.pptvirtualization work presentation ppt.ppt
virtualization work presentation ppt.ppt
ishafarikarbel
 
virtualization-prosthodontics crown Bridge implantolgy
virtualization-prosthodontics crown Bridge implantolgyvirtualization-prosthodontics crown Bridge implantolgy
virtualization-prosthodontics crown Bridge implantolgy
rutujadahiphale5
 
Module6_Virtualisation wqjkhjkdq qkdnqknjdk
Module6_Virtualisation wqjkhjkdq qkdnqknjdkModule6_Virtualisation wqjkhjkdq qkdnqknjdk
Module6_Virtualisation wqjkhjkdq qkdnqknjdk
gauravsingh12217
 
Virtualization
VirtualizationVirtualization
Virtualization
gunipati81
 
Virtual technology
Virtual technologyVirtual technology
Virtual technology
Student
 
Usenix Invited Talk
Usenix Invited TalkUsenix Invited Talk
Usenix Invited Talk
webhostingguy
 
Virtually Secure: Uncovering the risks of virtualization
Virtually Secure: Uncovering the risks of virtualizationVirtually Secure: Uncovering the risks of virtualization
Virtually Secure: Uncovering the risks of virtualization
Seccuris Inc.
 
VMware Technical Overview (2012)
VMware Technical Overview (2012)VMware Technical Overview (2012)
VMware Technical Overview (2012)
Steven Aiello
 
Virtualization, A Concept Implementation of Cloud
Virtualization, A Concept Implementation of CloudVirtualization, A Concept Implementation of Cloud
Virtualization, A Concept Implementation of Cloud
Nishant Munjal
 
Vtguru v mware-v-sphere-administration-training
Vtguru v mware-v-sphere-administration-trainingVtguru v mware-v-sphere-administration-training
Vtguru v mware-v-sphere-administration-training
fosilalive2
 
Vmware seminar_report
Vmware seminar_reportVmware seminar_report
Vmware seminar_report
Ashwani Kumar
 
Virtualization_TechTalk
Virtualization_TechTalkVirtualization_TechTalk
Virtualization_TechTalk
Arif k
 
Overview of System Virtualization
Overview of System VirtualizationOverview of System Virtualization
Overview of System Virtualization
Andre Odendaal
 
Virtualization is the simulation of the software
Virtualization is the simulation of the softwareVirtualization is the simulation of the software
Virtualization is the simulation of the software
ellec281
 
VMware DCV_ICM_Architectural Differences, Virtual Machines, Guest OS Install
VMware DCV_ICM_Architectural Differences, Virtual Machines, Guest OS InstallVMware DCV_ICM_Architectural Differences, Virtual Machines, Guest OS Install
VMware DCV_ICM_Architectural Differences, Virtual Machines, Guest OS Install
GnanaKumarBitra1
 
virtualization-220403085202.pdf
virtualization-220403085202.pdfvirtualization-220403085202.pdf
virtualization-220403085202.pdf
SamiUllahSaqib3
 
virtualization PPT for introduction and explaination
virtualization PPT for introduction and explainationvirtualization PPT for introduction and explaination
virtualization PPT for introduction and explaination
chenna313
 
virtualization PPT for introduction and explaination
virtualization PPT for introduction and explainationvirtualization PPT for introduction and explaination
virtualization PPT for introduction and explaination
chenna313
 
virtualization work presentation ppt.ppt
virtualization work presentation ppt.pptvirtualization work presentation ppt.ppt
virtualization work presentation ppt.ppt
ishafarikarbel
 
virtualization-prosthodontics crown Bridge implantolgy
virtualization-prosthodontics crown Bridge implantolgyvirtualization-prosthodontics crown Bridge implantolgy
virtualization-prosthodontics crown Bridge implantolgy
rutujadahiphale5
 
Module6_Virtualisation wqjkhjkdq qkdnqknjdk
Module6_Virtualisation wqjkhjkdq qkdnqknjdkModule6_Virtualisation wqjkhjkdq qkdnqknjdk
Module6_Virtualisation wqjkhjkdq qkdnqknjdk
gauravsingh12217
 
Virtualization
VirtualizationVirtualization
Virtualization
gunipati81
 
Virtual technology
Virtual technologyVirtual technology
Virtual technology
Student
 

Recently uploaded (20)

SDG 9000 Series: Unleashing multigigabit everywhere
SDG 9000 Series: Unleashing multigigabit everywhereSDG 9000 Series: Unleashing multigigabit everywhere
SDG 9000 Series: Unleashing multigigabit everywhere
Adtran
 
ELNL2025 - Unlocking the Power of Sensitivity Labels - A Comprehensive Guide....
ELNL2025 - Unlocking the Power of Sensitivity Labels - A Comprehensive Guide....ELNL2025 - Unlocking the Power of Sensitivity Labels - A Comprehensive Guide....
ELNL2025 - Unlocking the Power of Sensitivity Labels - A Comprehensive Guide....
Jasper Oosterveld
 
UiPath Community Zurich: Release Management and Build Pipelines
UiPath Community Zurich: Release Management and Build PipelinesUiPath Community Zurich: Release Management and Build Pipelines
UiPath Community Zurich: Release Management and Build Pipelines
UiPathCommunity
 
Kubernetes Cloud Native Indonesia Meetup - May 2025
Kubernetes Cloud Native Indonesia Meetup - May 2025Kubernetes Cloud Native Indonesia Meetup - May 2025
Kubernetes Cloud Native Indonesia Meetup - May 2025
Prasta Maha
 
LSNIF: Locally-Subdivided Neural Intersection Function
LSNIF: Locally-Subdivided Neural Intersection FunctionLSNIF: Locally-Subdivided Neural Intersection Function
LSNIF: Locally-Subdivided Neural Intersection Function
Takahiro Harada
 
Data Virtualization: Bringing the Power of FME to Any Application
Data Virtualization: Bringing the Power of FME to Any ApplicationData Virtualization: Bringing the Power of FME to Any Application
Data Virtualization: Bringing the Power of FME to Any Application
Safe Software
 
AI Emotional Actors: “When Machines Learn to Feel and Perform"
AI Emotional Actors:  “When Machines Learn to Feel and Perform"AI Emotional Actors:  “When Machines Learn to Feel and Perform"
AI Emotional Actors: “When Machines Learn to Feel and Perform"
AkashKumar809858
 
Multistream in SIP and NoSIP @ OpenSIPS Summit 2025
Multistream in SIP and NoSIP @ OpenSIPS Summit 2025Multistream in SIP and NoSIP @ OpenSIPS Summit 2025
Multistream in SIP and NoSIP @ OpenSIPS Summit 2025
Lorenzo Miniero
 
Co-Constructing Explanations for AI Systems using Provenance
Co-Constructing Explanations for AI Systems using ProvenanceCo-Constructing Explanations for AI Systems using Provenance
Co-Constructing Explanations for AI Systems using Provenance
Paul Groth
 
Let’s Get Slack Certified! 🚀- Slack Community
Let’s Get Slack Certified! 🚀- Slack CommunityLet’s Get Slack Certified! 🚀- Slack Community
Let’s Get Slack Certified! 🚀- Slack Community
SanjeetMishra29
 
6th Power Grid Model Meetup - 21 May 2025
6th Power Grid Model Meetup - 21 May 20256th Power Grid Model Meetup - 21 May 2025
6th Power Grid Model Meetup - 21 May 2025
DanBrown980551
 
New Ways to Reduce Database Costs with ScyllaDB
New Ways to Reduce Database Costs with ScyllaDBNew Ways to Reduce Database Costs with ScyllaDB
New Ways to Reduce Database Costs with ScyllaDB
ScyllaDB
 
Offshore IT Support: Balancing In-House and Offshore Help Desk Technicians
Offshore IT Support: Balancing In-House and Offshore Help Desk TechniciansOffshore IT Support: Balancing In-House and Offshore Help Desk Technicians
Offshore IT Support: Balancing In-House and Offshore Help Desk Technicians
john823664
 
Maxx nft market place new generation nft marketing place
Maxx nft market place new generation nft marketing placeMaxx nft market place new generation nft marketing place
Maxx nft market place new generation nft marketing place
usersalmanrazdelhi
 
Improving Developer Productivity With DORA, SPACE, and DevEx
Improving Developer Productivity With DORA, SPACE, and DevExImproving Developer Productivity With DORA, SPACE, and DevEx
Improving Developer Productivity With DORA, SPACE, and DevEx
Justin Reock
 
End-to-end Assurance for SD-WAN & SASE with ThousandEyes
End-to-end Assurance for SD-WAN & SASE with ThousandEyesEnd-to-end Assurance for SD-WAN & SASE with ThousandEyes
End-to-end Assurance for SD-WAN & SASE with ThousandEyes
ThousandEyes
 
Dr Jimmy Schwarzkopf presentation on the SUMMIT 2025 A
Dr Jimmy Schwarzkopf presentation on the SUMMIT 2025 ADr Jimmy Schwarzkopf presentation on the SUMMIT 2025 A
Dr Jimmy Schwarzkopf presentation on the SUMMIT 2025 A
Dr. Jimmy Schwarzkopf
 
Droidal: AI Agents Revolutionizing Healthcare
Droidal: AI Agents Revolutionizing HealthcareDroidal: AI Agents Revolutionizing Healthcare
Droidal: AI Agents Revolutionizing Healthcare
Droidal LLC
 
Contributing to WordPress With & Without Code.pptx
Contributing to WordPress With & Without Code.pptxContributing to WordPress With & Without Code.pptx
Contributing to WordPress With & Without Code.pptx
Patrick Lumumba
 
Agentic AI Explained: The Next Frontier of Autonomous Intelligence & Generati...
Agentic AI Explained: The Next Frontier of Autonomous Intelligence & Generati...Agentic AI Explained: The Next Frontier of Autonomous Intelligence & Generati...
Agentic AI Explained: The Next Frontier of Autonomous Intelligence & Generati...
Aaryan Kansari
 
SDG 9000 Series: Unleashing multigigabit everywhere
SDG 9000 Series: Unleashing multigigabit everywhereSDG 9000 Series: Unleashing multigigabit everywhere
SDG 9000 Series: Unleashing multigigabit everywhere
Adtran
 
ELNL2025 - Unlocking the Power of Sensitivity Labels - A Comprehensive Guide....
ELNL2025 - Unlocking the Power of Sensitivity Labels - A Comprehensive Guide....ELNL2025 - Unlocking the Power of Sensitivity Labels - A Comprehensive Guide....
ELNL2025 - Unlocking the Power of Sensitivity Labels - A Comprehensive Guide....
Jasper Oosterveld
 
UiPath Community Zurich: Release Management and Build Pipelines
UiPath Community Zurich: Release Management and Build PipelinesUiPath Community Zurich: Release Management and Build Pipelines
UiPath Community Zurich: Release Management and Build Pipelines
UiPathCommunity
 
Kubernetes Cloud Native Indonesia Meetup - May 2025
Kubernetes Cloud Native Indonesia Meetup - May 2025Kubernetes Cloud Native Indonesia Meetup - May 2025
Kubernetes Cloud Native Indonesia Meetup - May 2025
Prasta Maha
 
LSNIF: Locally-Subdivided Neural Intersection Function
LSNIF: Locally-Subdivided Neural Intersection FunctionLSNIF: Locally-Subdivided Neural Intersection Function
LSNIF: Locally-Subdivided Neural Intersection Function
Takahiro Harada
 
Data Virtualization: Bringing the Power of FME to Any Application
Data Virtualization: Bringing the Power of FME to Any ApplicationData Virtualization: Bringing the Power of FME to Any Application
Data Virtualization: Bringing the Power of FME to Any Application
Safe Software
 
AI Emotional Actors: “When Machines Learn to Feel and Perform"
AI Emotional Actors:  “When Machines Learn to Feel and Perform"AI Emotional Actors:  “When Machines Learn to Feel and Perform"
AI Emotional Actors: “When Machines Learn to Feel and Perform"
AkashKumar809858
 
Multistream in SIP and NoSIP @ OpenSIPS Summit 2025
Multistream in SIP and NoSIP @ OpenSIPS Summit 2025Multistream in SIP and NoSIP @ OpenSIPS Summit 2025
Multistream in SIP and NoSIP @ OpenSIPS Summit 2025
Lorenzo Miniero
 
Co-Constructing Explanations for AI Systems using Provenance
Co-Constructing Explanations for AI Systems using ProvenanceCo-Constructing Explanations for AI Systems using Provenance
Co-Constructing Explanations for AI Systems using Provenance
Paul Groth
 
Let’s Get Slack Certified! 🚀- Slack Community
Let’s Get Slack Certified! 🚀- Slack CommunityLet’s Get Slack Certified! 🚀- Slack Community
Let’s Get Slack Certified! 🚀- Slack Community
SanjeetMishra29
 
6th Power Grid Model Meetup - 21 May 2025
6th Power Grid Model Meetup - 21 May 20256th Power Grid Model Meetup - 21 May 2025
6th Power Grid Model Meetup - 21 May 2025
DanBrown980551
 
New Ways to Reduce Database Costs with ScyllaDB
New Ways to Reduce Database Costs with ScyllaDBNew Ways to Reduce Database Costs with ScyllaDB
New Ways to Reduce Database Costs with ScyllaDB
ScyllaDB
 
Offshore IT Support: Balancing In-House and Offshore Help Desk Technicians
Offshore IT Support: Balancing In-House and Offshore Help Desk TechniciansOffshore IT Support: Balancing In-House and Offshore Help Desk Technicians
Offshore IT Support: Balancing In-House and Offshore Help Desk Technicians
john823664
 
Maxx nft market place new generation nft marketing place
Maxx nft market place new generation nft marketing placeMaxx nft market place new generation nft marketing place
Maxx nft market place new generation nft marketing place
usersalmanrazdelhi
 
Improving Developer Productivity With DORA, SPACE, and DevEx
Improving Developer Productivity With DORA, SPACE, and DevExImproving Developer Productivity With DORA, SPACE, and DevEx
Improving Developer Productivity With DORA, SPACE, and DevEx
Justin Reock
 
End-to-end Assurance for SD-WAN & SASE with ThousandEyes
End-to-end Assurance for SD-WAN & SASE with ThousandEyesEnd-to-end Assurance for SD-WAN & SASE with ThousandEyes
End-to-end Assurance for SD-WAN & SASE with ThousandEyes
ThousandEyes
 
Dr Jimmy Schwarzkopf presentation on the SUMMIT 2025 A
Dr Jimmy Schwarzkopf presentation on the SUMMIT 2025 ADr Jimmy Schwarzkopf presentation on the SUMMIT 2025 A
Dr Jimmy Schwarzkopf presentation on the SUMMIT 2025 A
Dr. Jimmy Schwarzkopf
 
Droidal: AI Agents Revolutionizing Healthcare
Droidal: AI Agents Revolutionizing HealthcareDroidal: AI Agents Revolutionizing Healthcare
Droidal: AI Agents Revolutionizing Healthcare
Droidal LLC
 
Contributing to WordPress With & Without Code.pptx
Contributing to WordPress With & Without Code.pptxContributing to WordPress With & Without Code.pptx
Contributing to WordPress With & Without Code.pptx
Patrick Lumumba
 
Agentic AI Explained: The Next Frontier of Autonomous Intelligence & Generati...
Agentic AI Explained: The Next Frontier of Autonomous Intelligence & Generati...Agentic AI Explained: The Next Frontier of Autonomous Intelligence & Generati...
Agentic AI Explained: The Next Frontier of Autonomous Intelligence & Generati...
Aaryan Kansari
 

Step On In, The Water's Fine! - An Introduction To Security Testing Within A Virtualized Environment

  • 1. Step On In, The Water’s Fine! An Introduction To Security Testing Within A Virtualized Environment
  • 3. Thank You! …to all of the crew that has a part in this amazing conference!
  • 4. About Me: • Tom Moore – Twitter: @c0ncealed • Christian, Husband, & Father • Red Team / Penetration Tester • High Hack Society / Proverbs Hackers / 304Geek • Unrelenting G33K • 2nd Amendment Supporter • Should in NO WAY be considered an expert in anything that I may say. =) • SUPPORT HACKERS FOR CHARITY!
  • 5. Agenda: My goal is to provide meaningful information in the area of virtualized testing environment options. I also wish to convey why an understanding of this subject is vastly needed and for the most part easily attainable, even though the subject is often avoided or overlooked.
  • 10. Role Playing: You are applying for a role within an organization’s Information Security Group... One of the questions that a reputable organization ‘should’ ask you would be: “What you are doing to either maintain, or increase your relevant skill-set?” What is your response?
  • 11. What Is Needed: Candidates for employment that not only have a degree or relevant certifications, but also possess a true working knowledge of how to leverage their toolsets to achieve the expected goal.
  • 12. What Can Be Done: Security Professionals in training need to take a more direct approach towards ensuring that they understand not only the tools introduced to them, but also the underlying architectures that they operate on. A more informed candidate is what is being sought after in today’s Information Security job market.
  • 13. How This Can Be Accomplished:
  • 14. What Is Needed: Candidates for employment that not only have a degree or relevant certifications, but also possess a true working knowledge of how to leverage their toolsets to achieve the expected goal. Credit: CSOOnline.com - http://www.csoonline.com/article/2146363/security-leadership/self-taught-hackers-rule.html
  • 15. What Is Needed: Candidates for employment that not only have a degree or relevant certifications, but also possess a true working knowledge of how to leverage their toolsets to achieve the expected goal. Credit: CSOOnline.com - http://www.csoonline.com/article/2146363/security-leadership/self-taught-hackers-rule.html
  • 16. What Is Needed: Candidates for employment that not only have a degree or relevant certifications, but also possess a true working knowledge of how to leverage their toolsets to achieve the expected goal. Credit: CSOOnline.com - http://www.csoonline.com/article/2146363/security-leadership/self-taught-hackers-rule.html
  • 17. How You Can Get There: Practice… Practice… Practice… Where You Can Practice:
  • 18. How You Can Get There: Practice… Practice… Practice… Where You Can Practice:
  • 19. How You Can Get There: Practice… Practice… Practice… Where You Can Practice: Set up your own virtual lab! • The cost is well worth the gain • There are many open-source solutions • Many toolset distributions now use virtual machines as primary medium • A wide variety of vulnerable environments are also available for your learning pleasure
  • 20. Need Another Reason?: More and more, the physical environments are going away!
  • 21. Definition of Terms: Hypervisor: A hypervisor is a virtual machine monitor (VMM). It is generally a piece of computer software, firmware, or hardware that creates and runs virtual machines. A computer on which a hypervisor is running is defined as a host machine. The virtual machines that run on this host are referred to as guest machines.
  • 22. Definition of Terms: Virtual Machine: A virtual machine (VM) is a software based emulation of a computer. Virtual machines generally operate based on the architecture and functions of a real computer.
  • 23. Definition of Terms: Snapshot: A snapshot preserves the state and data of a virtual machine at a specific point in time. The state includes the VM’s power state. (ex: powered-on, powered-off, or suspended) The data includes all of the files that make up the VM. This includes disks, memory, and other devices, such as virtual network interface cards.
  • 24. Definition of Terms: Snapshot: A snapshot preserves the state and data of a virtual machine at a specific point in time. The state includes the VM’s power state. (ex: powered-on, powered-off, or suspended) The data includes all of the files that make up the VM. This includes disks, memory, and other devices, such as virtual network interface cards.
  • 25. Definition of Terms: Snapshot: A snapshot preserves the state and data of a virtual machine at a specific point in time. The state includes the VM’s power state. (ex: powered-on, powered-off, or suspended) The data includes all of the files that make up the VM. This includes disks, memory, and other devices, such as virtual network interface cards.
  • 26. Definition of Terms: Bridged / NAT / Host Only : The options available to configure virtual network adapters within VM’s. Bridged: Binds the virtual network adapter directly to your physical ethernet adapter. The VM will obtain DHCP lease from the physical network. NAT: Binds the virtual network adapter behind a NAT environment. Obtains internal DHCP address and shares the physical ethernet adapter’s public IP address for external communication. Host Only: Allows internal network communication only. DHCP lease obtained behind internal NAT.
  • 27. Let’s Get Technical: Enough with the hypothetical, let’s get into the bits… cause this bytes… =P Structure for the approach: • Hardware considerations • Virtualization platform options • Example set-up of Vmware ESXi • Offensive or Forensic Distributions • Ex: Kali, SamuraiWTF, SIFT, etc. • Virtual Appliances • Vulnerable Distributions • Ex: Metasploitable 2 or NOWASP
  • 28. Hardware Considerations: • While the CPU speeds do matter, they will not be your primary concern. • A quad-core CPU is recommended. • What you will need plenty of are: • Memory (RAM) • Hypervisors are memory hogs. • Hard Drive Capacity (HDD) • VM’s range drastically in size, especially when Snapshotted. • A sufficient Power Supply will need to be accounted for based on the above specifications.
  • 29. Virtualization Platforms: • VMware Fusion (Mac) • VMware Player/Workstation (Win/Linux) • VMware ESXi/ESX (Server) • Parallels (Mac) • Oracle VirtualBox (Mac/Win/Linux) • ProxMox (Server, running OpenVZ as guest) • XenServer (Server, running OpenVZ as guest) This list should not be considered all-inclusive. These are simply platforms that I have tested and that are for the most part easily attainable.
  • 30. VMware ESXi Setup: • For our example, I have set up a VMware ESXi Hypervisor on this MacBook Pro system. • System Specs: • CPU: Quad-core Intel i7 2GHz • RAM: 16GB 1333MHz DDR3 • HDD: WD Black 500GB 7200 RPM • VMware ESXi is free for educational purposes. Register on vmware.com for a license key.
  • 31. VMware ESXi Setup: • Further Information… • This installation is performed by using the following configuration: •VMware ESXi .iso image is on host MacBook Pro. •Created a New virtual machine within VMware Fusion. •Set the ESXi .iso as the boot media for the VM. • (This is being done this way for demonstration purposes. If you have physical hardware for ESXi, use that)
  • 53. VMware ESXi Management: • The one disadvantage to using VMware ESXi, in my opinion, is that the most effective management interface is in the form of a Windows fat client. • Due to this, we will also go through the process of setting up a Windows 8 VM with the VMware vSphere Client as well as the VMware vCenter Converter Standalone application. • This will be our ESXi management VM.
  • 54. VMware ESXi Management: • Further Information… • This installation is performed by using the following configuration: •Windows 8.1 .iso image is on host MacBook Pro. •Created a New virtual machine within VMware Fusion. •Set the Windows 8.1 .iso as the boot media for the VM. • (This is done so that we don’t have to have a physical Windows box for ESXi Management.)
  • 90. VMware ESXi Management: • Now we will register VMware ESXi Server through the vSphere Client. • The key should have been obtained when you registered for your vmware.com account and downloaded your ESXi iso files and binaries. • When its registered, you will see the status message in the bottom right-hand corner of the client disappear.
  • 98. VMware ESXi Management: • Now we will setup VMware vCenter Converter Standalone. • This will be used to convert VMware images into an ESXi format. • It will also transfer VM’s over to our ESXi Server after conversion.
  • 114. Offensive / Forensic D• isKtarlii bLuintuiox ns: • Arch Assault • Pentoo • SamuraiWTF • MobiSec • Backbox Linux • Blackbuntu • BlackArch Linux • REMnux • SIFT Workstation • DEFT Linux • CAINE
  • 116. Offensive / Forensic D• isStcrriebeunstihoontss! :
  • 117. Virtual Appliances: • Routers / Switches • Vyatta • Firewalls • pfSense • Intrusion Prevention Systems • Intrusion Detection Systems • SecurityOnion • Security Incident and Event Monitoring • AlienVault OSSIM
  • 120. Vulnerable Distributions: • Metasploitable 2 • NOWASP Mutillidae • OWASP Broken Web Apps • Web Security DoJo • HADES • VulnVOiP • VulnVPN • Dexter • Brainpan • Relativity
  • 121. Vulnerable Distributions: • VulnHub www.vulnhub.com • Credit: g0tm1lk
  • 123. Vulnerable Distributions: • Leveraging VulnHub.com, we will pull down a copy of Metasploitable2 as our vulnerable guest distribution. • Now we will use VMware vCenter Converter Standalone to convert our new vulnerable image and then push it to our ESXi server.
  • 145. Vulnerable Distributions: • Now let’s spin it up! • Once we have the Metasploitable 2 VM powered on, we will go back to our Kali VM within VMware Fusion. • From the Kali offensive VM, let’s scan the virtual DHCP range looking for our new vulnerable guest machine!
  • 150. Congratulations!: • You have just gone through the process of setting up a virtual testing lab with a VMware ESXi hypervisor! • You have a Windows VM set up to manage your hypervisor. • You know where to obtain your Offensive, Appliance, and Vulnerable distributions and VMs. • You also know how to convert and transfer them to your ESXi server! • You then saw how easy it was to enumerate guests from your Kali VM!
  • 151. Summary: • InfoSec Recruiters for organizations are looking for candidates that KNOW how to leverage the needed tools to perform an assessment. • You can teach yourself skills that may not be covered in most curriculums through the use of Virtual Environments. • It takes time, it’s not easy, but it will pay off. • YOU CAN DO IT!
  • 152. Summary: • InfoSec Recruiters for organizations are looking for candidates that KNOW how to leverage the needed tools to perform an assessment. • You can teach yourself skills that may not be covered in most curriculums through the use of Virtual Environments. • It takes time, it’s not easy, but it will pay off. • YOU CAN DO IT!
  • 153. Resources: • Virtualization Platforms • VMware ESXi Download - https://my.vmware.com/web/vmware/info/slug/datacenter_clo ud_infrastructure/vmware_vsphere_hypervisor_esxi/5_5 • VMware Free vSphere Registration - https://my.vmware.com/web/vmware/evalcenter?p=free-esxi5& lp=default • VMware Player - https://my.vmware.com/web/vmware/free#desktop_end_user _computing/vmware_player/4_0 • VMware Fusion - http://www.vmware.com/products/fusion • VMware Workstation - https://my.vmware.com/web/vmware/info/slug/desktop_end_u ser_computing/vmware_workstation/10_0 • Parallels - http://www.parallels.com/landingpage/pd/general/ • Oracle VirtualBox - https://www.virtualbox.org/wiki/Downloads • ProxMox VE - http://www.proxmox.com/downloads/ • Citrix XenServer - http://www.citrix.com/products/xenserver/try.html
  • 154. Resources: • Offensive Distributions • Kali Linux - http://www.kali.org/downloads/ • Arch Assault - https://archassault.org/download/ • Pentoo - http://www.pentoo.ch/download/ • SamuraiWTF - http://sourceforge.net/projects/samurai/ • MobiSec - http://sourceforge.net/projects/mobisec/files/ • Backbox Linux - http://www.backbox.org/downloads • Blackbuntu - http://sourceforge.net/projects/blackbuntu/ • Blackarch Linux - http://blackarch.org/download.html • REMnux - http://sourceforge.net/projects/remnux/ • SIFT Workstation - http://digital-forensics. sans.org/community/downloads • Deft Linux - http://www.deftlinux.net/download/ • CAINE - http://www.caine-live.net/page5/page5.html
  • 155. Resources: • Virtual Appliances • VMware VA Marketplace - https://solutionexchange.vmware.com/store/category_groups/ 19 • Turnkey Linux - http://www.turnkeylinux.org/it-infrastructure • ShareVM - http://sharevm.wordpress.com/2009/09/25/top-ten- vmware-virtual-appliances-for-security/ • Vyatta - http://www.brocade.com/forms/jsp/vyatta-download/ index.jsp • pfSense - https://www.pfsense.org/download/ • Security Onion - http://sourceforge.net/projects/security-onion/ • AlienVault OSSIM - http://www.alienvault.com/open-threat-exchange/ projects
  • 156. Resources: • Vulnerable Distributions • VulnHub- http://www.vulnhub.com (Many worth mentioning, but this site will get you there)
  • 157. One More Thing: • If you want to experience another amazing conference with the same feel as DerbyCon, go to Hack3rCon! • When: November 14-16, 2014 • Where: Charleston, WV • Web: www.hack3rcon.org • Twitter: @hack3rcon
  • 159. Contact Info: • Name: Tom Moore • E-mail: [email protected] • Twitter: @c0ncealed • Slides: THANK YOU!

Editor's Notes

  • #14: In addition to book learning, hands-on experience with these toolsets should be the recipient of your invested time.
  • #18: Another reason why training yourself to test in virtual environments is so valuable, is that most companies are now
  • #19: Another reason why training yourself to test in virtual environments is so valuable, is that most companies are now
  • #20: Another reason why training yourself to test in virtual environments is so valuable, is that most companies are now
  • #21: Some might argue that familiarizing yourself within a virtual environment will be a more relevant method of training and will give you experience that employers are already looking for in their next-generation of security professionals.
  • #29: All of this is relative. I’ll be setting up an ESXi VM on my MBP It is running a Quad-core i7 2GHz CPU and has 16GB 1333 MHz DDR3 Ram Western Digital Black 500gb 7200 RPM HDD
  • #30: All of this is relative. I’ll be setting up an ESXi VM on my MBP It is running a Quad-core i7 2GHz CPU and has 16GB 1333 MHz DDR3 Ram Western Digital Black 500gb 7200 RPM HDD
  • #31: All of this is relative. I’ll be setting up an ESXi VM on my MBP It is running a Quad-core i7 2GHz CPU and has 16GB 1333 MHz DDR3 Ram Western Digital Black 500gb 7200 RPM HDD
  • #152: Rob Schneider
  • #153: Rob Schneider
  • #154: Rob Schneider
  • #155: Rob Schneider
  • #156: Rob Schneider
  • #157: Rob Schneider