Checklist: Building a Penetration
• Only through practice can someone improve his skills.
• Keep things as simple as possible—don’t unnecessarily complicate.
• Re-creating old exploits is great practice.
• A pen test lab must be completely isolated from any other network.
• Cabled and wireless pen test labs should be isolated from one another.
• Once you break into your wireless, move to your cabled.
• You could put in shielding to have your secure lab not leak wireless signals.
• You must secure the pen test lab from any and all unauthorized access.
• Some of the things a malicious user would like to know:
o IP addresses of machines
o Operating system versions
o Patch versions
o Configuration files
o Login files
o Start-up scripts
• Be paranoid.
• Change appliance labels or logos on systems to fool those who see your
• If someone borrows your software, have a checkout sheet for him or her to
• Detailed procedures must be enforced.
• Patches, etc. should come from secure channels, and MD5 checksum
should always be checked—and recorded for future reference.
• MD5 hashes should be run against the install disks regularly.
• The only safe way to transfer data is by using CDs or DVDs that have
• All CDs should be properly labeled.
• Keep your lab area off-limits to unauthorized personnel.
o Post warnings and lock.
• To improve your protection:
o Encrypt your hard drive.
o Lock hard drives in a safe (or the entire computer if it’s a laptop).
o Store systems in a secure room.