Penetration test and system hardening

In order to know how to pentest vulnerable machines you have to also know how they are hardened. I hope this post will help you.

Below we’ve provided some of the best hardening guides for most Linux distributions you would encounter on a pentest below. See exactly how a system admin would strengthen a system to prevent you from breaking into it:

Amazon Linux Benchmark by CIS http://hackingloops.acemlnb.com/lt.php?s=80e34c322909301bf35ab9ff5f0c599b&i=176A196A6A26265

http://hackingloops.acemlnb.com/lt.php?s=80e34c322909301bf35ab9ff5f0c599b&i=176A196A6A26265

CentOS 7 Benchmark by CIS CentOS 6 Benchmark by CIS Debian 8 Benchmark by CIS http://hackingloops.acemlnb.com/lt.php?s=80e34c322909301bf35ab9ff5f0c599b&i=176A196A6A26265

Debian 7 Benchmark by CIS http://hackingloops.acemlnb.com/lt.php?s=80e34c322909301bf35ab9ff5f0c599b&i=176A196A6A26265

Fedora 19 Security Guide by Fedora http://hackingloops.acemlnb.com/lt.php?s=80e34c322909301bf35ab9ff5f0c599b&i=176A196A6A26266

Linux Security Checklist by SANS http://hackingloops.acemlnb.com/lt.php?s=80e34c322909301bf35ab9ff5f0c599b&i=176A196A6A26267

Oracle Linux 7 Benchmark by CIS http://hackingloops.acemlnb.com/lt.php?s=80e34c322909301bf35ab9ff5f0c599b&i=176A196A6A26265

Red Hat Enterprise Linux 7 Security Guide by RedHat http://hackingloops.acemlnb.com/lt.php?s=80e34c322909301bf35ab9ff5f0c599b&i=176A196A6A26268

Red Hat Enterprise Linux 7 Security Benchmark by CIS http://hackingloops.acemlnb.com/lt.php?s=80e34c322909301bf35ab9ff5f0c599b&i=176A196A6A26265

Red Hat Enterprise Linux 7 Installation Hardening Checklist by GIAC http://hackingloops.acemlnb.com/lt.php?s=80e34c322909301bf35ab9ff5f0c599b&i=176A196A6A26269

Red Hat Enterprise Linux 6 Security Guide by RedHat http://hackingloops.acemlnb.com/lt.php?s=80e34c322909301bf35ab9ff5f0c599b&i=176A196A6A26270

RedHat Enterprise Linux 6 Security Benchmark by CIS http://hackingloops.acemlnb.com/lt.php?s=80e34c322909301bf35ab9ff5f0c599b&i=176A196A6A26265

Red Hat Enterprise Linux 5 Security Benchmark by CIS http://hackingloops.acemlnb.com/lt.php?s=80e34c322909301bf35ab9ff5f0c599b&i=176A196A6A26265

Slackware 10 Security Benchmark by CIS http://hackingloops.acemlnb.com/lt.php?s=80e34c322909301bf35ab9ff5f0c599b&i=176A196A6A26265

SUSE Security and Hardening Guide http://hackingloops.acemlnb.com/lt.php?s=80e34c322909301bf35ab9ff5f0c599b&i=176A196A6A26271

SUSE Linux Enterprise Server 12 Security Benchmark by CIS SUSE Linux Enterprise Server 11 Security Benchmark by CIS Ubuntu 14.04 LTS Security Benchmark by CIS http://hackingloops.acemlnb.com/lt.php?s=80e34c322909301bf35ab9ff5f0c599b&i=176A196A6A26265

Ubuntu 12.04 LTS Security Benchmark by CIS http://hackingloops.acemlnb.com/lt.php?s=80e34c322909301bf35ab9ff5f0c599b&i=176A196A6A26265

MCSA Windows Server 2016 Study Guide

This is the study guide for Installation, Storage, and Compute with Windows Server 2016
Exam information and syllabus can be found here –> https://www.microsoft.com/en-us/learning/exam-70-740.aspx

Install Windows Servers in host and compute environments (10–15%)

Implement storage solutions (10–15%)

  • Configure disks and volumes
    • Configure sector sizes appropriate for various workloads, configure GUID partition table (GPT) disks, create VHD and VHDX files using Server Manager or Windows PowerShell Storage module cmdlets, mount virtual hard disks, determine when to use NTFS and ReFS file systems, configure NFS and SMB shares using Server Manager, configure SMB share and session settings using Windows PowerShell, configure SMB server and SMB client configuration settings using Windows PowerShell, configure file and folder permissions
  • Implement server storage

Implement Hyper-V (20–25%)

  • Configure Hyper-V storage
    • Create VHDs and VHDX files using Hyper-V Manager, create shared VHDX files, configure differencing disks, modify virtual hard disks, configure pass-through disks, resize a virtual hard disk, manage checkpoints, implement production checkpoints, implement a virtual Fibre Channel adapter, configure storage Quality of Service (QoS)

Implement Windows containers (5–10%)

Implement high availability (30–35%)

  • Implement Storage Spaces Direct
  • Manage failover clustering
  • Manage VM movement in clustered nodes
    • Perform a live migration; perform a quick migration; perform a storage migration; import, export, and copy VMs; configure VM network health protection; configure drain on shutdown
  • Implement Network Load Balancing (NLB)
    • Install NLB nodes, configure NLB prerequisites, configure affinity, configure port rules, configure cluster operation mode, upgrade an NLB cluster

Maintain and monitor server environments (10–15%)

  • Monitor server installations
    • Monitor workloads using Performance Monitor; configure Data Collector Sets; determine appropriate CPU, memory, disk, and networking counters for storage and compute workloads; configure alerts; monitor workloads using Resource Monitor
    • Configure Data Collector Sets: https://technet.microsoft.com/en-us/library/cc749337(v=ws.11).aspx

Don’t forget to visit https://mva.microsoft.com/ebooks to get your free ebook on Windows server 2016 technical preview.