Penetration test and system hardening

In order to know how to pentest vulnerable machines you have to also know how they are hardened. I hope this post will help you.

Below we’ve provided some of the best hardening guides for most Linux distributions you would encounter on a pentest below. See exactly how a system admin would strengthen a system to prevent you from breaking into it:

Amazon Linux Benchmark by CIS http://hackingloops.acemlnb.com/lt.php?s=80e34c322909301bf35ab9ff5f0c599b&i=176A196A6A26265

http://hackingloops.acemlnb.com/lt.php?s=80e34c322909301bf35ab9ff5f0c599b&i=176A196A6A26265

CentOS 7 Benchmark by CIS CentOS 6 Benchmark by CIS Debian 8 Benchmark by CIS http://hackingloops.acemlnb.com/lt.php?s=80e34c322909301bf35ab9ff5f0c599b&i=176A196A6A26265

Debian 7 Benchmark by CIS http://hackingloops.acemlnb.com/lt.php?s=80e34c322909301bf35ab9ff5f0c599b&i=176A196A6A26265

Fedora 19 Security Guide by Fedora http://hackingloops.acemlnb.com/lt.php?s=80e34c322909301bf35ab9ff5f0c599b&i=176A196A6A26266

Linux Security Checklist by SANS http://hackingloops.acemlnb.com/lt.php?s=80e34c322909301bf35ab9ff5f0c599b&i=176A196A6A26267

Oracle Linux 7 Benchmark by CIS http://hackingloops.acemlnb.com/lt.php?s=80e34c322909301bf35ab9ff5f0c599b&i=176A196A6A26265

Red Hat Enterprise Linux 7 Security Guide by RedHat http://hackingloops.acemlnb.com/lt.php?s=80e34c322909301bf35ab9ff5f0c599b&i=176A196A6A26268

Red Hat Enterprise Linux 7 Security Benchmark by CIS http://hackingloops.acemlnb.com/lt.php?s=80e34c322909301bf35ab9ff5f0c599b&i=176A196A6A26265

Red Hat Enterprise Linux 7 Installation Hardening Checklist by GIAC http://hackingloops.acemlnb.com/lt.php?s=80e34c322909301bf35ab9ff5f0c599b&i=176A196A6A26269

Red Hat Enterprise Linux 6 Security Guide by RedHat http://hackingloops.acemlnb.com/lt.php?s=80e34c322909301bf35ab9ff5f0c599b&i=176A196A6A26270

RedHat Enterprise Linux 6 Security Benchmark by CIS http://hackingloops.acemlnb.com/lt.php?s=80e34c322909301bf35ab9ff5f0c599b&i=176A196A6A26265

Red Hat Enterprise Linux 5 Security Benchmark by CIS http://hackingloops.acemlnb.com/lt.php?s=80e34c322909301bf35ab9ff5f0c599b&i=176A196A6A26265

Slackware 10 Security Benchmark by CIS http://hackingloops.acemlnb.com/lt.php?s=80e34c322909301bf35ab9ff5f0c599b&i=176A196A6A26265

SUSE Security and Hardening Guide http://hackingloops.acemlnb.com/lt.php?s=80e34c322909301bf35ab9ff5f0c599b&i=176A196A6A26271

SUSE Linux Enterprise Server 12 Security Benchmark by CIS SUSE Linux Enterprise Server 11 Security Benchmark by CIS Ubuntu 14.04 LTS Security Benchmark by CIS http://hackingloops.acemlnb.com/lt.php?s=80e34c322909301bf35ab9ff5f0c599b&i=176A196A6A26265

Ubuntu 12.04 LTS Security Benchmark by CIS http://hackingloops.acemlnb.com/lt.php?s=80e34c322909301bf35ab9ff5f0c599b&i=176A196A6A26265