Start Your Free Trial

Cyber Security Labs

Build & test network security architecture using enterprise replicas on AWS & Google Cloud

Author:
Matt Conran
Matt Conran is a Network Architect based out of Ireland and a prolific blogger at Network Insight. In his spare time he writes on topics ranging from SDN, OpenFlow, NFV, OpenStack, Cloud, Automation and Programming.

Colocation with third-party network elements/servers in demilitarized zone (DMZ) is an issue for security architects and puts pressure on network security architecture. How do we connect third party equipment to inhouse security appliances in a flexible way? This is an issue for many large financial & health care institutions, and other enterprises that have to securely connect 3rd party equipment.

Continue reading »

Network security architecture using VXLAN with Palo Alto Networks NG Firewall

Author:
Matt Conran
Matt Conran is a Network Architect based out of Ireland and a prolific blogger at Network Insight. In his spare time he writes on topics ranging from SDN, OpenFlow, NFV, OpenStack, Cloud, Automation and Programming.

Financial institutions and enterprises require flexible network security architecture to accommodate external network devices/servers in their DC/colo facilities. This article provides a way to design and implement such a network security architecture using Border Gateway Protocol (BGP) + VXLAN tunnels along with VM-series firewall from Palo Alto Networks. Ravello Network Smart Labs provides an easy way to test and deploy an architecture before moving it to the enterprise infrastructure.

Continue reading »

Man-in-the-middle Network Security Testing on enterprise environment replicas in AWS & Google Cloud

Author:
Clarence Chio
Clarence is a Security Research Engineer at Shape Security, working on the system that tackles malicious bot intrusion from the angle of big data analysis. Clarence has presented independent research on Machine Learning and Security at Information Security conferences in several countries, and is also the organizer of the “Data Mining for Cyber Security” meetup group in the SF Bay Area.

Have you ever used an unsecured public wifi connection and wondered if someone could be hacking you? Who could possibly be interested in monitoring your browsing activity on the web? In this post, we focus on a particularly active and common type of network hacking – man-in-the-middle (MITM) attacks. Network security testing is essential to discover these attacks, and Ravello cybersecurity labs provide an easy way to replicate enterprise environments on AWS and Google cloud and carry out MITM security testing.

Continue reading »

Penetration testing on AWS: Think like your attacker

Shape Security
Author:
Clarence Chio
Clarence is a Security Research Engineer at Shape Security, working on the system that tackles malicious bot intrusion from the angle of big data analysis. Clarence has presented independent research on Machine Learning and Security at Information Security conferences in several countries, and is also the organizer of the “Data Mining for Cyber Security” meetup group in the SF Bay Area.

In the previous post in the pentest on AWS and Google series, we set up a complete security testing environment to play with. As you have seen, it really isn’t that difficult for an attacker to pwn your network. A lot of what attackers do is observation, trial-and-error, and guesswork. I left most of those parts out of the article, but bad network cleanliness and practices make things a lot simpler for adversaries.

Continue reading »

Pentesting on AWS: Network Penetration Testing Playground

Shape Security
Author:
Clarence Chio
Clarence is a Security Research Engineer at Shape Security, working on the system that tackles malicious bot intrusion from the angle of big data analysis. Clarence has presented independent research on Machine Learning and Security at Information Security conferences in several countries, and is also the organizer of the “Data Mining for Cyber Security” meetup group in the SF Bay Area.

This next post in the network penetration testing lab series will get you acquainted with the technical details of the pentest blueprint and settings required to test security capabilities and run pentesting on AWS or Google Cloud.

Continue reading »

How to setup and run a penetration testing (pentest) lab on AWS or Google Cloud with Kali Linux, Metasploitable and WebGoat

Author:
Clarence Chio
Clarence works at Shape Security on the system that tackles malicious bot intrusion from the angle of big data analysis. Clarence has presented independent research on Machine Learning and Security at Information Security conferences in several countries, and is also the organizer of the “Data Mining for Cyber Security” meetup group in the SF Bay Area.

In this blog, I describe how you can deploy Kali Linux and run penetration testing (also called pen testing) on AWS or Google Cloud using Ravello System’s nested virtualization technology. This ‘Linux/Web Security Lab’ lets you hit the ground running in a matter of minutes and start exploiting security vulnerabilities. By the way, if you haven’t already seen it, this blog by SimSpace about on-demand Cyber Ranges on Ravello is very interesting as well.

Continue reading »

Five most popular penetration testing tools

Ethical hackers are embracing public cloud for penetration testing. Using Ravello on AWS and Google cloud, enterprises are creating high-fidelity replicas of their production environments – and using it for penetration testing to find and fix vulnerabilities in their network, web and applications before a hacker does. This article looks at five most popular tools used by ethical hackers for penetration testing –

Continue reading »

Public cloud – a new playground for cyber security ninjas?

This blog describes how enterprises can use public clouds like AWS and Google Cloud for cyber security training and readiness. Check out the webcast below.

With multiple security breaches reported over the last couple of years (Target, Home Depot, Sony Pictures to name a few), enterprises today are scrambling to ‘beef-up’ their cyber security. They are investing to get the best-of-breed intrusion prevention & breach detection tools and securing their network through next generation firewall technologies & endpoint security solutions. Many are turning to innovative technologies such as big data analytics, cloud-enabled cybersecurity and advanced authentication to reduce cyber-risks to their environment.

Continue reading »

On-demand Cyber Ranges on AWS using Ravello- making cybersecurity development, testing and training affordable & accessible for enterprises

Today’s cyber threat landscape necessitates that your organization base its approach to security on the assumption that the adversary is already inside your network. So how do we prepare your organization to take back your network and to protect your data?

SimSpace is proud to introduce our Virtual Clone Network (VCN) technology that provides realistic environments, adversary attack campaigns, and training and assessment tools for your organization’s cybersecurity developmental, testing, and training requirements. With SimSpace’s VCN, you are no longer restricted to small networks or to virtual environments that are not representative of your specific network environment and typical traffic. SimSpace VCN is a first-of-its kind offering because it utilizes capacity from Amazon Web Services and Google Cloud to provide full featured pre-configured and tailorable Cyber Ranges that are deployed on-demand in fully isolated environments – made possible by Ravello Systems’ nested virtualization and software-defined networking technology.

Continue reading »

Announcing Networking & Security Smart Labs on AWS and Google Cloud

Ravello

We at Ravello are proud to announce the launch of networking and security Smart Labs on AWS or Google Cloud.

Our goal is to enable the entire ecosystem of networking and security technologies with real world labs that run in the cloud to achieve a level of scale and accuracy not possible with traditional network and security simulation approaches. Using Ravello’s technology, we enable true “data center like” labs in the cloud – without any restrictions on layer 2 networking and security testing. We envisioned a world where network and security teams are not constrained by hardware capacity each time they need a lab for design, modelling, proof of concept or even upgrade testing – and we are excited to formally announce the solution today.

Continue reading »