This article highlights key challenges associated with offering cyber range training using AWS. It also presents Ravello cybersecurity lab as a way to run cyber ranges for training on public cloud (AWS & Google cloud) to overcome these challenges.
Colocation with third-party network elements/servers in demilitarized zone (DMZ) is an issue for security architects and puts pressure on network security architecture. How do we connect third party equipment to inhouse security appliances in a flexible way? This is an issue for many large financial & health care institutions, and other enterprises that have to securely connect 3rd party equipment.
Financial institutions and enterprises require flexible network security architecture to accommodate external network devices/servers in their DC/colo facilities. This article provides a way to design and implement such a network security architecture using Border Gateway Protocol (BGP) + VXLAN tunnels along with VM-series firewall from Palo Alto Networks. Ravello Network Smart Labs provides an easy way to test and deploy an architecture before moving it to the enterprise infrastructure.
Have you ever used an unsecured public wifi connection and wondered if someone could be hacking you? Who could possibly be interested in monitoring your browsing activity on the web? In this post, we focus on a particularly active and common type of network hacking – man-in-the-middle (MITM) attacks. Network security testing is essential to discover these attacks, and Ravello cybersecurity labs provide an easy way to replicate enterprise environments on AWS and Google cloud and carry out MITM security testing.
In the previous post in the pentest on AWS and Google series, we set up a complete security testing environment to play with. As you have seen, it really isn’t that difficult for an attacker to pwn your network. A lot of what attackers do is observation, trial-and-error, and guesswork. I left most of those parts out of the article, but bad network cleanliness and practices make things a lot simpler for adversaries.
This next post in the network penetration testing lab series will get you acquainted with the technical details of the pentest blueprint and settings required to test security capabilities and run pentesting on AWS or Google Cloud.
Author: Clarence Chio Clarence is a Security Research Engineer at Shape Security, working on the system that tackles malicious bot intrusion from the angle of big data analysis. Clarence has presented independent research on Machine Learning and Security at Information…
How to setup and run a penetration testing (pentest) lab on AWS or Google Cloud with Kali Linux, Metasploitable and WebGoat
In this blog, I describe how you can deploy Kali Linux and run penetration testing (also called pen testing) on AWS or Google Cloud using Ravello System’s nested virtualization technology. This ‘Linux/Web Security Lab’ lets you hit the ground running in a matter of minutes and start exploiting security vulnerabilities. By the way, if you haven’t already seen it, this blog by SimSpace about on-demand Cyber Ranges on Ravello is very interesting as well.
As increasing number of enterprises turn to Ravello to replicate their environments on public cloud for security testing, we have seen a growing interest from security community to run security labs on public cloud – to ‘sharpen their saw’, hone their security…
Ethical hackers are embracing public cloud for penetration testing. Using Ravello on AWS and Google cloud, enterprises are creating high-fidelity replicas of their production environments – and using it for penetration testing to find and fix vulnerabilities in their network, web and applications before a hacker does. This article looks at five most popular tools used by ethical hackers for penetration testing –
Calling all malware analysts! We are proud to share that REMnux is now available on Ravello Repo. Using Ravello’s nested virtualization and networking overlay technology, it is now possible to run REMnux in an isolated sandbox environment for malware analysis…
This blog describes how enterprises can use public clouds like AWS and Google Cloud for cyber security training and readiness. Check out the webcast below.
With multiple security breaches reported over the last couple of years (Target, Home Depot, Sony Pictures to name a few), enterprises today are scrambling to ‘beef-up’ their cyber security. They are investing to get the best-of-breed intrusion prevention & breach detection tools and securing their network through next generation firewall technologies & endpoint security solutions. Many are turning to innovative technologies such as big data analytics, cloud-enabled cybersecurity and advanced authentication to reduce cyber-risks to their environment.
Ravello’s software defined networking overlay makes it possible to create full-featured network & security labs on public cloud. With a clean Layer 2 networking access, enterprises, ISVs, their resellers, have adopted Ravello for a variety of use-cases – network modeling,…
On-demand Cyber Ranges on AWS using Ravello- making cybersecurity development, testing and training affordable & accessible for enterprises
Today’s cyber threat landscape necessitates that your organization base its approach to security on the assumption that the adversary is already inside your network. So how do we prepare your organization to take back your network and to protect your data?
SimSpace is proud to introduce our Virtual Clone Network (VCN) technology that provides realistic environments, adversary attack campaigns, and training and assessment tools for your organization’s cybersecurity developmental, testing, and training requirements. With SimSpace’s VCN, you are no longer restricted to small networks or to virtual environments that are not representative of your specific network environment and typical traffic. SimSpace VCN is a first-of-its kind offering because it utilizes capacity from Amazon Web Services and Google Cloud to provide full featured pre-configured and tailorable Cyber Ranges that are deployed on-demand in fully isolated environments – made possible by Ravello Systems’ nested virtualization and software-defined networking technology.
Our goal is to enable the entire ecosystem of networking and security technologies with real world labs that run in the cloud to achieve a level of scale and accuracy not possible with traditional network and security simulation approaches. Using Ravello’s technology, we enable true “data center like” labs in the cloud – without any restrictions on layer 2 networking and security testing. We envisioned a world where network and security teams are not constrained by hardware capacity each time they need a lab for design, modelling, proof of concept or even upgrade testing – and we are excited to formally announce the solution today.