These are notes and instructions I've been writing up for performing penetration testing.
- Building a virtual router - We need to build two networks, one for our targets and one for our attacking hosts and put a router in between them.
- Firewall rules - By changing the iptables rules, we can simulate more realistic environments.
- List of hosts - A list of the hosts and their descriptions.