Link to home
Create AccountLog in
Linux Distributions

Linux Distributions

--

Questions

--

Followers

Top Experts

Avatar of Tech Curious
Tech Curious

Kali Linux VM as a Jump Host for 3rd Party VAPT

Hi


We hired a 3rd party company to perform a black box VAPT on our internal & external apps, servers & network devices

One option we’re considering is to provide them with a Kali Linux VM hosted inside our environment (behind the firewall) and allow them to access it remotely via VPN. From there, they can perform the penetration testing on our internal assets.

Has anyone implemented this approach before?


Is it considered a secure and acceptable practice?

Appreciate any suggestions 
 

Zero AI Policy

We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.


Avatar of Ron MalmsteadRon Malmstead🇺🇸

Normally when you hire a pen test company, they would install a secure device for you.  You're paying them to do the pen testing, so they should set it up.

Since it's a VM, you would need some sort of software on it that enables them to reach it.  That could be remote desktop over VPN (if you're running a desktop on the machine ie Gnome), it could be OpenSSH, or OpenVPN.  It would be a good idea to communicate with the vendor as to which one they prefer to use.  The pen test box itself needs to be very secure, because you're essentially opening up a hacking toolkit inside your network.  The vendor should be involved in this from start to finish.


ASKER CERTIFIED SOLUTION
Avatar of btanbtan

Link to home
membership
Log in or create a free account to see answer.
Signing up is free and takes 30 seconds. No credit card required.
Create Account

Avatar of Tech CuriousTech Curious

ASKER

Thank you experts


Basically vendor asked to provide us Kali Linux VM for pentest purpose 


VM access will be over SSL VPN ( Global Protect)


Is it secured to give them this VM?


How we can lock down this VM

 


SOLUTION
Link to home
membership
Log in or create a free account to see answer.
Signing up is free and takes 30 seconds. No credit card required.

SOLUTION
Link to home
membership
Log in or create a free account to see answer.
Signing up is free and takes 30 seconds. No credit card required.

Can we install anti-malware on Kali linux to verify EDR expected behavior and detection during the testing period?


We use CS Falcon and we do have SOCaaS


Can we inform  SOC team in advance to monitor all pen testing activities. We want to ensure SOC is working well as expected 


Please share your thoughts 


Reward 1Reward 2Reward 3Reward 4Reward 5Reward 6

EARN REWARDS FOR ASKING, ANSWERING, AND MORE.

Earn free swag for participating on the platform.


Likely a overkill as the kali tool used will eventually not work with AV unless you have exemption. This defeat purpose for overall efficacy of tester to use the kali. Have rule of engagement as standing order and have trace of activity logged for verifiable evidence for investigation when needed. 


Thank you expert


1- Can we inform  SOC team in advance to monitor all pen testing activities.  We also want to test and validate if the SOC detects malicious behavior correctly during the engagement.


 


2- I would also like seek your advise as we’ll be giving the tester VPN access and credentials for a Kali Linux jump host. 

What’s your preferred secure method to share those credentials? Username via email, and password different thru different channels like Whatsapp, sms, teams. 


 


 


For (1), yes there should be already be SOP. This is legit activities which you will be overseeing to give SOC assurance. You will need to give them the IP to whitelist (or ignore alerts) and time duration (start and end). Once completed, you should inform SOC again.

For (2), VPN login should be 2FA where possible. It can be SMS or email for the short code. Key is to make sure it is the only tester login in so at least there are the userid, email and password registered for the test account. this will help mapped to your log generated in Kali as proxy 


Free T-shirt

Get a FREE t-shirt when you ask your first question.

We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.

Linux Distributions

Linux Distributions

--

Questions

--

Followers

Top Experts

A Linux distribution is an operating system made as a software collection based on the Linux kernel and, often, on a package management system and are available for a variety of systems. A typical Linux distribution comprises a Linux kernel, GNU tools and libraries, additional software, documentation, a window system (the most common being the X Window System), a window manager, and a desktop environment. Most Linux systems are open-source software made available both as compiled binaries and in source code form, allowing modifications to the original software. Over three hundred distributions are in active development, including commercially backed distributions (such as Fedora, openSUSE and Ubuntu) and community-driven distributions (such as Debian, Slackware, Gentoo and Arch Linux).