

Second, is to obscure the source of our pen testing recon or attack activities. First, is to connect to malicious (or suspected malicious) resources when we perform research. Pen testers have two basic reasons for obscuring their source IP address. This post is to share a method I use for obscuring the source IP address of my computer. Malicious attackers have no such restrictions. We pen testers need to train ourselves to behave like those with malicious intent, but simultaneously maintain appropriate decorum and sensitivity to the operations of the networks we're trying to improve.

Pen testing derives its value from being able to emulate the behavior of real world attackers.

Immediately apply the skills and techniques learned in SANS courses, ranges, and summits
