Penetration Testing mailing list archives

Re: Lab leads??


From: "Matthew Leeds" <mleeds () theleeds net>
Date: Wed, 17 Oct 2001 15:34:03 -0700

We use the imaging method in our QA lab all the time. We build systems with two hard drives, one holds all the images, 
the other is the target for whatever current image you want to be running. With a boot floppy for whatever favorite 
image tool you use, you're all set. We had started with removable drives, but found that to be slow, costly, and labor 
intensive. With the most current image tools you can store the images on a server as the boot floppies can also hold 
network drivers. Or of course you can build boot CDs, but since modern image tools will build you a boot floppy, why 
bother.

---Matthew
*********** REPLY SEPARATOR  ***********

On 10/17/2001 at 8:12 PM Alex Butcher (pentest) wrote:

On Tue, 16 Oct 2001, 'ken'@FTU wrote:

Hello,

I'm looking to set up a lab of about 30 host to simulater an
Internet/DMZ/Intranet.

Does anyone have any sources (papers) or ideas that might help? Here are
a few parameters:

Lab must contain various OS'es.
Lab must be able to be very easily configurable to create and
demonstrate holes and how to patch them. (But then recreate the hole to
demonstrate the weakness again to another set of people.)
The holes must be at the network, os and application levels.

One idea I had is to create images of servers known to have holes,
demonstrate the exploit, patch the hole, show it is fixed and then
reimage the disk with the old hole. The imaging trick should work with
different OS's as well. What do you think?

VMware is very nice for this. You can backup the "clean" image before and
after hardening it, so you can reuse it again and again. If you have
enough memory, you can even run multiple hosts on the same piece of
hardware.

Thanks in advance.
'ken'

Best Regards,
Alex.



----------------------------------------------------------------------------
This list is provided by the SecurityFocus Security Intelligence Alert
(SIA)
Service. For more information on SecurityFocus' SIA service which
automatically alerts you to the latest security vulnerabilities please see:
https://alerts.securityfocus.com/




----------------------------------------------------------------------------
This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
Service. For more information on SecurityFocus' SIA service which
automatically alerts you to the latest security vulnerabilities please see:
https://alerts.securityfocus.com/


Current thread: