Penetration Testing mailing list archives
Re: Startup security lab setup
From: HITESH PATEL <hitesh50 () yahoo com>
Date: Sun, 22 Mar 2009 19:15:15 -0700 (PDT)
1) Define the scope/purpose/requirement of the lab very clearly(possibly documented). If you do not have it clear you will start with something and might end up doing completely different 2) get different flavors of test machines in VM (virtual machine formats) and take snapshots of them regularly so that in case you end-up getting virus/malware in any of the system (due to you work/research) you can reset back to last good state (and save time of reconfiguring and updates/patches). 3) Get your lab in seperat VLAN (or define network path/access control very carefully) so it is controllable. (Who can do what). Remember after having powerful security tools in your lab you do not want someone originating attacks to outside world (especially towards you competitor) 4) if you have defined scope of your lab you can think different security tools. I have seen lots of people breaking the scope to - application security tools - database security tools - network security tools - monitoring security tools - general purpose security scanning tools - operating security tools 5) In my opinion, You must have one VM (or system) hosting BackTrack (This will give you very good coverage as well as jumpstart) I wish you good luck....I have gone through such exercise in past and getting scope/purpose/requirements (documented) is major part or the entire exercise. -Hitesh Patel ----- Original Message ---- From: Abo Sous <abussous () gmail com> To: pen-test () securityfocus com Sent: Tuesday, March 17, 2009 2:08:40 PM Subject: Startup security lab setup Hello All, i've been asked to start a lab setup for my company, with a focus on vulnerability assessments. So far, what i have in mind includes: a firewall unit, a couple of PCs with different OS flavors, some VA applications (Nessus, metasploit...) What else should i look for? what applications would you deem indispensable in such a lab? thanks in advance, -AS. ------------------------------------------------------------------------ This list is sponsored by: InfoSec Institute Learn all of the latest penetration testing techniques in InfoSec Institute's Ethical Hacking class. Totally hands-on course with evening Capture The Flag (CTF) exercises, Certified Ethical Hacker and Certified Penetration Tester exams, taught by an expert with years of real pen testing experience. http://www.infosecinstitute.com/courses/ethical_hacking_training.html ------------------------------------------------------------------------ ------------------------------------------------------------------------ This list is sponsored by: InfoSec Institute Tired of using other people's tools? Why not learn how to write your own exploits? InfoSec Institute's Advanced Ethical Hacking class teaches you how to write stack and heap buffer overflow exploits for Windows and Linux. Gain your Certified Expert Penetration Tester (CEPT) cert as well. http://www.infosecinstitute.com/courses/advanced_ethical_hacking_training.html ------------------------------------------------------------------------
Current thread:
- Startup security lab setup Abo Sous (Mar 17)
- RE: Startup security lab setup Curt Shaffer (Mar 18)
- Re: Startup security lab setup Quentin Chung@Programmer (Mar 18)
- Re: Startup security lab setup Aarón Mizrachi (Mar 18)
- Re: Startup security lab setup private private (Mar 18)
- Re: Startup security lab setup HITESH PATEL (Mar 23)
- RE: Startup security lab setup Shenk, Jerry A (Mar 24)
- <Possible follow-ups>
- Re: Startup security lab setup David Schekaiban (Mar 18)
- Message not available
- Startup security lab setup Jeremy Brown (Mar 19)
- Re: Startup security lab setup Adriel T. Desautels (Mar 19)
- Message not available