Resources for pentest lab scenarios?

Viewing 8 reply threads
  • Author
    Posts
    • #4653
      rframe
      Participant

      Hi,

      I’m preparing for the CEH on my own (no formal classes), and would like exposure to more lab environments for pen testing.  I wanted to know if you’ve located any interesting lab environment resources for pen testing?

      What I’m hoping to find are more resources like de-ice.net which provide vmware images and lab scenarios to test against.  Online labs would be great too.

      I enjoy working against systems that I haven’t setup myself.

      The offensive security course and online labs look like a good value, but I think I’ll wait until after I sit for my CISSP later this spring so that I can apply the continuing education credits earned toward future ISC2 requirements.

    • #28925
      hayabusa
      Participant

      Good luck, and welcome to EH-Net, rframe.  You’ve found a good place to get you going.

      There are other good live-cd lab scenarios you can use.  Hackerdemia, pwnOS, Webgoat and others will give you some other basics to look at and start studying with.  There’s also a good book, written by Thomas Wilhelm (recently talked about on the forums here):  “Professional Penetration Testing: Creating and Operating a Formal Hacking Lab”  which I would highly recommend as a good resource for your learning pleasure.  The book is an excellent resource / read, and the DVD contains images for many of the live-cd’s I listed above, as well as videos and tutorials from the heorot.net site.  If you’re looking to get started, it’s a good way to begin.  Also, another good book for building your OWN lab is “Build Your Own Security Lab: A Field Guide for Network Testing”

      I think if you’re looking for basic starting points, those will do you well!

    • #28926
      UNIX
      Participant

      Welcome to the forums, rframe.

      In addition to what hayabusa already recommended, you could also take a look at Network Pentest Lab and Pentest Labs: Web Application Edition by Jhaddix and Laz3r.

      There are some other resources as well, including Damn Vulnerable Linux, Foundstone’s Hacme series and still some more.

      You may also browse through similar threads, were some more recommendations were already given. Eventually you might also find similar questions in several newsgroups.

    • #28927
      unsupported
      Participant

      I’m remembering someone suggesting Damn Vulnerable Linux (http://www.damnvulnerablelinux.org).  It is a pre-configured Linux system with a ton of holes in it to poke around in.  There is also another project Dam Vulnerable Web App (http://sourceforge.net/projects/dvwa/), and of course Foundstone’s Hacme series of tools (http://www.foundstone.com/us/resources-free-tools.asp).  OWASP’s WebGoat Project (http://www.owasp.org/index.php/Category:OWASP_WebGoat_Project) may also be useful to you.

      I also remember some servers which are setup for pen testing/exploration… maybe it was a honey net project or darknet or something.

      My experience with the CEH, it is just as easy to setup the tools with two PCs and a virtual machine setup Snort, and bang out NMAP switches while running Wireshark.

      (edit: awesec beat me to the punch in posting because I had to pay the plumber!)

    • #28928
      h0les
      Participant
    • #28929
      Ketchup
      Participant

      Overthewire.org war games are a pretty cool resource as well.

    • #28930
      rframe
      Participant

      Thanks for all the quick suggestions, very helpful and you’ve given me plenty to work on.  I appreciate it.  ;D

    • #28931
      caissyd
      Participant

      Wow!

      I knew about half of them, but I am very happy to see this list too!
      I think you can also get DefCon’s capture the flag server images and answers from their web site.

    • #28932
      unsupported
      Participant

      Man, this thread has been bothering me for days.  I knew there was another resource out there for pen testing.  I finally found it.  Netwars, http://netwars.info/.

      Also, there are easy ways to roll your own using VMWare images, http://www.vmware.com/appliances/, and then a visit to your local vulnerability database, http://www.exploit-db.com/.

      Ok, I totally feel better now!

Viewing 8 reply threads
  • You must be logged in to reply to this topic.

Copyright ©2020 Caendra, Inc.

Contact Us

Thoughts, suggestions, issues? Send us an email, and we'll get back to you.

Sending

Sign in with Caendra

Forgot password?Sign up

Forgot your details?