.

Virtualbox images for us to secure/hack/analyze?

<<

Eleven

User avatar

Full Member
Full Member

Posts: 121

Joined: Thu Nov 10, 2011 6:47 pm

Post Tue Nov 15, 2011 8:41 am

Virtualbox images for us to secure/hack/analyze?

I was thinking it could be fun if we had someone studying for something like GCUX secure an Ubuntu Virtualbox image while leaving a vulnerability or two, then post a torrent of the image somewhere for the Network Pen Testing forum.  Then people could practice hacking it, and someone could post a new torrent of the image/network traffic for people in the Forensic forum to analyze.  They could analyze it and post the malware for the people in the Malware forum to analyze.

Is anyone interested in this?  If so, I'm more of a forensic guy so is there anyone who would want to kick this off?  If no one wants to secure an image, I supposed we could use metasploitable...
<<

MaXe

User avatar

Hero Member
Hero Member

Posts: 671

Joined: Tue Aug 17, 2010 9:49 am

Post Tue Nov 15, 2011 2:38 pm

Re: Virtualbox images for us to secure/hack/analyze?

You could always hack into the De-Ice ISO's and then secure them: http://www.de-ice.net/

Damn Vulnerable Linux: (The official mirror is down.)
http://forum.intern0t.net/gnu-linux/411 ... 1-5-a.html

Metasploitable:

http://blog.metasploit.com/2010/05/intr ... table.html
http://www.offensive-security.com/metas ... sploitable


You can use all three as targets which you can practice getting into and when you obtain root, secure them to the extend of your best abilities.

That is one of the most oldest ways some types of hackers has worked, enjoy!  ;D
I'm an InterN0T'er
<<

Eleven

User avatar

Full Member
Full Member

Posts: 121

Joined: Thu Nov 10, 2011 6:47 pm

Post Tue Nov 15, 2011 3:08 pm

Re: Virtualbox images for us to secure/hack/analyze?

Thanks,  I forgot about DVL.  I'll check it out!

My focus isn't really on hacking though, it's more on analyzing attacks.  I think people would learn more about pentesting by attacking boxes someone else secured, and forensic analysts would learn more about attacks that someone else did, etc.

So if someone created an Linux Virutalbox image and secured it, gave it to a pentester to hack it, who then gave it to a forensic analysts to analyze it the whole forum could benefit rather than someone like me who's into forensics trying to play a hacker and investigate what happened when they already know all the answers.

If no one wants to secure an image and leave a vulnerability or two, would someone be interested in hacking DVL/Metasploitable and posting the Virtualbox image and tcpdump log for the forensic forum to analyze and share the evidence of the attack?

Return to General Certification

Who is online

Users browsing this forum: No registered users and 2 guests

.
Powered by phpBB® Forum Software © phpBB Group.
Designed by ST Software