Before that bro, perhaps in order to avoid any entanglement with the LEA
we shud clarify few things.

a). The said systems location? In country?
b). Who own the system? Own in sense of you have this system in your own
premise, using your own subscribed line etc
c). Will the exercise involve any internet connection? Or just within LAN?

If everything is belong to you, I dun see any prob but if other parties
involved (providers, ISPs, etc) then I believe in requesting consent or
authorization in written.

Lesson learned bro, I've seen people who learned from the hard way ;)

thanks and cheers


> so the red team arrange a series of attacks on the server, while the blue
> team will detect the vulnerabilities... sounds great. my Joomla networking
> comes from absolute zero security mod, while have about 3 vulnerable mod
> such as mod_rewrite etc etc..
>
> an "exercise" should be best, it surely benefits much. so.. who want to
> nicely and prudently "hack" me?
>


_______________________________________________
Owasp-Malaysia mailing list
[email protected]
https://lists.owasp.org/mailman/listinfo/owasp-malaysia

OWASP Malaysia Wiki
http://www.owasp.org/index.php/Malaysia

OWASP Malaysia Wiki Facebook
http://www.facebook.com/pages/OWASP-Malaysia-Local-Chapter/295989208420

Reply via email to