Everyone, thank you for all the responses and help with building out a security 
lab. 

Much appreciated,

Glen Roberts


On Jun 7, 2012, at 2:07 AM, k41zen Me wrote:

> Also take a look at these:
> 
> http://www.securityaegis.com/network-pentest-lab/
> http://www.securityaegis.com/pentest-lab-web-application-edition/
> 
> On 7 Jun 2012, at 04:12, Pierre Wills <[email protected]> wrote:
> 
>> Here is a link to setting up a metasploit pen testing lab.
>> 
>> http://www.metasploit.com/help/test-lab.jsp
>> 
>> You basically want to find operating systems with well know
>> vulnerabilities such as Windows XP SP2 and approbations such as
>> previous versions of mysql, IIS, wordpress.
>> 
>> 
>> On Wed, Jun 6, 2012 at 10:29 PM, Glen Roberts <[email protected]> wrote:
>>> Can someone point me to some best practices for setting up and operating a 
>>> small lab for internal pen testing and incident forensics? Appreciate any 
>>> tips you might have...
>>> 
>>> Thanks,
>>> 
>>> Glen Roberts
>>> _______________________________________________
>>> Pauldotcom mailing list
>>> [email protected]
>>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
>>> Main Web Site: http://pauldotcom.com
>> _______________________________________________
>> Pauldotcom mailing list
>> [email protected]
>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
>> Main Web Site: http://pauldotcom.com
> 
> _______________________________________________
> Pauldotcom mailing list
> [email protected]
> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> Main Web Site: http://pauldotcom.com

_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to