I tried out CloudSigma after hearing Chris from Exotic Liability giving it
praise.

Last I checked they had a pre-configured BackTrack 5 image you can deploy
in seconds.

They also don't seem to filter any network traffic which was great when I
had to scan a few work /24's and I picked up  few services that I missed
last audit since the other VPS provider were filtering.
 On 11 Jun 2013 17:54, "allison nixon" <[email protected]> wrote:

> any cloud provider where you see bad stuff coming from is probably a great
> place to run scans from!  Try OVH or leaseweb.
>
> On Tue, Jun 11, 2013 at 11:39 AM, Jack Daniel <[email protected]>wrote:
>
>>
>> I have no personal knowledge of such things, BUT, my friend "Bob" has
>> used NQHosts' Moscow VPS facilities to great benefit in research.  Bob
>> tells me they take PayPal if you don't want to give them a credit card, but
>> he never had billing issues.
>>
>> Personally, I might suggest checking with CloudSigma, they have open
>> networking (unlike most) and are very easy to deal with- but I haven't
>> specifically asked about aggressive scanning from their cloud instances.
>>
>> Jack
>>
>>
>>
>> On Tue, Jun 11, 2013 at 10:36 AM, Christopher Croad <[email protected]>wrote:
>>
>>>  Hello,
>>>
>>>  First time caller, long time listener.
>>>
>>>  Does anyone have any recommendations for a vendor that would provide a
>>> cloud based linux VM that could be used as a scanning/attack platform?
>>>  We're looking to do assessments on ourselves from an outside perspective
>>> as opposed from inside our own perimeter.  Our main concerns are that the
>>> provider won't shut us down if they see us scanning our own network
>>> (preferably by agreement rather than by lack of monitoring on their part),
>>> and of course, cost.   We'd may also use the system to set up mimicked
>>> websites for phishing exercises against our staff, so we'd want to be able
>>> to stand up websites and domain names as well.
>>>
>>>  Chris C.
>>>
>>> _______________________________________________
>>> Pauldotcom mailing list
>>> [email protected]
>>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
>>> Main Web Site: http://pauldotcom.com
>>>
>>
>>
>> _______________________________________________
>> Pauldotcom mailing list
>> [email protected]
>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
>> Main Web Site: http://pauldotcom.com
>>
>
>
>
> --
> _________________________________
> Note to self: Pillage BEFORE burning.
> _______________________________________________
> Pauldotcom mailing list
> [email protected]
> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> Main Web Site: http://pauldotcom.com
>
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to