Solved

Short workshop pentesting (Nessus/Metasploit) - how to build the lab?

Posted on 2013-12-04
3
445 Views
Last Modified: 2013-12-04
Experts,

For a small IT Service Management team I want to organize a small, hands-on workshop of 1 hour to teach the basics of scanning for vulnerabilities with Nessus and exploiting vulnerabilities, preferably with Metasploit.

I'm looking for a particularly vulnerable version of Linux to include in the testlab. I've heard about Damn Vulnerable Linux, but then again I also heard that it is more tailored towards web application security.

Any thoughts?
0
Comment
Question by:gwx
  • 2
3 Comments
 
LVL 63

Accepted Solution

by:
btan earned 500 total points
ID: 39697432
That is all right but preferred more specific like  Metasploitable 1/2 and web apps is a good means to reveal more of scanner capability as well e.g. OWASP Broken Web Applications

https://securitystreet.jive-mobile.com/#jive-document?content=%2Fapi%2Fcore%2Fv2%2Fdocuments%2F1875

Couple of vulnerable web apps
http://blog.taddong.com/2011/10/hacking-vulnerable-web-applications.html
0
 
LVL 63

Expert Comment

by:btan
ID: 39697442
Good to jote the testing done involving nessus with metasploitable too
http://hackertarget.com/nessus-openvas-nexpose-vs-metasploitable/
0
 

Author Closing Comment

by:gwx
ID: 39697522
I can work with this, thx.
0

Featured Post

Salesforce Made Easy to Use

On-screen guidance at the moment of need enables you & your employees to focus on the core, you can now boost your adoption rates swiftly and simply with one easy tool.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Provide an easy one stop to quickly get the relevant information on common asked question on Ransomware in Expert Exchange.
Ransomware continues to be a growing problem for both personal and business users alike and Antivirus companies are still struggling to find a reliable way to protect you from this dangerous threat.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used below. https://filedb.experts-exchange.com/incoming/2017/03_w12/1151775/Permutations.txt https://filedb.experts-exchange.com/incoming/201…

829 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question