?
Solved

Short workshop pentesting (Nessus/Metasploit) - how to build the lab?

Posted on 2013-12-04
3
Medium Priority
?
466 Views
Last Modified: 2013-12-04
Experts,

For a small IT Service Management team I want to organize a small, hands-on workshop of 1 hour to teach the basics of scanning for vulnerabilities with Nessus and exploiting vulnerabilities, preferably with Metasploit.

I'm looking for a particularly vulnerable version of Linux to include in the testlab. I've heard about Damn Vulnerable Linux, but then again I also heard that it is more tailored towards web application security.

Any thoughts?
0
Comment
Question by:gwx
  • 2
3 Comments
 
LVL 66

Accepted Solution

by:
btan earned 2000 total points
ID: 39697432
That is all right but preferred more specific like  Metasploitable 1/2 and web apps is a good means to reveal more of scanner capability as well e.g. OWASP Broken Web Applications

https://securitystreet.jive-mobile.com/#jive-document?content=%2Fapi%2Fcore%2Fv2%2Fdocuments%2F1875

Couple of vulnerable web apps
http://blog.taddong.com/2011/10/hacking-vulnerable-web-applications.html
0
 
LVL 66

Expert Comment

by:btan
ID: 39697442
Good to jote the testing done involving nessus with metasploitable too
http://hackertarget.com/nessus-openvas-nexpose-vs-metasploitable/
0
 

Author Closing Comment

by:gwx
ID: 39697522
I can work with this, thx.
0

Featured Post

Hire Technology Freelancers with Gigs

Work with freelancers specializing in everything from database administration to programming, who have proven themselves as experts in their field. Hire the best, collaborate easily, pay securely, and get projects done right.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article, WatchGuard's Director of Security Strategy and Research Teri Radichel, takes a look at insider threats, the risk they can pose to your organization, and the best ways to defend against them.
Your business may be under attack from a silent enemy that is hard to detect. It works stealthily in the shadows to access and exploit your critical business information, sensitive confidential data and intellectual property, for commercial gain. T…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Suggested Courses

616 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question