I tried out CloudSigma after hearing Chris from Exotic Liability giving it praise.
Last I checked they had a pre-configured BackTrack 5 image you can deploy in seconds. They also don't seem to filter any network traffic which was great when I had to scan a few work /24's and I picked up few services that I missed last audit since the other VPS provider were filtering. On 11 Jun 2013 17:54, "allison nixon" <[email protected]> wrote: > any cloud provider where you see bad stuff coming from is probably a great > place to run scans from! Try OVH or leaseweb. > > On Tue, Jun 11, 2013 at 11:39 AM, Jack Daniel <[email protected]>wrote: > >> >> I have no personal knowledge of such things, BUT, my friend "Bob" has >> used NQHosts' Moscow VPS facilities to great benefit in research. Bob >> tells me they take PayPal if you don't want to give them a credit card, but >> he never had billing issues. >> >> Personally, I might suggest checking with CloudSigma, they have open >> networking (unlike most) and are very easy to deal with- but I haven't >> specifically asked about aggressive scanning from their cloud instances. >> >> Jack >> >> >> >> On Tue, Jun 11, 2013 at 10:36 AM, Christopher Croad <[email protected]>wrote: >> >>> Hello, >>> >>> First time caller, long time listener. >>> >>> Does anyone have any recommendations for a vendor that would provide a >>> cloud based linux VM that could be used as a scanning/attack platform? >>> We're looking to do assessments on ourselves from an outside perspective >>> as opposed from inside our own perimeter. Our main concerns are that the >>> provider won't shut us down if they see us scanning our own network >>> (preferably by agreement rather than by lack of monitoring on their part), >>> and of course, cost. We'd may also use the system to set up mimicked >>> websites for phishing exercises against our staff, so we'd want to be able >>> to stand up websites and domain names as well. >>> >>> Chris C. >>> >>> _______________________________________________ >>> Pauldotcom mailing list >>> [email protected] >>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom >>> Main Web Site: http://pauldotcom.com >>> >> >> >> _______________________________________________ >> Pauldotcom mailing list >> [email protected] >> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom >> Main Web Site: http://pauldotcom.com >> > > > > -- > _________________________________ > Note to self: Pillage BEFORE burning. > _______________________________________________ > Pauldotcom mailing list > [email protected] > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom > Main Web Site: http://pauldotcom.com >
_______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
