Please tell mr. Mccray that he has still YET to give me a refund. This has been 
everything BUT a good experience. You're posting for a service that he clearly 
cannot follow through with due to lack of professionalism and or knowledge of 
the subject in general. A fair warning; if i don't receive my $100.00 refund in 
one week i WILL be taking him to court. I don't care if it costs me $600 in the 
process as long as he's held liable for being in the court room.

GOOD DAY!

Sent from my iPhone

On Nov 18, 2013, at 10:51 AM, xgermx <[email protected]> wrote:

> Sorry, I don't have a direct link but, Joe McCray is hosting a "Building A 
> Low Cost HackLab" webinar this week. 
> (It was rescheduled from last week to this week). Keep an eye on Twitter; 
> I'll update this thread with the link when it's shared.
> 
> 
> On Sun, Nov 17, 2013 at 9:13 AM, Jamil Ben Alluch <[email protected]> wrote:
>> Thank you all for all the great responses. Lots of information here!
>> 
>> I appreciate it greatly.
>> 
>> Best Regards,
>> 
>> --
>> Jamil Ben Alluch, B.Ing., GCIH
>> 
>> [email protected]
>> +1-819-923-3012
>> 
>> 
>> On Sun, Nov 17, 2013 at 9:34 AM, Joseph Brand <[email protected]> wrote:
>>> TechNet was replaced with free to download 180 day trials so you can still 
>>> get access to ISOs and install MS stuff.  Just a pain to rekey, or mess 
>>> with changing the OS date / time settings to keep it within the trial.
>>> 
>>> I like to run a couple of the recent versions at home for trial scans and 
>>> finding ways in.
>>> 
>>> Joe
>>> From: Robin Wood
>>> Sent: 11/17/2013 9:03 AM
>>> To: Ed Skoudis
>>> Cc: [email protected]
>>> Subject: Re: [GPWN-list] Pen Testing Lab Images/Systems setup
>>> 
>>> 
>>> On 17 November 2013 13:46, Ed Skoudis <[email protected]> wrote:
>>> > Great stuff, guys!
>>> >
>>> > You also may want to check out the mind map by Aman Hardikar .M.  Great
>>> > stuff.
>>> >
>>> > http://www.amanhardikar.com/mindmaps/Practice.html
>>> >
>>> > He allowed us to put it on the SANS Pen Test poster, and I'm very grateful
>>> > for that.
>>> >
>>> > --Ed.
>>> >
>>> 
>>> If asked last year I'd have suggested MS TechNet as a great way to get
>>> licences for most MS products but they have cancelled that program now
>>> so can't subscribe any more :(
>>> 
>>> I would suggest though looking through some of the MS tutorials on how
>>> to set up their tools, for example this on SharePoint
>>> http://technet.microsoft.com/en-us/library/jj658588.aspx . It tells
>>> you how MS would expect the systems to be set up so gives you a good
>>> idea of the base level for a lot of builds.
>>> 
>>> Robin
>>> 
>>> >
>>> > On Nov 16, 2013, at 11:52 PM, Julian Makas <[email protected]>
>>> > wrote:
>>> >
>>> > We have a couple scenarios in play at my place.
>>> >
>>> > Our "attack lab" has all of the normal pwn-able images (ie. 
>>> > metasploitable,
>>> > DVWA, etc.).
>>> >
>>> > Out "test lab" is 1/2 Fort Knox and 1/2 realistic network based on what we
>>> > are seeing as a norm amongst our clients.
>>> >
>>> > The Fort Knox side is a sudo war games between our admin group and 
>>> > security
>>> > group where the realistic side tries to mimic a common baseline of what we
>>> > see going on in our client networks. This give us some red and blue team
>>> > benefits.
>>> >
>>> > Attack lab is for training.
>>> >
>>> > Hardened and baseline networks are for training and bragging rights but
>>> > mostly used for testing engagement scenarios where we have to step outside
>>> > of the box.
>>> >
>>> > What do you need your lab to do for you? Let you train? Let you test poc 
>>> > and
>>> > new concepts? Crash your lab box before you crash a clients server while 
>>> > on
>>> > an engagement?
>>> >
>>> > It all depends on what you want to do, but you'll eventually want aspects 
>>> > of
>>> > all of these.
>>> >
>>> > - J
>>> >
>>> >
>>> >
>>> > Sent from my iPhone
>>> >
>>> > On Nov 16, 2013, at 7:16 PM, "James Shewmaker" <[email protected]> 
>>> > wrote:
>>> >
>>> >
>>> > On Sat, Nov 16, 2013 at 2:29 PM, Jamil Ben Alluch <[email protected]>
>>> > wrote:
>>> >>
>>> >> Hello,
>>> >>
>>> >> This may be a recurring question, but I still wanted to get some input.
>>> >>
>>> >> What kind of systems do you normally use for your pen-testing labs; more
>>> >> specifically, are there pre-set images that you use for testing
>>> >> vulnerabilities and practice ("Ready-to-Hack" systems)?
>>> >>
>>> >>
>>> > Hi Jamil,
>>> >
>>> > You can get started with vulnhub.com. They have some free (but hosted via
>>> > VPN) pre-configured scenarios, including some you can download. The
>>> > vuln-injector program they have is great for weakening a random Windows VM
>>> > so you can experiment with a closer-to-real-world target. There is also 
>>> > our
>>> > scenario engine, currently in closed beta, at bunker011.com (almost 800
>>> > different hosted VMs)--you could try registering and see if you get 
>>> > invited.
>>> > ;)
>>> >
>>> > It would be interesting to see if you could use the free VPN hosted
>>> > projects, and use dd+netcat to steal them ... Interested, not endorsed!
>>> >
>>> >
>>> > _______________________________________________
>>> > gpwn-list mailing list
>>> > [email protected]
>>> > https://lists.sans.org/mailman/listinfo/gpwn-list
>>> >
>>> > _______________________________________________
>>> > gpwn-list mailing list
>>> > [email protected]
>>> > https://lists.sans.org/mailman/listinfo/gpwn-list
>>> >
>>> >
>>> >
>>> > _______________________________________________
>>> > gpwn-list mailing list
>>> > [email protected]
>>> > https://lists.sans.org/mailman/listinfo/gpwn-list
>>> >
>>> _______________________________________________
>>> gpwn-list mailing list
>>> [email protected]
>>> https://lists.sans.org/mailman/listinfo/gpwn-list
>>> 
>>> _______________________________________________
>>> gpwn-list mailing list
>>> [email protected]
>>> https://lists.sans.org/mailman/listinfo/gpwn-list
>> 
>> 
>> _______________________________________________
>> gpwn-list mailing list
>> [email protected]
>> https://lists.sans.org/mailman/listinfo/gpwn-list
> 
> _______________________________________________
> Pauldotcom mailing list
> [email protected]
> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> Main Web Site: http://pauldotcom.com
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to