Pentest and Virtual Hacking Lab

Source and Credits to

Prtablegm from hackforums.net


Pentest and Virtual Hacking Lab

This Thread will expose you to different types of physical and virtual computer systems for a various degrees of needs. If it were to be for testing protocol analyzers,scanners,intrusion detection systems,penetration tools (including ethical/non ethical tools),studying certification studies,to R.A.T.s. Let be for helping you with certain techniques,testing how a program or exploit may work,deploying new software or solutions,analyzing new Internet worms and threats or testing one’s own exploits,viruses,codes and observe the results before using them in a real situation.To understanding how to attack and or defend a system or network.Your imagination is the limit to what you can do with a Test Lab. This keeps one from damaging the real network and systems, so if anything does go wrong, one can begin from first principles, without any consequences.
A Test Lab is usually an isolated part of one’s network. It includes servers, clients and devices with their services, to simulate a complete working network. These computers and networks can be completely simulated ones or every single node of this Test Lab can be an actual machine.The objective of this thread is to help one design one’s own Test Lab, install the required operating systems and devices, install required services and begin working on them. This way one can perform tasks mention earlier. This also is being used to help myself in this field. To better understand and explore the possibility. I do hope, in the end, this becomes the one place people go to for Lab info.
Lets Begin!

Distros
I stopped on the Distro listing. I am sure you get the hint.

Just so it is understood,it is your knowledge that makes you who you are. Not the Distro,OS,or the tools. I believe the more knowledge and information related to this field, the greater discoveries are made. Learn how it works and operates,and you will find the answers.
Any of this tools can go on the OS of your desire. Everyone has a preference. Find what works for you.


Pentest Labs

[Image: ACr3n]
(graphics done by the Graphic God himself Cains)

Metasploit Unleashed Windows XP
Download Info Back-up
Windozer Fresh VM Install
(no services installed)
Click on me for list (Click to View)

[Image: CZJWI]
10.6.6 Download

Virtual Routers and Switches
List here (Click to View)

Vm Image Mac spoofing without tools Click here



Linux VM's to Test against

This is a large list. You have been warned. (Click to Hide)
[Image: centos-logo.gif]
CentOS 4.6, server install
md5sum: a23b88a9db64e3dce27b8b11b02c0cc5
Notes: root password is "thoughtpolice".
Download

CentOS 4.7, server install
md5sum: 81eeeb86168a971aed6092b0c041b467
Notes: root password is "thoughtpolice".
Download

CentOS 4.8, server install
Notes: Login as user "root", password is "thoughtpolice"
32-bit md5sum: 25dd0d9838cde9840d862c53fd92cd15
Download

64-bit md5sum: 3e8627d0b36b2a37db105606b65848ea
Download

CentOS 5.0, server install
md5sum: 0cbe6c9551d32483e4e84ed0f87f69ee
Notes: root password is "thoughtpolice".
Download

CentOS 5.1, server install
md5sum: b082495b1a01a854c88723967e614cd6
Notes: root password is "thoughtpolice".
Download

CentOS 5.2, server install
md5sum: 4c31ce20e97de313647a809219788a77
Notes: root password is "thoughtpolice".
Download

CentOS 5.3, server install
Notes: Login as user "root", password is "thoughtpolice"

32-bit md5sum: aa9972661a1f6e42b4056a38f0a18854
Download

64-bit md5sum: e3253bcd4c47fe8dc5bbdb4442c08971
Download

CentOS 5.4, server install
Notes: Login as user "root", password is "thoughtpolice"

32-bit md5sum: 67cae177842ef0533c6ca604cddeec53
Download

64-bit md5sum: d82cbced59652025dc9e51078dd0e39e
Download

CentOS 5.5, server install
Notes: Login as user "root", password is "thoughtpolice"

32-bit md5sum: 88d83680c1388e6e5c15ca855e934bc0
Download

64-bit md5sum: be094e47afbb819a9918f4e5340e4f04
Download
[Image: debian.png]

Debian Sarge (Debian 3.1), minimal (netinstall) version
md5sum: a2f41713f9f7407a9a3e43fb27fd2e24
Notes: root password is set at first boot.
Download

Debian Etch (Debian 4.0), minimal (netinstall) version
md5sum: 2a1cb887f658701c0b1ff095600ee6f9
Notes: There are two accounts: "root" and "notroot". Password for both is "thoughtpolice".
Download

Debian Lenny (Debian 5.0), minimal (netinstall) version
Notes: There are two accounts: "root" and "notroot". Password for both is "thoughtpolice".

32-bit md5sum: 35a21a670c680f7fd40da0fd8bb5f3b7
Download

64-bit md5sum: 4d6d05196d38bc3eb0b47063918fd067
Download

[Image: fedora_logo_bigger.jpg]

Fedora Core 4 (Stentz), minimal install.
md5sum: 8e46e5ac5fe813cf83454febed2cfdef
Notes: root password is "thoughtpolice". Remember that a standard install means selinux enabled, firewall on.
Download

Fedora Core 5 (Bordeaux), standard install
md5sum: 16642a65686a6fb5b283d34e1c359662
Notes: root password is "thoughtpolice"
Download

Fedora Core 6 (Zod), standard install
md5sum: 8e94dd615280c8aa82129c325c6c8add
Notes: root password is "thoughtpolice"Down will be up again later
Download

Fedora 7 (Moonshine), standard install
md5sum: 8e94dd615280c8aa82129c325c6c8add
Notes: root password is "thoughtpolice"
Down will be up again later

Fedora 8 (Werewolf), standard install
md5sum: 102fe7c3b01a22a462f718a3fbc81068
Notes: root password is "thoughtpolice"
Download

Fedora 9 (Sulphur), standard install
md5sum: aad622763be3508a33aa90ea316d49ae
Notes: root password is "thoughtpolice"
Download

Fedora 10 (Cambridge), standard install
md5sum: f417a4e0317cfdc0778bfaa484eda38b
Notes: root password is "thoughtpolice"
Download

Fedora 11 (Leonidas), standard install
Notes: Login as user "root", password is "thoughtpolice"

32-bit md5sum: 5fd954f77a4bd5d752b49438f51630a9
Download

64-bit md5sum: 33396a7b703ed2db8c05e5ca6080a8d6
Download

Fedora 12 (Constantine), standard install
Notes: Login as user "root", password is "thoughtpolice"

32-bit md5sum: 4a959a99cbac08a10fd12d445664cbae
Download

64-bit md5sum: a0285962e9c444e7c0ff5a20c2a83037
Download

Fedora 13 (Goddard), standard install.
Notes: Login as user "root", password is "thoughtpolice"

32-bit md5sum: 4164318be15c0090054b0bea05640ae9
Download

64-bit md5sum: 0c26e8397a7f47c6f1b0aa5836b51333
Download

Fedora 14 (Laughlin), standard install.
Notes: Login as user "root", password is "thoughtpolice"

32-bit md5sum: 48e2f08d6f35ff548657b72c83fbea70
Download

64-bit md5sum: befa1167796673b763f77e2d3f01bc93
Download

[Image: freebsd.gif]

FreeBSD 6.0, minimal install.
Notes: root password is "thoughtpolice"

md5sum: 505718f94ae67c4c8db22784b27a91f2
Download

FreeBSD 6.1, user install.
Notes: root password is "thoughtpolice"

md5sum: 9a591ab3447e8781a27a4b5151acc121
Download

FreeBSD 6.2, user install
Notes: root password is "thoughtpolice"

md5sum: 5a78b8c7074f9ccd755d43e177e14b39
Download

freebsd-6.3-i386,user install.
Notes: root password is "thoughtpolice"

md5sum: 5b05a4218799db57eebe6b0dd88f2fa0
Download

Freebsd 6.4,user install.
Notes: root password is "thoughtpolice"
Note: SCSI disk (unlike the other 6.x releases)!

md5sum: d5d99356b840d34c22d44744281f678f
Download

FreeBSD 7.0, user install
Notes: root password is "thoughtpolice"

md5sum: 76edfb287ce8b66c7c404d9488427321
Download

FreeBSD 7.2, user install.
Notes: Root password is "thoughtpolice"

32-bit md5sum: 449dc7ef6ee3770c2a79a69399258fc4
Download

64-bit md5sum: 1ad9fbe9a885e8fe7fc24036a37a090f
Download

FreeBSD 7.3, user install.
Notes: Root password is "thoughtpolice"

32-bit md5sum: 3a4589fa5a35163850d4a8529bc088fe
Download

64-bit md5sum: 0d76add0103f4589d0efcb67f770480d
Download

FreeBSD 7.4, user install.
Notes: Root password is "thoughtpolice"

32-bit md5sum: 1dc0aaca0c54e87311510cedccdc656b

64-bit md5sum: 3003ba4494b66e34c0d0cdb7e9659168

FreeBSD 8.0, standard install.
Notes: Root password is "thoughtpolice"

32-bit md5sum: 7636347fb546bf66b19bc9267c992bb8
Download

64-bit md5sum: 5c9487fc19f4112f673915b350979e19
Download

FreeBSD 8.1, standard install.
Notes: Root password is "thoughtpolice"

32-bit md5sum: 977f93feb55c09184b5e7dc02c70f1b6
Download

64-bit md5sum: 684a435c82230b8d7d165573006fa920
Download

FreeBSD 8.2, standard install.
Notes: Root password is "thoughtpolice"

32-bit md5sum: d118c69806c92c14b7629693387e3c7a

64-bit md5sum: 3d7a88dc0e68db6310ead029f33dc928

(more to come-If impatient got to this site)


[Image: webpentestar.jpg]
Webtest Labs

Click on me for list (Click to View)

Live Web sites to test against. Intrusion detection system (IDS)
Network security toolkit appliance
Download 2.15
EasyIDS Download 0.4
Security OnionDownload 20111103
Shadow IDS Download 32bit v7.1
Shadow IDS Download 64bit v7.1
Security Information and Event Management (Siem live) Download 1.1
Smooth-Sec Download 1.2
Snorby Spsa Download 1.5

Note:
If the links are not working, Try finding the links using google search.



Welcome to My team mate Praveen

Dear friends,

I welcome my team mate(*.* Null) praveen to this blog, who is going to help me out posting good posts.

Welcome Praveen.

Cheers!!

Saba

Metasploitable 2.0

Metasploitable 2.0


Before Starting Metasploitable 2.0 Please setup the Pentesting lab, use the below link to setup the lab

http://www.metasploit.com/help/test-lab.jsp

Metasplotable 2.0 Introduction

The Metasploitable virtual machine is an intentionally vulnerable version of Ubuntu Linux designed for testing security tools and demonstrating common vulnerabilities. Version 2 of this virtual machine is available for download from Sourceforge.net and ships with even more vulnerabilities than the original image. This virtual machine is compatible with VMWare, VirtualBox, and other common virtualization platforms. By default, Metasploitable's network interfaces are bound to the NAT and Host-only network adapters, and the image should never be exposed to a hostile network

Download:
https://sourceforge.net/projects/metasploitable/files/Metasploitable2/
Torrent: http://thepiratebay.se/torrent/7351991/Metasploitable_Linux_2.0.0

Metasploit Exploitability Guide:
https://community.rapid7.com/docs/DOC-1875

Metasploitable Tutorials and Videos:

http://www.securitytube.net/video/1160
http://www.whenisfive.com/2011/11/16/metasploitable-guide-part-1-rooting-metasploitable/
http://www.whenisfive.com/2011/11/20/metasploitable-guide-part-2-easy-shells/
http://www.whenisfive.com/2011/11/23/metasploitable-guide-part-3-exploiting-tomcat-mysql-and-tikiwiki/
http://www.whenisfive.com/2011/11/27/metasploitable-guide-part-4-exploiting-distributed-c-compiler-and-bruteforcing-postgresql/
http://www.youtube.com/watch?v=THxLX1gdZys
http://www.youtube.com/watch?v=ANJiPanbYFo


Global CyberLympics - Star.star Null team wins first round

our team Star . Star Null team advanced to second level in 

Global CyberLympics