What should you bring?
- a laptop, complete with additional power source (power adapter, additional battery, solar panels, etc.) and functioning wireless NIC
- primary network access will be via wireless access point - your donation confirmation email (a hard copy will help expedite check-in at the event -- again, this is for some basic donation verification)
- donation/registration how-to, in case you missed it - the MetaSploit Framework (MSF), in the form of one of the following:
- installed on your laptop (or the VM from which you intend to perform your attacks)
- MSF installer: http://www.metasploit.com/framework/download/ (v3.3 released 17 Nov 2009!) - a BackTrack session, by either:
- booting your laptop (or a VM) from a live BackTrack CD/DVD, and then performing updates*
- installing BackTrack onto your laptop or a VM on your laptop, and then performing updates*
- BackTrack install/live CD: http://www.remote-exploit.org/backtrack_download.html
* Performing back|track 4 updates: "If you are using back|track 4 as your platform, you can always update to the latest version of the trunk by issuing a 'svn up' in the '/pentest/exploits/framework3/' directory."What we will provide you:
- two (2) attack target systems per attendee -- one (1) Windows XP SP2 guest, and one (1) Ubuntu Server 7.04 guest, as described in the "Required Materials" section of the Metasploit Unleashed page
- these attack target guests will:- be housed on VMware hosts, so you need not host these on your laptop
- have the prescribed configurations made and packages installed
- be on the previously mentioned internal network
- be housed on VMware hosts, so you need not host these on your laptop
- DHCP address(es) on the internal network for your laptop/attack system
- internet access via the internal network
- the rest of the items mentioned in the charity event announcement (A sense of community, a networking opportunity, instruction from local security professionals, an attack lab, lunch, and you assist in Johnny's life-saving mission)
Additional notes:
- Please have your attack machine functional/ready (tool kits, wireless networking, etc.) to go before arriving. This event focuses on using the Metasploit Framework (MSF)
- This is not a switch/router/WAP attack session -- the gear involved in the attack lab is necessary infrastructure for everyone
This comment has been removed by a blog administrator.
ReplyDelete