RE: Penetration Testing Lab Setup - VMWare

From: Maciolek, David (David.Maciolek@unisys.com)
Date: Fri Mar 07 2003 - 15:20:33 EST


I'm not 100% positive about VMWare ESX, but I know that VMWare GSX does not
take advantage of additional processors. That is to say, you can only have
1 CPU per Virtual Machine. You may be able to set up a hard affinity
between 1 processor and several instances and the second processor and
several other instances. I've never tried this so I'm not sure it's
feasible.

Dave

-----Original Message-----
From: disciple [mailto:marcus@nwnc.net]
Sent: Thursday, March 06, 2003 11:56 PM
To: Discussion Lists; pen-test@securityfocus.com
Subject: RE: Penetration Testing Lab Setup - VMWare

I have also had a great deal of success with VMWare labs. Although I have
found that I peg a 1GHz CPU if I have 2 or more virtual machines running,
with scanning or attacks in action. Has anyone had success with multiple
processor systems running VMWare? Does VMWare take advantage of the
additional processors?

Thanks,

Marcus

-----Original Message-----
From: Discussion Lists [mailto:discussions@lagraphico.com]
Sent: Thursday, March 06, 2003 12:51 PM
To: Indian Tiger; pen-test@securityfocus.com
Subject: RE: Penetration Testing Lab Setup

Hi Indian Tiger,
I have had really good luck with VMWare. It is great for setting up
various Linux/Windows platform configurations, and saving them, then
re-using them later. You will need a LOT of HD space, and a TON of RAM
for them though if you plan on setting up anything complex. I have been
able to set up entire company networks including (believe it or not)
firewalls, mail servers, clients even home-grown routers (of the linux
flavor). I can set those machines so that they have restore points, so
that anything I do to them can be undone. If you run out of RAM on the
host machine, you just get another host machine and start running more
virtual machines on it. Stick them all on a hub, and set up a separate
"test machine" on the same hub with all of your penn-test tools, and
start hammering away.

> -----Original Message-----
> From: Indian Tiger [mailto:indiantiger@mailandnews.com]
> Sent: Wednesday, March 05, 2003 10:59 PM
> To: pen-test@securityfocus.com
> Subject: Penetration Testing Lab Setup
> Importance: High
>
>
> Hi All,
>
> My management asks me to give detailed requirements for
> Penetration Testing
> lab setup. Same Lab I would like to utilize for Computer
> Crime Investigation
> as well. Currently we are following OSSTMM as baseline for
> Penetration
> Testing.
>
> Any suggestions, comments highly appreciated.
> Thanking You.
>
> Sincerely,
>
> Indian Tiger, CISSP
>
>
> --------------------------------------------------------------
> --------------
>
> Are your vulnerability scans producing just another report?
> Manage the entire remediation process with StillSecure VAM's
> Vulnerability Repair Workflow. Download a free 15-day trial:
> http://www2.stillsecure.com/download/sf_vuln_l> ist.html
>
>

----------------------------------------------------------------------------

Are your vulnerability scans producing just another report?
Manage the entire remediation process with StillSecure VAM's
Vulnerability Repair Workflow.
Download a free 15-day trial:
http://www2.stillsecure.com/download/sf_vuln_list.html

----------------------------------------------------------------------------

Are your vulnerability scans producing just another report?
Manage the entire remediation process with StillSecure VAM's
Vulnerability Repair Workflow.
Download a free 15-day trial:
http://www2.stillsecure.com/download/sf_vuln_list.html

----------------------------------------------------------------------------

Are your vulnerability scans producing just another report?
Manage the entire remediation process with StillSecure VAM's
Vulnerability Repair Workflow.
Download a free 15-day trial:
http://www2.stillsecure.com/download/sf_vuln_list.html



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:53:30 EDT