The scenario for this LiveCD is that you have been given an assignment to test a company's 192.168.2.xxx network to identify any vulnerabilities or exploits. The systems within this network are not critical systems and recent backups have been created and tested, so any damage you might cause is of little concern. The organization has had multiple system administrators manage the network over the last couple of years, and they are unsure of the competency previous (or current) staff2
PenTest Lab Disk 2.100: This LiveCD is configured with an IP address of 192.168.2.100 - no additional configuration is necessary.
Your second system will use the BackTrack (v.2) LiveCD as provided by remote-exploit.org. A copy of the LiveCD can be downloaded from remote-exploit.org. This disk is configured to obtain an IP address through DHCP - thus no additional configuration is required. All tools necessary to exploit Disk 2.100 can be found on the BackTrack Disk. No additional installations will be necessary.
The PenTest Lab system and the PenTest machine must connect to a router that has been configured with the following values:
- DHCP Server: active
- Pool Starting Addr.: 192.168.2.2
LAN TCP/IP: + IP Address: 192.168.2.1 + IP Subnet Mask: 255.255.255.0
Where to get the current PenTest Lab Level 2 disks:
Disk 2.100 version 1.1: http://heorot.net/instruction/tutorials/iso/de-ice.net-2.100-1.1.iso
Where to find the hash values of the disks:
Where to get the BackTrack disk:
http://remote-exploit.org/backtrack_download.html Warning: BackTrack v. 3 beta is known to NOT work. Please use version 2
Where to get the network configuration information:
Network configuration: 192.168.2.xxx = http://forums.heorot.net/viewtopic.php?f=18&t=91