Stuck In The Past? How to Create Vulnerable Machines With Current Operating Systems

Do you feel like you're still stuck in the last decade with your penetration testing lab? Most pre-packaged vulnerable machines you can download are built on vastly outdated operating systems and applications. Although this may be a great starting point if you're getting started with penetration testing, they don't provide a contemporary, realistic training ground. In his webcast, Matt Barrett starts with the question "How can I quickly set up vulnerable machines based on current operating systems" and takes you through the hands-on process for creating vulnerable machines for their labs that mirror what you would see in today's organizations.

In this technical webcast for network engineers and security professionals, participants will learn how to:

  • Efficiently create vulnerable machines based on current Windows and Linux versions
  • Set up, identify and exploit specific vulnerabilities in the lab
  • Go beyond exploiting standard vulnerabilities such as MS08-067

Speaker:
Matt Barrett, Senior Consultant, Rapid7

Matt Barrett is a Senior Consultant on Rapid7’s Security Solutions team, specializing in Metasploit, the world’s leading penetration testing tool. Prior to this position, Matt was a corporate trainer for the Nexpose vulnerability management solution in Rapid7’s professional services organization. Matt is a regular blogger and frequent speaker who engages with the security community at events ranging from local chapter meetings to international conferences. Matt holds the Network+ and Security+ certifications, and is a Certified Nexpose Expert.

On-Demand Webcast

To watch this on-demand webcast, fill out the form below!