Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


Looking for a VPS with Security friendly host
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

Looking for a VPS with Security friendly host

MosephMoseph Member
edited August 2018 in Requests

Hello,

As the title says, I'm a security analyst in search a good deal on a VPS with a host that's tolerant of security work (e.g. if having "hacking tools" is against your AUP please don't reply). That said, when I use these tools, they are benign and only used against machines I am authorized to test. If you permit port scanning in this context please mention that (otherwise I am prepared to perform port scans from a different machine).

CPU x2 (or more)
KVM
2 to 4 GB RAM
50GB SSD
IPv4 x 2 (no ports filtered)
500 GB Bandwidth
500 Mbps

Location: North American (with good connection to S.America and Europe)

Budget: $80/yr (or less) billed quarterly or yearly

Thanks for your attention

Comments

  • JohnMiller92JohnMiller92 Member
    edited August 2018

    The end is nigh. We must repent

  • deankdeank Member, Troll
    edited August 2018

    The end has arrived.

    "Security friendly" my arse. More like hacking friendly.

  • Moseph said: North American (with good connection to S.America and Europe)

    You're going to do transcontinental pen testing? Yeah I'm suspicious too.

    Thanked by 1Aidan
  • @willie said:

    Moseph said: North American (with good connection to S.America and Europe)

    You're going to do transcontinental pen testing? Yeah I'm suspicious too.

    Dang it @willie, you caught me! I'm really a criminal blackhat hacker looking to legally purchase time on a server, and kindly warning the owners of my intentions... because us hackers are considerate like that 🙄

  • Thanks BTW to everyone sending me offers via PM. I meant to add to my request, if hosts prefer to contact me privately, that's fine by me.

  • have you tried vps

  • Awmusic12635Awmusic12635 Member, Host Rep

    vpsuser said: have you tried vps

    ?

  • deankdeank Member, Troll

    Have you not tried vps?

  • feezioxiiifeezioxiii Member, Host Rep

    At least, this guy is honest :\

    Thanked by 1Hukin
  • @vpsuser said:
    have you tried vps

    Not sure which VPS provider you are referring to... vps.net ?

  • @feezioxiii said:
    At least, this guy is honest :\

    Thanks for recognizing that @feezioxiii . After I select a hosting provider I'm tempted to post another Request, with what an actual criminal hacker would be looking for (non-extradition country, accepts stolen CCs, price is "no problem" because they "only need it for a week or two", TOR access, etc.). I'd be curious if it'd get any different reaction at all.

  • cubedatacubedata Member, Patron Provider

    @Moseph said:

    @feezioxiii said:
    At least, this guy is honest :\

    Thanks for recognizing that @feezioxiii . After I select a hosting provider I'm tempted to post another Request, with what an actual criminal hacker would be looking for (non-extradition country, accepts stolen CCs, price is "no problem" because they "only need it for a week or two", TOR access, etc.). I'd be curious if it'd get any different reaction at all.

    of course you would, so reading the security friendly code of conduct would tell you that.

  • MosephMoseph Member
    edited August 2018

    Thanks @cubedata, good to know my threads mere existence shows the moderators have successfully determined it differs from a shady-hacker request. Good job! I'm glad there are some here that can "tell a hawk from a handsaw".

    (pardon me now while I change my sig to say "port scanning is not a crime") :tongue:

  • MosephMoseph Member
    edited August 2018

    Note for Security Professionals: If you're looking for hosting similar to my request, by far the most friendly, reasonable, professional and positive responses to my requests thus far (both from this post and direct correspondence) has come from:

    • Digital Ocean (known reputation in security community as pro-security)
    • Frantech / BuyVM (Response: "No problem", plus overtly pro-TOR <- good sign of cluefullness)
    • Linode (Response: "No problem, but help us respond to any abuse reports")
    • Vultr (Response: "Tools ok, but no port scanning")

    You can see from this list that apparently in North America you need to deal with pretty large hosting providers before you find operators that know the difference between a Security Tester and a "1337 H4x0r". The outstanding exception to that is @Francisco at Frantech, who has my total respect for having the same level of maturity as competitors many times larger than him.

    Several European hosting providers also responded to my requests, so it appears to me that in Europe it's easier to find providers open to hosting Security Professionals. I have no idea whether that's from a maturity standpoint or just devil-may-care nonchalance, but the fact remains.

    Hope this note is of help to my contemporaries.

    Thanked by 1Francisco
  • jsgjsg Member, Resident Benchmarker
    edited August 2018

    @Moseph said:
    ..."hacking tools"

    It might be helpful to tell us more about those and about why you can't simply do your "Security Professional" tests from your office. Poor DSL?

    (Sidenote: being pro-Tor probably indicates interest and good will but real IT security professionals would hardly have that in their book under "professional security", at least not anymore).

  • Good question @jsg! I would also like to know what "hacking tools" refers to. It's the phrase used in several hosting providers' AUP/ToS. But I'm pretty sure Burp Collaborator, Metasploit, Responder etc. could qualify. That stipulation means at any time a host could terminate the service I've paid for, wasting my money and, more importantly, time spent configuring the box. Using a phrase such as "no unauthorized use of hacking tools" would seem more reasonable, but that's not the wording they're requiring me to agree to, so I'm not willing to risk it.

    I work from home, as do all the Security Analysts at my company. Our company provides us with AWS instances for our testing, however for side-work it would be inappropriate to use those resources. Hence my search for a LEB to use for doing side-work. Many test scenarios benefit from an unfiltered interface directly connected to the internet (which is why I'm searching for a host with 2 IP addresses). Since such a box would also be unprotected, having it isolated from any network containing sensitive information is of value.

    (Note on your Sidenote: Agreed. Thus why I noted being TOR friendly as a "sign of cluefulness", meaning he appears to not be afraid of things simply because they can be used for illegal purposes, but recognizes there are legitimate uses for them too (much like "hacking tools"). But I agree, running a TOR node has never been a requirement in any test case I've encountered.

  • hzrhzr Member

    AWS allows legitimate pentesting as long as you have written permission from all parties involved and added to their portal (they have a dedicated page for this).

    Thanked by 1willie
  • jsgjsg Member, Resident Benchmarker
    edited August 2018

    @Moseph

    Thanks for your elaborate answer! I think it might help to understand your request better.

    Wrt quite many providers disliking anything even remotely associated with hacking (no matter the colour of the hat) I think it's mainly due to 2 reasons: (a) legal issues and (b) fear of revenge by hacked victims (and possibly "burnt IPs").

    Another problem I guess is the fact that black hats rarely don't announce their plans but rather talk about "security testing" and such. Accordingly your chances would probably increase if you were able to clearly show that you do white hat stuff and with permission. The way you introduced your request is a quite good start IMO.

    Btw, based on the feedback you reported I'd advise you to have a good look at @Francisco who is a well respected provider with a good reputation around here. Plus he is not a super heavyweight like the others you listed; based on my personal experience it's easier to establish a good understanding and working relationship with mid-size providers. Francisco fits that quite well from what I know.

  • MosephMoseph Member
    edited August 2018

    hzr said: AWS allows legitimate pentesting as long as you have written permission from all parties involved and added to their portal (they have a dedicated page for this).

    Yep, have filled out many AWS forms for my work. AWS is probably the most expensive solution to my request.

    At this point I'm leaning towards Linode. They responded pleasantly to my requests and have low latency in the Americas. I was hoping to find a LEB that would work out, but doesn't look like it's going to happen.

    Any final offers feel free to PM me.

  • jsg said: based on the feedback you reported I'd advise you to have a good look at @Francisco who is a well respected provider with a good reputation around here. Plus he is not a super heavyweight like the others you listed; based on my personal experience it's easier to establish a good understanding and working relationship with mid-size providers. Francisco fits that quite well from what I know.

    Totally agree, I'd really like to support a smaller progressive operation like @Francisco has going, if he wants to send me an offer I'm all ears.

Sign In or Register to comment.