Pit 2 - boots a centos (with unprived user autologin so you can control) with a specially-vulnerablized Ubuntu (known as the "metasploitable" distribution) running as a vm (via virtualbox), a version of vulnerable Debian (pWnOS) and another -- slackware-based vulnerable called "damn vulnerable linux infectious disease" (also via virtualbox). Also, there are several "Kioptrix Challenge" virtual machines for your cracking pleasure.
Lastly, the Centos machine has a web server running the "Damn Vulnerable Web Application" (DVWA) -- point your web brower at http://220.127.116.11, and have at it. Attack at will (the Ubuntu, Slackware, Debian or the Centos :-)
centos = 18.104.22.168
ubuntu = 22.214.171.124
slakware = 126.96.36.199
debian = 188.8.131.52
kioptrix challenge 2 = 184.108.40.206
kioptrix challenge 3 = 220.127.116.11
kioptrix challenge 4 = 18.104.22.168
Pit 3 - boots a Windows XPSP2. Attack at will (22.214.171.124)
Please feel free to bring your own laptop to hook into the network and blast away with your own toolset.
We've also added a couple of wireless routers (home-network strength) to perform wireless attack (if desired) testing on them, or as resources for other wireless projects.
Please let us know what success you have (we don't want to set these machines up to infect students! :-) and we'll reinstall back to a known-but-still-vulnerable state.
Note that these machines (tagged as 'Radioactive') must under no circumstances be attached to a rutgers network.