PenTest machine configuration (pt2)
Continuing my set of notes on preparing a machine for the CREST registered tester exam. An important disclaimer is that this is set-up the tools that I use for some PenTesting, it is not a recommend set-up for the exam, each candidate need to assemble their own test machine to suit their own methodology.One of the items I set-up was a Windows machine using VirtualBox, this machine is to allow easy access to Windows passed tools to help with attacking Windows targets. The tools I have installed are as follows
- Cain & Abel
- SysInternals suite of tools
- Command here (Power toy)
- WinnFingerprint
- nbtscan
- Scanline
- Netcat
- TFTP 32 server
- hxdef100
- dcomexploit
The last couple are ones that occasionally useful on old unpatched machines, likelihood of needing them is very low but it does hurt to have some old faithfuls around
No comments:
Post a Comment