A Cracking the Perimeter journey: 1 - My Own lab
During those days I’m spending in the mountains with my family, I’m studying module 3 and 4 about backdooring executable with custom payloads and avoiding anti-viruses based on signature detection.
Since I don’t have a reliable Internet connection I choose to replicate Offensive Security lab on a VirtualBox installation here on my laptop.
For anyone loving about tech details, my laptop is an Ubuntu Budgie Dell XPS 13 inches 2018 edition. CPU is an Intel i7 8th generation processor with 16 GB of RAM.
Since I don’t have any issues about playing with various virtual machines at a time, I create the following mini-lab:
- a Kali Linux machine to be used as an attacking platform. I choose Kali just for sake of convenience and since the Offensive Security program is based on Kali / Backtrack
- a Windows XP SP3, Italian edition
- a Windows 7 SP 1, Italian and 32-bit edition
In order to practice with backdooring I downloaded and installed the following:
- TFTPD server 32 bit
- AVG antivirus
- OllyDB debugger
- XVI as hexdecimal editor
- LordPE to edit EXE executable file header
I think having a laboratory available either offline is a good deal. I strongly suggest anyone is having the Cracking the Perimeter journey to install a lab too.