Technical requirements
In this chapter, we made use of the following software and OSes:
- For virtualization: VMWare Workstation 12 Player for virtualization (any version can be used)
- Download codes used in this chapter from the following link: https://github.com/PacktPublishing/Mastering-Metasploit/tree/master/Chapter-9
- For 9enetration testing: Kali Linux 2020.1 as a pentester's workstation VM that has an IP of 192.168.204.143
You can download Ubuntu from https://www.kali.org/downloads/.
- For C Wrappers and Python Compilation: Windows 10 with Visual Studio 2013:
Burp Suite (https://portswigger.net/burp/communitydownload)
Python 2.7 (https://www.python.org/downloads/release/python-2717/)
PIP (python get-pip.py) (https://bootstrap.pypa.io/get-pip.py)
Pyinstaller (pip install python)
- Files for this chapter: https://github.com/PacktPublishing/Mastering-Metasploit/tree/master/Chapter-9
- Target 1 (Windows 10):
Windows 10 with Qihoo 360 Antivirus (https://www.360totalsecurity...