Setting up remote access
As an aspiring penetration tester, you will be given the opportunity to visit your client’s location to perform a penetration test on their network. This means you will need to have a dedicated computer – preferably a laptop or a mini computer – at the client’s location for ethical hacking and penetration testing. On this system, you can set up remote access such as Secure Shell (SSH) and Remote Desktop Protocol (RDP) to enable you and your team to remotely work without being on-site.
The following are some of my personal recommendations for setting up your penetration-testing machine:
- A laptop running a Microsoft Windows operating system that supports Remote Desktop. Keep in mind that Microsoft Windows is a personal choice, and you are free to use any operating system of your personal preference. Ensure there is support for remote access across a network.
- Ensure the laptop supports BitLocker (available on Microsoft...