![]() ![]() There could be several uses for such an image: Connect Back Penetration Testing Rig The VPN setup would then allow the attacker to bridge the remote and local networks as well as have access to a full suite of penetration testing tools on the target network. On reboot after the installation completes, Kali would automagically connect back to the attacker using a reverse OpenVPN connection. The idea we had was to build an “unattended self-deploying” instance of Kali Linux that would install itself on a target machine along with a customized configuration requiring no user input whatsoever. In today’s post, we’ll see what it takes to create what we fondly refer to as “The Kali Linux ISO of Doom”. With just a few minor changes to this concept, we can further leverage Kali to create other cool and shiny toys as well. Our scenario covered the installation of a custom Kali configuration which contained select tools required for a remote vulnerability assessment using OpenVAS and the Metasploit Framework. In our last blog post, we provided an example of running an unattended network installation of Kali Linux.
0 Comments
Leave a Reply. |