in , , ,

Creating a client virtual machine

Web Application Penetration Testing – Creating a client virtual machine

Creating a client virtual machine – Hacking Website

When we get to the man in the middle (MITM) and client-side attacks, we will need another machine to make requests to the already set up server. In this recipe, we will download a Microsoft Windows virtual machine and import it to VirtualBox.

Kali Linux Revealed: Mastering the Penetration Testing Distribution

How to do it…

1. First we need to go to the download site Vms.

2. Through this book we will use the IE8 on Win7 virtual machine.

3. After the file is downloaded, we need to unzip it. Go to where it was downloaded.

4. Right-click on it and then click on Extract Here.

5. Once extracted, open the .ova file and import it in VirtualBox.

6. Now, start the virtual machine (named IE8 – Win7) and we will have our client ready:

How it works…

Microsoft provides these virtual machines for developers to test their applications with the help of different versions of Windows and Internet Explorer with a free license limited to 30 days, which is enough for us to practice.

As penetration testers, it is important to be aware that real-world applications can be multiplatform and that users of those applications may have a lot of different systems and web browsers to communicate with them; knowing this, we should be prepared to perform successful tests with any of the client-server infrastructure combinations.

See also

As for server and client virtual machines, if you are not comfortable using an already built configuration, you can always build and configure your own virtual machines. Here is some information about how to do it: Virtualbox.

If you have encountered a problem or you have any questions or remarks please feel free to set a comment.

If this article helped you to solve your problem please feel free to share it with your friends … with love and prosperity K4LINUXTEAM.

With Love and Prosperity K4LINUX-TEAM.


What do you think?

1078 points
Upvote Downvote

Total votes: 2

Upvotes: 1

Upvotes percentage: 50.000000%

Downvotes: 1

Downvotes percentage: 50.000000%

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Web app penetration testing with kali linux

Creating a vulnerable virtual machine

Web application penetration testing with kali linux

Configuring virtual machines for correct communication – Web App Penetration Testing