Packer configuration to create a Windows 10 VirtualBox appliance to be used during penetration testing to connect to a target domain. Pre-populated with common useful tools. It's set for UK keyboard and language. The VM has 4GB RAM, 2 CPU's, and 128MB GPU RAM.
- Chrome
- Windows Terminal (beta)
- Telnet
- 7-Zip
- git
- notepad++
- SysInternals (under c:\pentest):
- Github Repos (under c:\pentest):
- RSAT
- Advanced IP Scanner
- VirtualBox Guest Additions, with clipboard enabled and a shared folder to c:\pentest on the host
- Windows Defender has an exclusion for c:\pentest
- Explorer file extensions and hidden files should be enabled
Download and extract packer.exe from https://www.packer.io/downloads.html to the root of the cloned repo.
By default it assumes that the Windows 10 ISO is an evaluation copy placed in the repo root folder and named windows_10_evaluation_x64.iso. To change this, edit the iso_url
variable at the end of the win10.json
file. You might also need to update the iso_checksum
variable too. If you're not using an evaluation copy, you'll need to put a key in answer_files/10/Autounattend.xml
under the ProductKey
. MS provides "installation" keys which won't activate but should be sufficient. See the link in the XML file.
Run the build.bat, and wait. You shouldn't need to interact. It will seem to be doing nothing after it finishes one batch of installs and before WinRM kicks in to finish things off; keep an eye on the logs from the bat file. When it's completed, it should shut down and you should have an .ovf file.