Skip to content

Easily generate a Windows 10 VirtualBox image with some basic pen test tools pre-included

Notifications You must be signed in to change notification settings

b4dpxl/Win10-PenTestImage

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

17 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Win10 Pen Testing Image

Overview

Packer configuration to create a Windows 10 VirtualBox appliance to be used during penetration testing to connect to a target domain. Pre-populated with common useful tools. It's set for UK keyboard and language. The VM has 4GB RAM, 2 CPU's, and 128MB GPU RAM.

Tools/Utilities

Other

  • VirtualBox Guest Additions, with clipboard enabled and a shared folder to c:\pentest on the host
  • Windows Defender has an exclusion for c:\pentest
  • Explorer file extensions and hidden files should be enabled

Building

Download and extract packer.exe from https://www.packer.io/downloads.html to the root of the cloned repo.

By default it assumes that the Windows 10 ISO is an evaluation copy placed in the repo root folder and named windows_10_evaluation_x64.iso. To change this, edit the iso_url variable at the end of the win10.json file. You might also need to update the iso_checksum variable too. If you're not using an evaluation copy, you'll need to put a key in answer_files/10/Autounattend.xml under the ProductKey. MS provides "installation" keys which won't activate but should be sufficient. See the link in the XML file.

Run the build.bat, and wait. You shouldn't need to interact. It will seem to be doing nothing after it finishes one batch of installs and before WinRM kicks in to finish things off; keep an eye on the logs from the bat file. When it's completed, it should shut down and you should have an .ovf file.

About

Easily generate a Windows 10 VirtualBox image with some basic pen test tools pre-included

Topics

Resources

Stars

Watchers

Forks