How to Start Ethical Hacking with windows(commando)

For security researcher or ethical hackers almost prefer to use Linux .In Linux is the home of the Ethical hackers.whenever they would do ethical hacking they will most probably go for the Linux instead of windows.Now FireEye company of security experts has developed new tool.The tool is name by Commando Vm.

Commando vm will provide the environment for the ethical hackers or pentester on the windows machine. Commando Vm uses boxstarter , chocolatey , Myget packages to install software.It provides many tools and utilities to support the ethical hacking or pentesting.
In the Commando vm there are more 140 tools which include some the famous tools

  • Nmap
  • Hashcat
  • minizkatz
  • sysinternals
  • go

How to install commando Vm?
we would start with the requirement of the commando Vm

2 Gb ram
6 Gb hard disk.

https://github.com/fireeye/commando-vm


First you have to configure the virtual machine .make sure it is updated completely.

Download and copy install.ps1 on your newly configured machine.
Open Power Shell as an Administrator on your machine.
Enabling the script execution by this commands.

Set-ExecutionPolicy Unrestricted

https://github.com/fireeye/commando-vm

Finally, execute the installer script

.\install.ps1
You can also have  your password as an argument: .\install.ps1 -password 

that’s it ,rest of the task will be handled automatically.you will be asked for password of the administration during the installation.If you haven’t setup password the you can simply press enter.Installation might take longer time depending upon your internet speed.


Number of ethical hacking tools installed in the commando vm

  • Remote Server Administration Tools (RSAT)
  • SQL Server Command Line Utilities
  • Sysinternals
  • Covenant
  • PoshC2
  • WMImplant
  • WMIOps
  • Dep
  • Git
  • Go
  • Java
  • Python 2
  • Python 3 (default)
  • Visual Studio 2017
  • Build Tools (Windows 10)
  • Visual Studio Code
  • CheckPlease
  • Demiguise
  • DotNetToJScript
  • Invoke-CradleCrafter
  • Invoke-DOSfuscation
  • Invoke-Obfuscation
  • Invoke-Phant0m
  • Not PowerShell (nps)
  • PS>Attack
  • PSAmsi
  • Pafishmacro
  • PowerLessShell
  • PowerShdll
  • StarFighters
  • ADAPE-Script
  • API Monitor
  • CrackMapExec
  • CrackMapExecWin
  • DAMP
  • Exchange-AD-Privesc
  • FuzzySec’s PowerShell-Suite
  • FuzzySec’s Sharp-Suite
  • Generate-Macro
  • GhostPack
  • Rubeus
  • SafetyKatz
  • Seatbelt
  • SharpDPAPI
  • SharpDump
  • SharpRoast
  • SharpUp
  • SharpWMI
  • GoFetch
  • Impacket
  • Invoke-ACLPwn
  • Invoke-DCOM
  • Invoke-PSImage
  • Invoke-PowerThIEf
  • Kali Binaries for Windows
  • LuckyStrike
  • MetaTwin
  • Metasploit
  • Mr. Unikod3r’s RedTeamPowershellScripts
  • NetshHelperBeacon
  • Nishang
  • Orca
  • PSReflect
  • PowerLurk
  • PowerPriv
  • PowerSploit
  • PowerUpSQL
  • PrivExchange
  • Ruler
  • SharpExchangePriv
  • SpoolSample
  • UACME
  • impacket-examples-windows
  • vssown
  • ADACLScanner
  • ADExplorer
  • ADOffline
  • ADRecon
  • BloodHound
  • Get-ReconInfo
  • GoWitness
  • Nmap
  • PowerView
  • Dev branch included
  • SharpHound
  • SharpView
  • SpoolerScanner
  • Citrix Receiver
  • OpenVPN
  • Proxycap
  • PuTTY
  • Telnet
  • VMWare Horizon Client
  • VMWare vSphere Client
  • VNC-Viewer
  • WinSCP
  • Windump
  • Wireshark
  • ASREPRoast
  • CredNinja
  • DSInternals
  • Get-LAPSPasswords
  • Hashcat Internal-Monologue
  • Inveigh Invoke-TheHash
  • KeeFarce
  • KeeThief
  • LAPSToolkit
  • MailSniper
  • Mimikatz
  • Mimikittenz
  • RiskySPN
  • SessionGopher
  • DNSpy Flare-Floss
  • ILSpy PEview
  • Windbg x64dbg
  • 7zip
  • Adobe Reader
  • AutoIT Cmder
  • CyberChef
  • Gimp Greenshot
  • Hashcheck
  • Hexchat HxD
  • Keepass
  • MobaXterm
  • Mozilla Thunderbird
  • Neo4j Community Edition
  • Pidgin
  • Process Hacker 2
  • SQLite DB Browser
  • Screentogif
  • Shellcode Launcher
  • Sublime Text 3
  • TortoiseSVN
  • VLC Media Player
  • Winrar
  • yEd Graph Tool
  • Egress-Assess
  • Grouper2
  • zBang
  • Burp Suite
  • Fiddler
  • Firefox
  • OWASP Zap
  • FuzzDB
  • PayloadsAllTheThings
  • SecLists
Commando VM 

Read :Best Female hackers ?

Leave a Reply

Your email address will not be published. Required fields are marked *