My Poor Victim VM

I say poor - this vm has malware run on it, gets reset to the secure snapshot image repeatedly, and I run exploits on this victim machine from a Kali instance. This isn’t just a victim machine however, it also has security tools downloaded for analyzing malware.

This post is about the virtual Windows XP machine that I have set up over time, adding reversing tools and security tools.


What’s installed

Reversal/Security Tools

  • Procmon(Sysinternals)
  • Resourcehacker
  • ApateDNS
  • TCPView(Sysinternals)
  • Wireshark
  • Python
  • PEView
  • Netcat
  • LordPE
  • UPX

and several Vulnerable Apps for Ethical Hacking

  • WinSCP
  • War-FTP and more…

How it started

I wanted a way to follow along with Practical Malware Analysis

Written on April 18, 2018