|
|
On Fri, 12 Aug 2011 19:29:03 +0100, Orchid XP v8 wrote:
>>> Sure. But first I wanted to check whether the tool I've picked
>>> actually /works/, and have a bit of a play around with it. /Then/ I
>>> might see about using it on real passwords...
>>
>> That's what a lab server is for (ie, a server in an IT lab, not a
>> server in the lab you work for<g>).
>
> That's what VMware is for. ;-)
You're learning. I remember not too long ago when you thought what VMware
did was impossible so not worth even trying out. ;) And yes, VMware does
make an excellent lab environment.
>> You might have to disable the AV software, since it's 'greyware'
>> (that's a term I've not heard before, but presumably it means 'this is
>> a hacking tool', to which one might say 'well, duh!').
>
> I'm guessing if I boot up a Linux VM and ask it to install the Linux
> version of the tool, the AV won't know what just hit it. (I don't think
> it scans network traffic, only actual files. On the other hand, maybe it
> will recognise the data in the disk image? But on the first hand, I
> doubt it scans for Linux threats, only Windows ones...)
Yeah, that would probably work as well.
Jim
Post a reply to this message
|
|