Sunday, February 12, 2012

Hacker's Lab | Things Need For Setting up a Hacking Lab | Amit Khajuria

1. Computer:- Yes! Of course we need the computer. Recommended computer specifications is a processor with a speed of 1.7GHz, 120GB hard disk capacity above 2GB of RAM to speed up. If you only have 1GB of RAM, Mr.Hac advise you to collect money (for students) and purchase additional RAM. It is important to guarantee the performance of your computer at its maximum.




2. Virtual Machine is required if you do not have some of the other PC to complete the laboratory work for you. For ordinary consumers, Mr.Hac recommend that you use the Oracle VM Virtualbox because it is an open-source virtualization software, free, and easy to use and tutorialnya in many blogs and Youtube. If you want the professional version, you can try the machine virtualization VMware .


3. Cloud Storage / Online Synchronization Service / Online Storage Ok. This is a virtual space for your laboratory. It is important to keep the needs of the various 'goods' at it. Therefore if you want a free, there is a fairly good service that is Dropbox .

4. Live USB / CD / DVD
 Most of the time hackers will do their work with the platform or a different operating system. Because the Live USB to the rescue of hard disk space that can accommodate a variety of distros like BackTrack, Wifiway, Blackbuntu and so on.



5.External Hard Drive Virtual, virtual. But the physical storage space should also be as a backup to a virtual storage space.


6. Static IP Address Static IP address is required to complete the process godaman. You can buy it on any service offered on the internet , find other solutions for free.Please Google do.


7. Hiding IP Tools For USe gud VPN or Proxy Server to hide your IP address.


8. High-Speed ​​Internet This is also very important. All you need to work virtual Internet speed and high consistency. Unifi, though expensive, is one of the best options available in Malaysia.

9. Tools For Hacking
 Keylogger, Network Sniffer / Analyzer, penetration testing tool, Password Cracking / Recovery Tool, Social Engineering Toolkit (SET), are among the examples of compulsory tool you need to have. Please make a study of all these tools so. Okay.Just before this date only.

1 comments:

bdxf said...

Basic christian louboutin 2012 shoes or boots within your toes you Christian Louboutin shoes Outlet have the specific sociable stigma of the very most excellent sort to get linked to. Summer months is in fact turning up today, every one of the girls christian louboutin booties sale obtain a beautiful along with stylish shoes or boots pertaining to cheap monster beats by dr dre months to demonstrate their particular layout. Sure, These kind of Christian Louboutin wall christian louboutin black peep toe shoes turn into the proper a single using limited edition colors beats period of time They may be synchronised so that you can superiority, the sort women christian louboutin sandals usually will assist you to get noticed on your own. Faith based Louboutin wall plug has to be between your selected things. Exhibit your own personal glam-rock type and a elegant show up in addition to standard, stylish, gorgeous, wonderful, respected and even the most up-to-date type by means of gaining louboutin directs.

Post a Comment

Related Posts Plugin for WordPress, Blogger...
Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Amit Khajuria | Redesign by Lasantha - Innocent Hacker