aaron ~# :blinkingcursor:<p><strong>My favorite pentesting setup.</strong></p><p>Today i'm setting up the <a href="https://infosec.exchange/tags/KaliLinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KaliLinux</span></a> <a href="https://infosec.exchange/tags/Docker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Docker</span></a> <a href="https://infosec.exchange/tags/container" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>container</span></a> for my <a href="https://infosec.exchange/tags/ansible" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ansible</span></a> <a href="https://infosec.exchange/tags/playbook" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>playbook</span></a>. This setup has some pretty cool advantages for me.</p><p>I can:</p><ul><li>access the shell and files using <a href="https://infosec.exchange/tags/SSH" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SSH</span></a> and <a href="https://infosec.exchange/tags/SFTP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SFTP</span></a>.</li><li>customize the installation to the fullest extend using the <a href="https://infosec.exchange/tags/Dockerfile" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Dockerfile</span></a>.</li><li>easily route the <a href="https://infosec.exchange/tags/networktraffic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networktraffic</span></a> through a <a href="https://infosec.exchange/tags/vpn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vpn</span></a> using <a href="https://infosec.exchange/tags/gluetun" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gluetun</span></a>.</li><li>reproduce the setup (i love Docker).</li><li>use GUI apps from that container using X11Forwarding or by installing a <a href="https://infosec.exchange/tags/vnc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vnc</span></a> server.</li></ul><p>This has been my favorite <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a> setup so far for obvious reasons. I can access a fully configured pentesting environment on all my devices, always accessible and ready to go.</p><p>In case anyone is interested in the setup, it will be included in my ansible playbook, which will be published <a href="https://github.com/aaronsbytes/iac" rel="nofollow noopener" target="_blank">on this repository</a>.</p><p><a href="https://infosec.exchange/tags/automation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>automation</span></a> <a href="https://infosec.exchange/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/x11" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>x11</span></a> <a href="https://infosec.exchange/tags/homelab" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>homelab</span></a> <a href="https://infosec.exchange/tags/selfhosting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selfhosting</span></a></p>