• Presentation
    • Initial Setup & Installation
    • VM Installation & Verification
    • Attacking VM Setup
    • Victim VM Setup
    • Overview
    • Installation
    • Usage & CLI Commands
    • Configuration
    • Security Features
    • Deployment
    • Connection & Authentication
      • Connection
      • Password Protection
      • Command Execution
      • Crypto
      • Bonus Features
      • Fileless Dropper & Rootkit Loader
      • Stealth Hooks & daniel.* Commands
      • Encrypted C2, Persistence & Auth
      • Symbol Resolution & Ftrace Hooks
      • Remote Exec & File Transfer
    • Command Execution
    • Configuration Justifications
    • Security Interaction with C2
    • Handout Format
  • code Resources
  • savings Tux Fan Club: Chasse au Trésor Pirate
  • favorite Un dernier mot
    • GitHub
  • to navigate
  • to select
  • to close
    • Home
    • Setup
    On this page
      • Overview
      • Overview
    code

    Setup

    Environment and Virtual Machine setup instructions

    code

    Initial Setup & Installation

    Prerequisites on the EPITA laptop

    code

    VM Installation & Verification

    Quickly set up the attacker and victim VM disks

    code

    Attacking VM Setup

    Configure and use the attacking VM

    code

    Victim VM Setup

    Configure and use the victim VM to load EpiRootkit


    © 2025 Tux Fan Club. Built with Lotus Docs