• code Presentation
    • Host Environment Setup
    • VM Installation & Verification
    • Attacker VM Setup
    • Victim VM Setup
    • Host to VM File Transfer
    • Dropper Deployment
    • Overview
    • Installation
    • Command Reference
    • Usage
    • Overview
    • Installation
      • Authentication
      • Dashboard
      • Client Management
        • Terminal Panel
        • Persistence Panel
        • Event Log Panel
        • Upload/Download Panel
        • Overview Panel
        • Configuration Panel
        • Authentication Panel
    • Configuration Justifications
    • EpiRootkit Overview
    • Build & Deployment
    • Connection & Authentication
      • Command Execution
      • DNS Resolution
      • Encryption
      • Sysfs Interface
      • Module Hiding
      • File Hiding
      • Persistence
      • Line Hiding
      • File Transfer
    • Unwelcome Guests
    • Tux Fan Club: Chasse au Trésor Pirate
  • favorite Un dernier mot
    • GitHub
  • to navigate
  • to select
  • to close
    • Home
    • Setup
    On this page
    code

    Setup

    Environment and Virtual Machine setup instructions

    computer

    Host Environment Setup

    Prepare your host system for running EpiRootkit VMs

    code

    VM Installation & Verification

    Set up and verify the attacker and victim VMs

    terminal

    Attacker VM Setup

    Configure the attacking VM with C2 server and web interface

    shield

    Victim VM Setup

    Configure the victim VM and deploy the EpiRootkit

    folder

    Host to VM File Transfer

    Methods for transferring files from host to QEMU VMs

    download

    Dropper Deployment

    Social engineering tool for automated rootkit deployment


    © 2025 Tux Fan Club. Built with Lotus Docs