Configuring the attacker machine

As I said earlier, the attacker machine will be our main base and I prefer Kali Linux, but if you are going to use another distribution, then you have to install the following packages:

  1. First, we need to make sure that the C compiler is installed; use the gcc -v command:
  1. If not, just install it using $ sudo apt-get install gcc (Debian distributions) or $ sudo yum install gcc (Red Hat distributions). Accept and install gcc with its dependencies.
  2. Also, we are going to use the Python programming language in exploit development. Python comes by default with most Linux distributions, and to make sure that it's ...

Get Penetration Testing with Shellcode now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.