Setting Up The Exploit Development Lab

The first step is setting up a target for our practice, for this series we will be using kali linux as attacker box and Linux as a victim, it is just to tell you how to set this up, in future, we will use a Windows virtual machine as our victim.

We need gcc compiler in the attackers box, it comes pre-installed in kali linux and parrot OS, if it’s not there in your attacking distro you can install it with this command in your terminal

sudo apt install gcc

sudo apt install build-essential

to confirm your installation, type this command in your terminal

gcc –version

if you see some version number without any error you can be assured that gcc is successfully installed in your box.

Next step is installing a debugger in your victim’s box, which in our case is ubuntu, for this series we will use edb debugger.

What is edb debugger?

edb is a cross-platform AArch32/x86/x86-64 debugger. It was inspired by ollydbg, but aims to function on AArch32, x86, and x86-64 as well as multiple OS’s. Linux is the only officially supported platform at the moment, but FreeBSD, OpenBSD, OSX and Windows ports are underway with varying degrees of functionality.

Installing edb debugger is very straightforward, you need to clone the repository and follow the commands below:

mkdir build

cd build

cmake ..

make

./edb

Links to install edb debugger are given below:
edb-debugger: https://github.com/eteran/edb-debugger

edb-debugger Installation Wiki: https://github.com/eteran/edb-debugger

you must watch the video above to get better understanding of setting up exploit development environment.

Share!

Leave a Reply