10Nov2008 (UTC +8)

On 11/10/08, joebert jacaba <[EMAIL PROTECTED]> wrote:
> I am interested to learn. Looks like I need to buy a powerful laptop though.

Not really, if we're talking about an attacker's machine here. If
you've got 512MB RAM, you'll be comfy with it. It's Nessus which is a
memory hog. Get a USB flash drive, check if your laptop with WLAN can
boot from a USB drive... if yes,  then you can start of with BackTrack
on a USB stick:

http://www.remote-exploit.org/backtrack_download.html

You can build a VMware image for a Solaris x86 or an older Linux box,
and load it up with all the stuff you can put in it, using a regular
PC. Then. we'll just transfer that to the quad-core CPU we'll make
ready.



Drexx Laggui  -- CISA, CISSP, CFE Associate, ISO27001 LA, CCSI, CSA
http://www.laggui.com  ( Singapore / Manila / California )
Computer forensics; Penetration testing; QMS & ISMS developers; K-Transfer
PGP fingerprint = 6E62 A089 E3EA 1B93 BFB4  8363 FFEC 3976 FF31 8A4E
_________________________________________________
Philippine Linux Users' Group (PLUG) Mailing List
http://lists.linux.org.ph/mailman/listinfo/plug
Searchable Archives: http://archives.free.net.ph

Reply via email to