Configure Your Environment

In my last post on Reverse Shell Methods, I discussed the shell a lot.  As a penetration tester, I spend the majority of my actual “work” time in a shell.  I leverage Windows, OSX, and Linux about evenly throughout the day, so I’ve tried to customize my environment in all three, though I have had substantially more success tweaking OSX and Linux to my liking.  Today, I want to discuss the way I’ve configured my OSX, Kali, and Metasploit prompts to give me the information I need when I need it – for example, when I am writing a penetration test report. Besides, it’s always a good idea to keep track of what I’m doing and when I’m doing it!  Always CYA!

Continue reading Configure Your Environment