Commando VM: a full Windows-based penetration testing virtual machine distribution
Months ago, I published a post about Flare VM, a project by Fireeye/Mandiant researcher focused on the creation of a Windows-based security distribution for malware analysis.
Recently, Fireeye released a similar project: another windows-based distribution, but this time dedicated to penetration testing and red teaming, named Command VM.
Born from our popular FLARE VM that focuses on reverse engineering and malware analysis, the Complete Mandiant Offensive VM (“Commando VM”) comes with automated scripts to help each of you build your own penetration testing environment and ease the process of VM provisioning and deployment.
Penetration testers commonly use their own variants of Windows machines when assessing Active Directory environments. Commando VM was designed specifically to be the go-to platform for performing these internal penetration tests. The benefits of using a Windows machine include native support for Windows and Active Directory, using your VM as a staging area for C2 frameworks, browsing shares more easily (and interactively), and using tools such as PowerView and BloodHound without having to worry about placing output files on client assets.https://www.fireeye.com/blog/threat-research/2019/03/commando-vm-windows-offensive-distribution.html
Commando VM uses Boxstarter, Chocolatey, and MyGet packages to install all of the software, and delivers many tools and utilities to support penetration testing.
Active Directory Tools
- Remote Server Administration Tools (RSAT)
- SQL Server Command Line Utilities
Command & Control
- Python 2
- Python 3 (default)
- Ruby Devkit
- Visual Studio 2017 Build Tools (Windows 10)
- Visual Studio Code
- Not PowerShell (nps)
- API Monitor
- FuzzySec’s PowerShell-Suite
- FuzzySec’s Sharp-Suite
- Juicy Potato
- Kali Binaries for Windows
- Mr. Unikod3r’s RedTeamPowershellScripts
- Dev branch included
- Citrix Receiver
- VMWare Horizon Client
- VMWare vSphere Client
- Adobe Reader
- Explorer Suite
- Mozilla Thunderbird
- Neo4j Community Edition
- Process Hacker 2
- SQLite DB Browser
- Shellcode Launcher
- Sublime Text 3
- VLC Media Player
- yEd Graph Tool
- AD Control Paths
- Burp Suite
- OWASP Zap
- Windows 7 Service Pack 1 or Windows 10
- 60 GB Hard Drive (recommended 80+ GB Hard Drive)
- 2 GB RAM (recommended 4+ GB RAM)
- Create and configure a new Windows Virtual Machine
- Ensure VM is updated completely. You may have to check for updates, reboot, and check again until no more remain
- Take a snapshot of your machine!
- Download and copy
install.ps1on your newly configured machine.
- Open PowerShell as an Administrator
- Enable script execution by running the following command:
- Finally, execute the installer script as follows:
- You can also pass your password as an argument:
.\install.ps1 -password <password>
The script will set up the Boxstarter environment and proceed to download and install the Commando VM environment. You will be prompted for the administrator password in order to automate host restarts during installation. If you do not have a password set, hitting enter when prompted will also work.