At its core, Exploit Pack is a Java Desktop application, this makes it multi-platform and it means that it will run on any operating system such as Windows, Linux or Mac. This guide will help you install and configure it in your desired OS.
As any other Java application it will require the installation of a JVM first, you can decide to use OpenJDK or Oracle Java, but in any case you should always consider to use a version of Java higher than 8. At the moment of writing this guide the latest Java version is 15, as you use the newest Java version you will also get speed performance boosts, better support and a more stable instance to work with.
Setting up the environment for Exploit Pack:
First you need to decide where to run Exploit Pack from, we recommend to run it from a VM ( Virtual Machine ) such as Virtual Box or VMware. Exploit Pack as any other security tool of this type includes exploits ( script codes ) and utilities that will be detected, and with good reason, by your Antivirus and might conflict with your work session while using Exploit Pack. In the worst case scenario an AV could even delete files and corrupt your Exploit Pack installation. In any case, during a penetration test or a red team exercise you should always work from an isolated environment and not your working desktop machine.
Exploit Pack - technical requirements:
To run Exploit Pack you will need at least 500mb of disk space, around 4gb or more of RAM and a modern CPU capable of handling multi-threading applications at ease. As mentioned above, any operating system will do the trick as long as a JVM is properly installed.
JAVA installation - Step by step:
Once you have decided on the operating system to use as host for Exploit Pack, you have to install Java to be able to run Exploit Pack.
Java is a class-based, object-oriented programming language that is designed to have as few implementation dependencies as possible. It is a general-purpose programming language intended to let application developers write once, run anywhere, meaning that compiled Java code can run on all platforms that support Java without the need for recompilation. Java applications are typically compiled to bytecode that can run on any Java virtual machine (JVM) regardless of the underlying computer architecture.
You can verify if you have Java already installed in your operating system by opening a terminal and running the following command, this is an example for Windows but the same command will work for Linux and Mac, in this case the command shows that we have the version 11.0.9 of Java installed.
Download Java from Oracle:
We choose not to provide a link to download Java because it might have changed by the time you read this manual, just make sure that you download an equal version or higher version than the one shown below.
Once you have downloaded your Java Installer, you can simply follow the wizard and you will get it configured in just a few steps.
Once the download has finished you will get a similar file to the one that we have here in the following screenshot.
Double click the file to run the installation wizard of Java JDK from Oracle as shown below.
Once the installation has finished, you can close the wizard and get ready to run Exploit Pack.
As a final step you can verify that you have Java installed and configured into your system. From a console run this command as shown below.
Now, after downloading Exploit Pack you will get a zip file with all the files needed, uncompress it on a folder that you have access to write into, Your home folder should be fine for this.
Now it's time to uncompress Exploit Pack, we are almost done!
The uncompressed zip file should have a similar arrangement of the files as shown in the following screenshot.
Time to run Exploit Pack! Double click on the .jar file, or from a console navigate to the right directory and run "java -jar ExploitPack.jar"
Congratulations! You have used your first cpu-cycles with Exploit Pack in your own computer!