VHL003 - Kali Linux Setup

    The first attacker machine that we are going to set up is a Kali Linux machine. This is a popular operating system for attackers as it has many of the tools that they need come pre-installed. We will be creating another attacker virtual machine much later on using the Windows operating system. 

To install this operating system, go to the Kali Linux website and scroll down till you see the virtual machine tab and select your virtual machine application that you are using. You can use the link provided as well. 

Once you have this downloaded, it will be in a 7zip format. If you do not have a 7zip extractor, you can download one from here.



Once both are downloaded, extract the downloaded file from Kali by right clicking > 7Zip > Extract Here.

Once it is extracted, make sure to move the file to the location of your virtual machines used by your VM software.

Now open your VM software and open the virtual machine in there. It should now show the virtual machine in the list. Turn it on. 

This Kali Linux virtual machine is already set up and is pre-built for easy set up and use. It should open directly to a log in page. The username and password is ‘kali’ and ‘kali’.

 

Once logged in, go to the top left and click on the terminal shortcut at the top.

Then type in the following command. This and the next is going to update the operating system.


Then we are going to do a “apt upgrade”. This one will take a while.


    Once this is all done, you are ready to use this as your attacking machine for the lab. If we need a tool to be installed for an attack in the future, it will be covered when it is used.

    If you are new to the Linux operating system, I suggest going through Linux Unhatched by Cisco and Bandit by OverTheWire. Both are great for getting an understanding of the file system and the terminal, we will be using them a lot and it will be expected knowledge for the following blog posts.


Popular posts from this blog

Active Directory Through an Attacker's Lens

VHL002 - Setting up the Domain Controller and Workstations

VHL005 - Own the Workstations, Local Admin Password Re-use

VHL004 - LLMNR Poisoning

VHL001 - In the Beginning