VHL003 - Kali Linux Setup
The first attacker machine that we are going to set up is a Kali Linux machine. This is a popular operating system for attackers as it has many of the tools that they need come pre-installed. We will be creating another attacker virtual machine much later on using the Windows operating system.
To install this operating system, go to the Kali Linux website and scroll down till you see the virtual machine tab and select your virtual machine application that you are using. You can use the link provided as well.
Once you have this downloaded, it will be in a 7zip format.
If you do not have a 7zip extractor, you can download one from here.
Once both are downloaded, extract the downloaded file from Kali
by right clicking > 7Zip > Extract Here.
Once it is extracted, make sure to move the file to the
location of your virtual machines used by your VM software.
Now open your VM software and open the virtual machine in there. It should now show the virtual machine in the list. Turn it on.
This Kali Linux virtual machine is already set up and is pre-built
for easy set up and use. It should open directly to a log in page. The username
and password is ‘kali’ and ‘kali’.
Once logged in, go to the top left and click on the terminal
shortcut at the top.
Then type in the following command. This and the next is going
to update the operating system.
Then we are going to do a “apt upgrade”. This one will take a while.
Once this is all done, you are ready to use this as your
attacking machine for the lab. If we need a tool to be installed for an attack in the future, it will be
covered when it is used.
If you are new to the Linux operating system, I suggest going through Linux Unhatched by Cisco and Bandit by OverTheWire. Both are great for getting an understanding of the file system and the terminal, we will be using them a lot and it will be expected knowledge for the following blog posts.