Preface
From time to time I realize that certain tasks that are trivial for me are not necessarily easy for others, especially if they are just getting started with IT security stuff.
As I am going to be a Facilitator at SANS Munich 2015 on SEC 401, plus we have a few people at work who are just dipping their toe into the wonderful world of Kali Linux, it seemed like a good opportunity to make a short getting started / installation guide on the Kali VMWare VMs that you can download and quickly get started.
On top of that, when I check the statistics of the blog, I always see that the most popular posts are the detailed howtos and tutorials and I assume that it is because there is a need for this kind of posts too, so here it goes! :)
Step -1: Check in your BIOS/UEFI if virtualization is enabled
We are going to use virtualization, so it would be nice to enable it, right?In BIOS/UEFI menus this is somewhere around "Security" and/or "Virtualization" and it is something like "Intel (R) Virtualization Technology" and "Intel (R) VT-d Feature" that needs to be set to "Enabled".
Step 0: Install VMWare Player or VMWare Workstation
The Kali Linux VMs are VMWare-based, so you need to install VMWare Player (free), VMWare Workstation (paid) or VMWare Fusion (paid, for OS-X).
The more desirable choice is to use VMWare Workstation or VMWare Fusion, as they have a Snapshot feature, while with VMWare Player, you are forced to take a full copy in order to have a sort of rollback feature.
Step 1: Download Kali VM
We need to download the Kali VMs from the "Custom Kali Images" download site, where you can find a 64 bit (amd64) and a 32 bit PAE (i686) too.
There are also Torrent files for the images and based on experience, using Torrent is much more faster and reliable than the HTTP download, so if you can, use that!
Once you have downloaded the VMs, do not forget to check their SHA1 hash!!! On Linux, you can simply use the sha1sum command at a terminal. For Windows, you can use something like the MD5 & SHA Checksum Utility.
Step 2: Change Kali VM default root password
The Kali VM comes with a preset root password, which is "toor" (without the quotes), therefore, it has to be changed.
Here is how you do it:
root@kali:~# passwd
Enter new UNIX password:
Retype new UNIX password:
passwd: password updated successfully
Step 3: Change Kali VM default SSH keys
The Kali VM also comes with SSH preinstalled, so we need to change the SSH keys to avoid SSH MiTM attacks.
Here is how you do it:
root@kali:~# cd /etc/ssh/
root@kali:/etc/ssh# mkdir default_kali_keys
root@kali:/etc/ssh# mv ssh_host_* default_kali_keys/
root@kali:/etc/ssh# dpkg-reconfigure openssh-server
Creating SSH2 RSA key; this may take some time ...
Creating SSH2 DSA key; this may take some time ...
Creating SSH2 ECDSA key; this may take some time ...
insserv: warning: current start runlevel(s) (empty) of script `ssh' overrides LSB defaults (2 3 4 5).
insserv: warning: current stop runlevel(s) (2 3 4 5) of script `ssh' overrides LSB defaults (empty).
Now we can check if the keys are really changed:
root@kali:/etc/ssh# md5sum /etc/ssh/*key*
md5sum: /etc/ssh/default_kali_keys: Is a directory
6abe210732068fa7ca95854c3078dba5 /etc/ssh/ssh_host_dsa_key
1b5f3c1a1b5c48cc3cce31b116e8b6f8 /etc/ssh/ssh_host_dsa_key.pub
8f0f60855e5ab8cac8103d64faab090f /etc/ssh/ssh_host_ecdsa_key
aace49ae9236815c9a1672f8ecb2b1e2 /etc/ssh/ssh_host_ecdsa_key.pub
cf861a9f743fb4584ab246024465ddf1 /etc/ssh/ssh_host_rsa_key
d5d65d8ad023a6cb1418ae05007bc6d3 /etc/ssh/ssh_host_rsa_key.pub
root@kali:/etc/ssh# md5sum /etc/ssh/default_kali_keys/*key*
c8d5b82320a4ddde59d0e2b6d9aad42a /etc/ssh/default_kali_keys/ssh_host_dsa_key
6b12ddecd463677cde8097e23d0f219a /etc/ssh/default_kali_keys/ssh_host_dsa_key.pub
fecf056571a3dfbf3635fc2c50bf23c5 /etc/ssh/default_kali_keys/ssh_host_ecdsa_key
e44b7c50635de42e89b3297414f5047d /etc/ssh/default_kali_keys/ssh_host_ecdsa_key.pub
e9e0267484e020878e00a9360b77d845 /etc/ssh/default_kali_keys/ssh_host_rsa_key
ceee93d7bbc9f9b9706e18f23d4e81f1 /etc/ssh/default_kali_keys/ssh_host_rsa_key.pub
Step 4: Update Kali VM
Next you need to update your Kali VM so that everything is patched.
Here is how you do it:
root@kali:~# apt-get update
Get 1 http://http.kali.org kali Release.gpg [836 B]
Get:2 http://security.kali.org kali/updates Release.gpg [836 B]
********************************* SNIP *********************************
Fetched 16.7 MB in 14s (1,190 kB/s)
Reading package lists... Done
root@kali:~# apt-get upgrade
eading package lists... Done
Building dependency tree
Reading state information... Done
The following packages have been kept back:
********************************* SNIP *********************************
The following packages will be upgraded:
********************************* SNIP *********************************
241 upgraded, 0 newly installed, 0 to remove and 16 not upgraded.
Need to get 740 MB of archives.
After this operation, 130 MB disk space will be freed.
Do you want to continue [Y/n]? Y
Get:1 http://security.kali.org/kali-security/ kali/updates/main libc6-i386 amd64 2.13-38+deb7u7 [4,044 kB]
Get:2 http://http.kali.org/kali/ kali/main base-files amd64 1:1.1.0 [77.5 kB]
********************************* SNIP *********************************
root@kali:~#
Step 5: Create a Snapshot/Copy the VM
Once you are done with all the above, you can make a Snapshot in case of VMWare Workstation or copy the files of the VM in case of VMWare Player, so that you can roll back to this clean stat in case you misconfigure something.
Hope this was helpful. Happy hacking!
Hope this was helpful. Happy hacking!
More info
- Hacking Tools And Software
- Ethical Hacker Tools
- Hacker Tools For Pc
- Pentest Tools Github
- Hacking Tools Kit
- Pentest Tools Review
- Hacking Tools Windows 10
- Bluetooth Hacking Tools Kali
- Top Pentest Tools
- Hack Website Online Tool
- Hacking Tools 2020
- Hack Tools For Ubuntu
- Hacker Tools For Windows
- Hacking App
- Hacking Tools For Pc
- Hack Tools Online
- Hacker Tools Online
- Hacker Tools For Ios
- Hacker Tools Hardware
- Pentest Tools Website Vulnerability
- Pentest Automation Tools
- Nsa Hack Tools Download
- Hack Tools 2019
- Hack Tool Apk
- Hack Tool Apk
- Blackhat Hacker Tools
- Pentest Tools For Windows
- Pentest Tools Subdomain
- Hack Tool Apk
- Hackrf Tools
- Best Pentesting Tools 2018
- Hacker Tools Linux
- Pentest Tools Github
- Pentest Tools For Android
- Termux Hacking Tools 2019
- Hackrf Tools
- Hacking Tools Pc
- Hack Tools Github
- Hack Tools
- Pentest Tools Framework
- Hacker Hardware Tools
- Pentest Tools Find Subdomains
- Hacking Tools For Windows 7
- Pentest Tools Framework
- New Hacker Tools
- Hacker Tools Free Download
- Hacking Tools Windows 10
- Free Pentest Tools For Windows
- Hacker Tools Online
- Pentest Tools Apk
- Hack Tools For Pc
- Wifi Hacker Tools For Windows
- Hacker Hardware Tools
- Pentest Tools Kali Linux
- Hacker Tools Free Download
- What Are Hacking Tools
- Hack And Tools
- Usb Pentest Tools
- Hacking Tools For Windows Free Download
- Game Hacking
- Pentest Tools Alternative
- Hack Tools
- Hacker Tools Free
- Hack Tools 2019
- Hacking App
- Computer Hacker
- Hacking App
- Pentest Tools Linux
- Install Pentest Tools Ubuntu
- Hacker Tools Github
- Pentest Tools Alternative
- Hacking Tools Kit
- Hacking App
- Pentest Tools Free
- Hacker Tools 2020
- Ethical Hacker Tools
- Pentest Tools Url Fuzzer
- Hack Tools Online
- Pentest Tools Kali Linux
- Hacking Tools 2020
- Tools Used For Hacking
- Hacker Tools Free Download
- Hacker Tool Kit
- Hacking Tools Free Download
- Hacking Tools Mac
- Hacker Tools Apk Download
- Hack Tool Apk
- Pentest Tools
- Black Hat Hacker Tools
- Hacking Tools For Windows 7
- Hack Tool Apk
- Pentest Tools Apk
- Hacking Tools For Kali Linux
- Hacker Tools Linux
- Hacks And Tools
- Hacker Tools For Pc
- Hacker Tools Software
- Hacker Tools List
- Underground Hacker Sites
- How To Make Hacking Tools
- Hack Tools For Games
- Ethical Hacker Tools
- Pentest Tools For Windows
- Hacking Tools Github
- Pentest Tools Windows
- Hacking Tools For Windows Free Download
No comments:
Post a Comment