The magic of penetration testing-the deployment of the kali system
Scenes:
Why do hackers use kali linux system?
The kali linux system contains more than 600 penetration testing tools, and these tools are built into the system. Developers do not need to develop them. You can directly use the
kali linux system as open source and free. All the source codes of the kali linux system are available. Found, and can make customized modifications to the system
kali linux Sousuke:
Kali linux is a Linux distribution in Debian, usually used in advanced penetration testing and security audit scenarios. There are hundreds of tools built into the kali linux system, which are suitable for various information security tasks, such as penetration testing, security research, computer forensics and reverse engineering. Kali Linux is developed, funded and maintained by the company Offensive Security.
Kali linux was released on March 13, 2013. Kali's predecessor was based on the top-down reconstruction of BackTrack linux, which fully complies with the development standards of Debian.
kali linux download
Download from the official site of the kali linux system, URL: Portal
The download method can be http download and bt download. It should be noted that the official website of kali is a foreign site, and downloading using http will be very slow.
Use VMware to install the kali system:
![E:\Downloaded files, programs, videos, music, pictures, etc.\2020-11\chrome_Xg23XsXAOl.png]
Set root user login and realize remote login:
Network Configuration:
Configure kali linux's apt as a domestic source: #The magic of penetration testing-the deployment of the kali system
Scenes:
The kali linux system contains more than 600 penetration testing tools, and these tools are built into the system. Developers do not need to develop them. You can directly use the
kali linux system as open source and free. All the source codes of the kali linux system are available. Found, and can make customized modifications to the system
kali linux Sousuke:
Kali linux is a Linux distribution in Debian, usually used in advanced penetration testing and security audit scenarios. There are hundreds of tools built into the kali linux system, which are suitable for various information security tasks, such as penetration testing, security research, computer forensics and reverse engineering. Kali Linux is developed, funded and maintained by the company Offensive Security.
Kali linux was released on March 13, 2013. Kali's predecessor was based on the top-down reconstruction of BackTrack linux, which fully complies with the development standards of Debian.
kali linux download
Download from the official website of the kali linux system, URL: Portal. The
download method can be http download and bt download. It should be noted that the official website of kali is a foreign site, and downloading using http will be very slow.
Use VMware to install the kali system:
Set root user login and realize remote login:
- In kali linux, root users are not allowed to log in to the system by default, and only ordinary users are allowed to log in. When we do some settings, there will be insufficient permissions, so we need to set root and let it log in to the system.
sudo passwd root
You will enter the dialog box for setting the password, enter the password twice by yourself, log off the computer, log in as the root user and enter the root password, and
then you can log in as the root user!
- By default in the kali linux system, the sshd service is disabled, and root users are not allowed to log in to the system remotely.
cd /etc/ssh
Go to the ssh configuration folder to
view the configuration file
ls -l .
In these configuration files, the one with d is the server, and the one without d is the client.
Select sshd_config configuration file
vim /etc/ssh/sshd_config
Edit this configuration file and
restart the service
/etc/init.d/ssh restart
Check if it is listening
lsof -i :22
Set the ssh service to start with the boot
update-rc.d ssh enable
Verification is successful
ifconfig
Network Configuration:
Network configuration is divided into temporary configuration and permanent configuration.
The temporary configuration takes effect immediately, but becomes invalid after shutdown.
The permanent configuration takes effect after restarting, and will not take effect after shutting down.
ifconfig
Check the network card information and
configure it
ifconfig eth0 192.168.1.111/24
Use ifconfig
it later to verify and
temporarily configure routing:
route add default gw 192.168.1.1
You will find that the command line will report an error, this is because some options are missing in the configuration file of the network card, and then we will modify the configuration file.
vim /etc/network/interfaces
Modify this file,
save and exit, then restart the computer, open the terminal, ifconfig
and use the and route
commands again this time and find that no more errors are reported.
Configure DNS
echo nameserver 8.8.8.8 > /etc/resolv.conf
ping qq.com
Verify that you can connect to the Internet.
Configure kali linux apt as a domestic source:
The source that comes with the kali system is the official apt source, often because of network problems, it is impossible to install or wick the program, and the foreign apt source is quite full, so you can directly use the domestic source to solve this problem.
Find configuration file
vim /etc/apt/sources.list
Comment out the default, start a new line, and write Ali source in it.
deb https://mirrors.aliyun.com/kali kali-rolling main non-free contrib
deb-src https://mirrors.aliyun.com/kali kali-rolling main non-free contrib
Use it to apt update
verify.
Shut down to take a snapshot, you can restore the snapshot when the system crashed