Hacking With Security Tools Part — I
Welcome to the first module of this workshop where we will present lots of hacking tricks and techniques you can achieve with Kali Linux. In fact, you can perform complete end-to-end hacking with Kali Linux. When thinking about hacking you might think that it’s a difficult job, but with Kali, this job will be much easier and all the instructions will be presented in this workshop.
Surprisingly, you don’t need to have any solid background in a security or hacking field, we will present all the skills that can make you a hacker!
However, you need to have a solid playground where you can perform hacking on a trial basis and for this reason you need to have a solid machine on which you can build your hacking environment. In this module, we will be guiding you on how you can make your own lab to practice hacking.
Building the Virtual Hacking Environment
To achieve this goal, you need to have one platform on which you can run multiple operating systems including victim machines and Kali Linux as your master machine from which you will be performing hacking attempts. To make it happen, let’s download Virtual Box!
Download Link: https://www.virtualbox.org/wiki/Downloads.
Now select & download the binary, as per your operating system requirement, in my case, I will be installing the VirtualBox-4.3.12–93733-OSX from the above download link as shown below.
Great, Virtual Box installation is now complete. This will be your platform on which you will be building the virtual lab to learn hacking with Kali Linux.
Now we will proceed with installing Kali Linux. First we need to get the latest copy of the Kali Linux Image from kali.org.
Download link: http://www.kali.org/downloads/.
Download the Kali Linux image as per your hardware requirements; in our lab, we will be using Kali Linux 64 bit ISO 1.0.0 version.
Once you finish the download then follow the below steps to prepare the virtual machine in order to install the Kali Linux on top of it.
Setup up virtual machine and install Kali Linux (master operating system)
Following the instructions as shown for installing Kali Linux.
Now set up new machine as Linux Type, as shown below, and continue the configuration of a new virtual machine as BSD type.
Now your Virtual Machine with the Kali Linux is running as shown above to boot from CD in shown modes of Kali Linux. We recommend keeping the Live CD option for using on go. However, you can choose options to install the Kali Linux as Operating System.
Great, you managed to install Kali Linux but this is just the one side of the mirror, as you also need the victim machines that you can hack into by using Kali Linux. For this purpose we have the following options to build the next requirements of our virtual hacking lab.
1. Vulnerable Microsoft Operating System (Windows XP)
2. Metasploitable (Linux as Vulnerable Operating System)
3. Vulnerable Microsoft Operating System (Windows 8)
We will setup these above vulnerable operating systems in our environment so that we can practice with real hack attempts.
Also, it’s beneficial to install two instances of each operating system, however, think about your hardware capacity, as well.
Victim Machine (Microsoft Windows)
Now setup up a new machine as shown below to install Windows XP with the following naming and type info.
Without hiccups this would lead to a successful installation of Windows XP operating system. However, you need to ensure that your Network Card type is set as shown below in order to connect your Virtual Machine with your virtual lab.
Victim Machine (Metasploitable)
Victim Machine (kioptrix)
This operating system is basically a hacking challenge, which is being developed by one of the wellknown offensive-security members. We will download these challenges as well to make them part of our hacking with Kali Linux. Download the images from the link below, one by one, and add them to your virtual lab environment just as you did for Metasploitable. In case you cannot achieve this task with Virtual Box than it is recommended that you should switch to VMware to build your lab.
Kioptrix Hacking Challenges
* Level1 image http://www.kioptrix.com/blog/dlvm/Kioptrix_Level_1.rar
* Level2 image http://www.kioptrix.com/blog/dlvm/Kioptrix_Level_2.rar
* Level3 image http://www.kioptrix.com/blog/dlvm/KVM3.rar
* Level4 image http://www.kioptrix.com/blog/dlvm/Kioptrix4_vmware.rar
* Final Level http://www.kioptrix.com/blog/dlvm/kiop2014.tar.bz2
It is also recommended that you should create more virtual machines depending on how much space and memory you have in your system. Below are some of the vulnerable operating systems specifically developed for hacking purposes!
OS for Web for Pen testers
This is the operating system dedicated with web-based vulnerabilities on which you can practice hacking skills pertaining to web hacks. This OS can be downloaded from the link below.
You can also download Damn Vulnerable Web Application kit which is also equipped with web application vulnerabilities which can be downloaded from the link below.
By setting up your lab with these operating systems in the virtual environment, you will be able to practice hacking skills with Kali Linux. In the upcoming module we will be focusing how you can achieve ethical hacking with Kali Linux.
Originally published at https://learncybersec.blogspot.com.