Kali 2
Kali 2
Kali 2
(Type, “y” and enter when prompted that additional disk space will be needed.)
This can take quite a while, so this might be a good time for a break, you deserve it!
4. When done, reboot.
Tech Note:
There are additional source repositories that you can manually add to
Kali if you want.
For example if you want the absolute latest and greatest, you can add the
“Bleeding Edge” repositories to Kali. But these do come with the
warning that they are not manually maintained and are low priority.
For more information see:
http://docs.kali.org/general-use/kali-linux-sources-list-repositories
That’s it; Kali should now be installed, updated and ready to go. We will take a closer look at the
desktop in the next section.
Allow the tools to install and then click, “Close” when finished.
Installing Metasploitable 2
Metasploitable 2, the purposefully vulnerable Linux operating system that we will practice
exploiting, is also available as a Virtual Ware VM. As we did with the Kali VM above, all we need
to do is just download the Metasploitable 2 VM image, unzip it and open it with VMWare Player.
It’s that simple.
1. Download Metasploitable 2
(http://sourceforge.net/projects/metasploitable/files/Metasploitable2/) and place it in a folder
where you want it saved.
2. Unzip the File.
3. Then just open Metasploitable 2 in VMWare by starting VMWare Player, click, “Player”,
“File”, “Open”, then surf to and select the Metasploitable.vmx file and click, “Open”.
4. It will now show up in the VMWare Player Menu:
5. Now go to “Edit Virtual Machine Settings” for Metasploitable and make sure the network
interface is set to “NAT”:
Check the network settings on it to make sure that it too is using NAT for networking:
Play the virtual machine and run “ipconfig” from a Windows 7 Command Prompt to see what its IP
address is:
Microsoft Windows [Version 6.1.7601]
Copyright (c) 2009 Microsoft Corporation. All rights reserved.
C:\Users\Fred>ipconfig
Windows IP Configuration
Ethernet adapter Local Area Connection:
And finally if you want, install the VMWare Tools for Windows when prompted:
That’s it, you should now have three virtual machines in a mini-network that you can use to practice
and learn basic offensive security pentesting techniques.
Install Wrap Up
In this section we learned how to install VMWare Player as a virtual machine host. We then installed
Kali Linux, Metasploitable 2 and Windows 7 as separate virtual machines on the host.
We set them all up to use the same networking (NAT) so that they can communicate to each other and
out to the internet if needed.
We will use this setup throughout the rest of the book.
Just as a reminder, with using VMWare’s DHCP, IP addresses of the systems may change when we
reboot them. I used this partially because you will always be using different target IP addresses when
in the real world. But if you get lost, you can run “ifconfig” (Linux) or “ipconfig” (Windows) on the
VM to find the changed IP address.
And finally, never run Metasploitable directly on the internet as it is purposefully vulnerable.
Applications Menu
The Applications menu is the main menu in Kali.
Conclusion
If you want, it would be a good idea to take a few minutes and surf the menu system until you are
familiar with its layout.
Many, if not most of the programs can be run directly from the command prompt, and there are
additional programs included in Kali that are not in the menu system. We will cover several of the
utilities that come with Kali. We will also cover a few that have not been added in yet, but are very
good tools for any security tester.
The Metasploit Framework is a comprehensive platform for performing vulnerability testing, and
exploitation. It is loaded with over a thousand exploits, hundreds of payloads and multiple encoders.
We will cover the basics of using Metasploit in this chapter, and then in a later chapter see how to
use Metasploit against a test target. If you are already familiar with using Metasploit then feel free to
skip this chapter or use it as a refresher.
Updates
Normally to update Metasploit, you simply run “mfsupdate”, but according to the Rapid 7 website,
Metasploit updates are synced to update weekly with Kali.
(https://community.rapid7.com/thread/3007)