This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
session:infrastructure:vm [2017/06/18 08:47] Razvan Deaconescu [Windows 7] |
session:infrastructure:vm [2020/07/19 12:49] (current) |
||
---|---|---|---|
Line 8: | Line 8: | ||
Kali Linux is a Debian-based distribution the comes with a handful of helpful security tools used for Penetration Testing, Forensics and/or Reverse Engineering. | Kali Linux is a Debian-based distribution the comes with a handful of helpful security tools used for Penetration Testing, Forensics and/or Reverse Engineering. | ||
- | The VM can be downloaded in OVA format from https:// | + | The VM can be downloaded in OVA via {{:session: |
+ | |||
+ | <note important> | ||
+ | The machine' | ||
+ | </ | ||
==== Login ==== | ==== Login ==== | ||
Line 14: | Line 18: | ||
The credentials used to login on the Kali Linux virtual machine are: | The credentials used to login on the Kali Linux virtual machine are: | ||
- | * username: '' | + | |
- | * password: '' | + | * password: '' |
==== Specifications ==== | ==== Specifications ==== | ||
- | * 64-bit OS | + | |
- | * 2 GB RAM | + | * 2 GB RAM |
- | * 30 GB HDD space | + | * 30 GB HDD space |
+ | ==== Networking & SSH ==== | ||
- | ===== Debian 32bit ===== | + | Currently the VM's networking is achieved through a host NAT. A TCP port forwarding rule connects the host's port 2222 to the VM's port 22 and the SSH daemon is configured to start automatically, |
- | It is Virtual Box vm using Debian 32 bit (at this point Jessie 8.1). | + | < |
+ | $ ssh -p 2222 root@localhost | ||
+ | </ | ||
- | Download using HTTP or BitTorrent from http:// | + | However, you might get better network speeds if you change the networking method to bridge, so that the VM will communicate directly with the same gateway as the host. In VirtualBox, go to the machine settings: |
- | ==== Login ==== | + | {{ : |
- | * username: '' | + | This means the VM and the host will live in the same LAN, so you need to figure out its local IP; for example: |
- | * password: '' | + | |
- | The '' | + | {{ : |
- | ==== Specifications ==== | + | Then connect to it using: |
- | * 512 MB RAM | + | < |
- | * 16 GB HDD space | + | $ ssh root@192.168.0.115 |
- | * interface eth0 for Internet access (NAT) | + | </ |
- | * interface eth1 for local access through SSH (host-only) | + | |
- | ==== Base Software ===== | ||
- | * Debian GNU/Linux 8.1 " | + | ==== Headless VM ==== |
- | * Xfce | + | |
- | * Linux kernel 3.16 | + | |
- | ==== Packages ==== | + | If your physical machine is low on resources (or you simply don't want to live inside the Kali VM, e.g. login in its browser), one thing that might help is running the VM in the background with no graphical interface and simply connect to it via SSH. |
- | Install and configure | + | To get rid of the graphical interface, |
< | < | ||
- | apt-get install sudo | + | # GRUB_CMDLINE_LINUX_DEFAULT=" |
- | apt-get install vim | + | GRUB_CMDLINE_LINUX_DEFAULT=" |
- | cp / | + | |
- | update-alternatives --config editor | + | |
- | visudo | + | |
- | sudo apt-get install tcpdump gawk git gitk git-gui wget curl htop netcat nmap wireshark openssh-server gzip bzip2 zip unzip unrar-free p7zip lzma xz-utils subversion mercurial sed less bless hexedit elfutils vim strace finger tree pciutils usbutils lsof bash-completion pwgen host gdb valgrind ctags expect python emacs iotop ltrace | + | |
- | sudo apt-get install iotop nasm apt-file lynx ncftp ldap-utils mailutils net-tools ethtool screen tmux dtach filezilla | + | |
- | sudo apt-get install radare2 radare2-plugins | + | |
- | sudo dpkg-reconfigure wireshark-common && sudo usermod -a -G wireshark $USER | + | |
</ | </ | ||
- | Configure Git | + | Then run: |
< | < | ||
- | git config | + | # update-grub |
- | git config --global user.email ' | + | |
- | git config --global color.ui aut | + | |
</ | </ | ||
- | Create Desktop shortcut for Sublime Text 2 | + | Finally, reboot the machine (or run '' |
- | Install and configure metasploit: http://www.pkdavies.co.uk/ | + | === Virtual Box Instruction === |
+ | |||
+ | To start the machine headless (i.e. no graphical window showing the VM) in Virtual Box, you can either use the " | ||
< | < | ||
- | sudo apt-get install build-essential libreadline-dev libssl-dev libpq5 libpq-dev libreadline5 libsqlite3-dev libpcap-dev openjdk-7-jre subversion git-core autoconf postgresql pgadmin3 curl zlib1g-dev libxml2-dev libxslt1-dev libyaml-dev ruby ruby-dev | + | $ VBoxManage startvm <vm-name> |
+ | </ | ||
- | sudo chmod o+r / | + | Where ''< |
- | add MSF path to PATH | ||
- | </ | ||
- | |||
- | Install and configure IDA | ||
< | < | ||
- | wget https:// | + | $ VBoxManage list vms |
</ | </ | ||
- | |||
- | Create Desktop shortcut for IDA | ||
- | |||
- | ==== Configurations ==== | ||
- | |||
- | * PEDA: https:// | ||
- | |||
- | |||
- | ===== Windows 7 ===== | ||
- | |||
- | The Windows 7 virtual machine comes with a handful of helpful security tools used for binary inspection, forensics and reverse engineering. | ||
- | |||
- | The VM can be downloaded in OVA format from https:// | ||
- | |||
- | ==== Login ==== | ||
- | |||
- | * username: '' | ||
- | * password: '' | ||
- | |||
- | ==== Specifications ==== | ||
- | |||
- | * 32-bit OS | ||
- | * 2GB RAM | ||
- | * 20 GB HDD space |