Welcome to STXLUG Livestream
Topic: Kali Linux Introduction
Intro and News
- Presenter: Eduardo Robles
- How Penetration Testing Helps Agencies Spot Overlooked Cyber Threats
- Raspberry Pi 4
- Debian 10 Released
You can take the official Penetration Testing with Kali Linux course and become and Offensive Security Certified Professional. The people who work on Kali Linux setup this course. And the OSCP is an industry recognized certification.
Learn more here: https://www.kali.org/penetration-testing-with-kali-linux/
There are various versions of Kali Linux available to download. Chose one that best fits your scenario and use case. There are virtual machine images too if you prefer that.
Learn more here: https://www.kali.org/downloads/
This option boots directly into Kali Linux and you can use like any other Live Linux environment.
- Live (Forensic Mode)
This is the same as the Live environment but the difference is that in this mode Kali doen’t do anything to the host system. So Kali doesn’t mount the computers hard drive. This is a good mode to use when you don’t want to leave a trace of Kali behind.
- Live USB Persistence/Encrypted Persistence
In this mode you can save files and settings onto the LiveUSB environment. This is useful if you want to continue using Kali on the same USB device. There are 2 options, the non-encrypted option or the encrypted option.
Setting up a non-priviledged user
By default Kali Linux runs as root. Even the most skilled hackers know that this is not a good idea. Why? Well because if you screw up something you will screw it up system wide. So it’s a good idea to setup a non-priviledged user.
Start by creating a new user.
Then add this user to the
sudo users group.
usermod -aG sudo KaliNoob
Meta packages help you get more software in Kali. Sometimes you don’t need a full blown installation of Kali with all the available tools. You can grab the Metapackages to install a set of tools for a specific job.
For example, you can install the password cracking tools with the following command.
apt-get install kali-linux-pwtools
- Wireless antennas You’re going to need a wireless card or adapter that can do wireless monitor mode and packet injection. In my experience wireless cards that have the Atheros chipset are the best supported under any Linux distrobution. Check out this article on the best wireless adapters for 2019. Or check out Hak5 Wifi Pineapple https://shop.hak5.org/products/wifi-pineapple
- Bluetooth antennas Just like with wireless adapaters, if you want to do some Bluetooth hacking you will need compatible Bluetooth adapaters.
Setting up aliases will save you a bunch of time and make your life so much easier.
Let’s setup an
alias for the easy and often used command
ls. Let’s say we always want
ls to show the files in a list, give file details in human readable form, and show hidden files. The command for that will be
To aliase this command simply add this to you
alias ls='ls -lha'
Now everytime you type
ls it will actually be running
Kali linux is a great start to learn penetration testing. It’s probably one of the most recognized Linux distrobutions. But Kali in my opinion should only be used as a tool, not a full blown operating system.
Thanks to everyone who joined in and I hope you have a great weekend!
Buy me a coffee!