Skip to content

Setup The Attacker Machine

Prerequisites

  1. VirtualBox or VMware Workstation Pro Installed.
  2. Virtual Machine with Kali Linux ISO has been downloaded and provisioned (the ISO should be attached to the new VM).

Network Topology

Base Layout
(Click to zoom)

Kali Linux Overview

What is Kali Linux?

Kali Linux is a specialized Linux distribution tailored for cybersecurity professionals and ethical hackers.

Developed by Offensive Security, it is a Debian-based operating system preloaded with tools designed for penetration testing, ethical hacking, and digital forensics. Kali Linux is widely used for assessing system vulnerabilities, testing network security, and investigating cyber incidents.

Kali comes with a suite of security tools to assist in the operations.

How is Kali Linux Used?

Kali Linux serves multiple purposes in the cybersecurity field, including:

  1. Penetration Testing: Professionals use Kali Linux to simulate real-world cyberattacks and identify vulnerabilities in systems, networks, and applications. Tools like Metasploit and Burp Suite are often employed in these scenarios.
  2. Vulnerability Assessment: It provides tools to scan and identify weaknesses in infrastructure, ensuring they are addressed before exploitation.
  3. Cybersecurity Training: Kali Linux is widely used in cybersecurity training programs, competitions, and certifications.

Security Implications

Leveraging an operating system like Kali Linux carries certain benefits and risks.

Benefits

  • Can be used by trained professionals to help understand their organizational security controls and identify vulnerabilities before actors can exploit them.
  • Offers a platform to safely practice offense security techniques in controlled environments.
  • Tools are aggregated in one centralized ecosystem.

Risks

  • This tool can also be used maliciously by attackers if accessed by unauthorized individuals.
  • Kali Linux is not meant to be a production environment without isolation. Be careful.

Configure Kali Linux

Choose the default “Graphical install”.

Base Layout
(Click to zoom)

Choose Language ➔ “Continue”.

Base Layout
(Click to zoom)

Choose the Country and Keyboard layout.

Base Layout
(Click to zoom)

Change the hostname from kali to attacker ➔ “Continue”.

👉 Refer to the “Project Overview” guide for more information on default usernames and passwords.

Base Layout
(Click to zoom)

Leave the domain name empty ➔ “Continue”.

Base Layout
(Click to zoom)

Add attacker as the new user and username.

Base Layout
(Click to zoom)

Enter attacker as the default password ➔ “Continue”.

Base Layout
(Click to zoom)

Choose time zone of your choice for the clock option ➔ “Continue.”

Select “Guided – use entire disk” ➔ “Continue.” Keep all defaults selected.

Base Layout
(Click to zoom)
Base Layout
(Click to zoom)
Base Layout
(Click to zoom)
Base Layout
(Click to zoom)

Change “Write the changes to disks?” to “Yes” ➔ “Continue.”

Base Layout
(Click to zoom)

Keep defaults selected ➔ “Continue”. Wait for the software to install.

Base Layout
(Click to zoom)

Install the GRUB Loader.

Base Layout
(Click to zoom)
Base Layout
(Click to zoom)

Select “Continue” and allow the system to reboot.

Base Layout
(Click to zoom)

Login as the under the attacker account.

Base Layout
(Click to zoom)

Success!

Base Layout
(Click to zoom)

📷 Take Snapshot!

Base Layout
(Click to zoom)

Optional

Disable Default Logoff (Timeout After 5 Minutes)

Go to the Menu Bar ➔ “Power Manager”.

Base Layout
(Click to zoom)

Navigate to “Display” tab ➔ Drag Toggle to the left.

Base Layout
(Click to zoom)