0% found this document useful (0 votes)
101 views12 pages

Kali Linux PDF Manual

Kali Linux is a security-focused Linux distribution that helps companies identify vulnerabilities through penetration testing. It runs on a variety of devices and is open source, meaning it is free and legal to use. The document provides instructions for installing Kali Linux on a virtual machine, including creating the virtual machine, selecting the Kali Linux ISO, disk partitioning, and configuring the system during installation.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
101 views12 pages

Kali Linux PDF Manual

Kali Linux is a security-focused Linux distribution that helps companies identify vulnerabilities through penetration testing. It runs on a variety of devices and is open source, meaning it is free and legal to use. The document provides instructions for installing Kali Linux on a virtual machine, including creating the virtual machine, selecting the Kali Linux ISO, disk partitioning, and configuring the system during installation.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

Kali Linux Manual

Introduction
Kali Linux is a Linux distribution specialized in cybersecurity. It is an open source product that
involves a lot of customization for penetration testing, helping companies understand their
vulnerabilities.

Kali Linux is based on the Debian Linux distribution and runs on a wide spectrum of devices, open
source construction means it is free and legal to use in a wide range of business scenarios.

While experts point out that Kali Linux is for beginners, those who are interested in cybersecurity
often benefit from using this Linux distribution.

Kali Linux offers the “Single Root User” design as a way to manage privileges, and users can disable
network services by default. That's useful for penetration testing and data forensics that can be
used to determine a company's weaknesses in a risk mitigation project.
1. Goals

1.1 General objective

Create laboratory guides that introduce the student to the basics of using the Linux operating
system, and have better interaction and knowledge of other operating systems that they may use.

1.2 Specific objectives


- Investigate the different sources of Linux management in the areas of processes and
design of simple console programs
- Carry out tests of the guides with students to determine the time allocated for each guide
and check the importance of those proposed.
Kali Linux installation

The first thing we will do is choose a virtualization environment that allows us to have a real virtual
utility environment and we can do practices in said system that we end up using. In this case we
will use virtual Box.

§ Oracle VM VirtualBox Administrator — □


File Machine Help

• Screen
Video memory: 128MB
Graphics controller: VBoxSVGA
Remote Desktop Server : Disabled
Recording: Disabled
62 Storage
Controller: SATA
SATA Port 0: Windows Server_.vdi (Normal, 50.00 GB)
SATA Port 1: [Optical Drive]
17763.737.190906-2324.rs5_release_svc_refresh_SERVER_EVAL_X64FRE_e s-es_1.iso (4.95 GB)
([ Audio
Host Driver: Windows DirectSound
Controller: Intel HD Audio
• Grid
Adapter 1: Intel PRO/1000 MT Desktop (NAT)

Oracle virtual Box

We decided to manage in Oracle virtual Box, but you can use other virtualization environments
that allow you to perform the same functions.

Create virtual machine

Name and operating system

Select a friendly name and destination folder for the new virtual machine, and select the type of operating system you intend to install on it. The name you
select will be used by VirtualBox to identify this machine.

Folder of

Our first step will be to create our virtual machine in this case we are going to create a Linux kali
Create virtual machine

Name and operating system

Select a friendly name and destination folder for the new virtual machine, and select the type of operating system you intend to install on it. The name you
select will be used by VirtualBox to identify this machine.
Name: Kali_linux

Machine folder:

Version: Debian (64-bit)

Expert mode | Next | Cancel

We give you the characteristics that our virtual machine will have, in this case it will be the name
Kali_linux, type = Linux and version must be 64 bits.

4 Create virtual machine

Memory size

Select the amount of memory (RAM) in megabytes to be reserved for the virtual machine.
The recommended memory size is 1024 MB.

Next I Cancel

In this part we define the type of memory size, it is very important to look at how much RAM the
computer has.
$ Create virtual machine

HDD
If you want you can add a virtual hard drive to the new machine. You can create a new hard drive file or select one from the list or another location using the folder icon.

. If you need a more complex storage configuration you can skip this step and make changes to the virtual machine preferences once created.

The recommended hard drive size is 8.00 GB.

OR Do not add a virtual hard drive

(•) Create a virtual hard drive now

OR Use an existing virtual hard disk file

KALI LINUX. vdi (Normal, 52.42GE) +L

| Create | Cancel

We create our virtual disk for our virtual machine

, Create virtual hard disk

Hard drive file type


Select the type of file you want to use for the new virtual hard drive. If you do not need to use it with other virtualization software you can leave this setting unchanged .

@VDI [VirtualBox Disk Image)

Or VHD (Virtual Hard Disk)

Or VMDK (Virtual Machine Disk)


Expert mode | Next | Cancel

In this part we decide the type of file on the hard drive, in this case using an image or better known
as the ISO

Physical hard drive storage

Select whether the new virtual hard drive file should grow as it is used ( hot reserve) or whether it should be created at its maximum size (fixed size).

A dynamically reserved hard disk file will only use space on your physical disk as it fills up (up to a maximum fixed size ), however it will not automatically
shrink back down when the space on it is freed.

A fixed-size hard drive file may take longer to create on some systems, but is typically faster to use.

@ Dynamically reserved

Or Fixed size

Next | Cancel

We define the hard drive storage in this dynamically reserved


File location and size

Type the name of the virtual hard drive file in the field below or click the folder icon to select a different folder to create the file in.

C:\Users\CAMILO\VirtualBoxVMsKKali linuxKKali linux.vdi


Select the virtual hard disk size in megabytes. This size is the limit for the data file that a virtual machine will be able to store on the hard drive.

9 •30/00G5
4.00 MB 2.00 TE

| Brear | Cancel

We give it the location where our virtual machine will be, we also define the size of the
storage.

In this step we start our virtual machine and we will get the hard drive advertisement asking for
the Kali_linux_64 ISO . The ISO weight is 2.84.
Installation of Kali Linux through the console giving each parameters
or be used for the installation procedure: e will be used to set your ZC keycap to use: nar the location of
anguage for the installed system. your si
Korean
Kurdish (variant F)
idion-based ilcations Kurdish (variant Q)
Macedonian - Laotian
MakecOHCKM Lat Lnoamerican Latvian
Northern Sami - Smegillii Lithuanian
Norwegian Bokmaal - Norsk bokm Macedonlo Halayalamo
Norwegian Nynorsk - Norsk nynor frgent Ina Nepalese Northern
Persian - JlJou Bolivia Chile Sami
Polish - Polsky Colombia Norwegian
Portuguese - Portuguese Costa Rica Persian
Portuguese (Brazil) - Portuguese ( Cuba Ecuador Philippine
Roman Ian - Roman El Salvador Polish
Russian - PyCCKI Portuguese Punjabi
Serbian (Cyrillic) - CpnckM Romanian Russian
Slovak - Sloveneina Serbian (Cyrillic)
Slovenian - Slovene
EEmimmem-miu
Swedish - Svenska
USA
Guatemala
Sindhi Sinhalese
Slovak
Tagalog - Tagalog Honduras
Tajik - TOMK Mexico
Thal - nvlnu Nicaragua
Turkish - Türkce Panama
Ukrainian - YKpahCbka Paraguay
Uyghur - & «¿G Peru
Vietnamese - Ting Vit Puerto Rico storero
Helsh - Cymraeg Dominican Republic Swedi
om
"Back" sh

We select language, location and keyboard layout of little relevance.

=
[!]Select. language |
The installer translation for the selected language is incomplete.
There is a possibility that some messages may be displayed in English if you do anything other than a default installation.

It is recommended that you choose another language or discontinue the installation unless you understand the alternative language
sufficiently.
Do you want to continue the installation in the selected language?
cGo back 502 <No»

The community's efforts to translate the system into an original language of the distro, without any
major alternative to change
-----------------------------------------------------1 II] Set up the network I----------------------------------------------------------

Please enter the name of the traquina.


The host name is a single word that identifies the system on the network. Consult your network administrator if you don't know what
name it should have, if you are setting up a home network you can make up this name.

Machine name:

HE •
(Go back» «Continue»

The name we assign to the machine only charges or operates in part of a network, so that it
identifies us.

You need to set a password for the root user, the system administration account. It could have serious consequences if a
malicious user or an unqualified user gained access to the system administrator account, so you should be careful and
choose a password for the super user that is not easy to guess. It should not be a word found in the dictionary, or a word
that can be easily associated with you.

A good password should contain a mix of letters, numbers, and punctuation marks, and should be changed regularly.

The password for the root user (administrator) should not be blank. If you leave this value blank, then the root account will
be disabled and a user account will be created that will be given permissions to become the administrator user using the
“sudo” command.

Please note that you will not be able to see your password while you enter it.

Superuser password:

- ##-34N

I•Emmrammum 13
In this part we will have to give our administrator a password that allows him to have adequate
protection for our system.

-----------------------------------1 [!!] Configure users and passwords |--------------------------------------------


Please enter the same superuser password again to verify that you entered it correctly.

Re-enter your password for verification:

52222 •••

In this window it will tell us to double-check our password that we have chosen. It is important that
the password is not forgotten because it will not allow us to enter our environment if this happens.
In this case, let's configure our clock so that we can better access the time zone in which our
country finds us.

This installer can guide you through disk partitioning (using different standard schemes ) or, if you wish, you can do it
manually. If you choose the guided partitioning system you will have the opportunity later to review and adapt the results.
You will be asked which disk to use if you choose guided partitioning for a full disk.

Partitioning method:

.liado - use all the disk

Guided - use the entire disk and configure LVM Guided - use the entire disk and configure LVM
encryption Manual

(Back"

Disk partitioning
In this step we select the “guided – use the entire disk”

selected to partition:

SCSI3 (0,0,0) (Sda) - ATA VBOX HARDDISK: 10.7 GB

This disk can be partitioned following one or more of the different schemes available. If you are not sure, choose the
first one.

Partitioning scheme:

[All files in one partition (recommended for newbies)!

Detach the /home partition


Separate /home, /var and /tmp partitions

/They go back

We recommend for newbies


By choosing this option the manager is responsible for creating all the necessary partitions, we only
check if we are satisfied.
This is a summary of the partitions and mount points you currently have adjacent to you. Select a partition to modify its
values (file system, mount points, etc.), free space to add a new partition, or a device to initialize the partition table.

Guided Partitioning
Configure RAID by software
Configure Logical Volume Manager (LVM)
Configure encrypted volumes
Configure iSCSI volumes
SCSI3 (0,0,0) (sda) - 10.7 GB ATA VBOX HARDDISK #1 primary 10.2GB F ext4 /
#5 logic 496.0 MB F exchange exchange

Undo changes made to partitions___________________________________


Finish partitioning and write changes to disk

(Back}

Guided partitioning - how were the partitions


In the installation guided by the installation manager it will show us how they are partitioned.

Any changes listed below will be written to the disks if you continue. If you don't, you can make changes manually.

The partition tables of the following devices have been modified:


SCSI3 (0,0,0) (sda)

The following partitions will be formatted:


SCSI3 partition #1 (0,0,0) (sda) as ext4
SCSI3 partition #5 (0,0,0) (sda) as swap

Do you want to write changes to disks?

BE (Not

Disk partitioning - shows partitions

In this part of the installation, each partition and certain name are reflected and we accept the
terms given by the guided partition

Installation complete
Installation is complete, so it is time to boot into your new system. Make sure to remove the installation media, so that you
boot into the new system rather than restarting the installation.

"Back} "Continue:-

Installation completed
After having completed the changes in each partition, the installation will be completed and the
user will expect to be able to enter through login access.
Login – kali Linux

In this part the user will enter with their corresponding username and password.

Kali Linux interface

In this part we have already finished our installation of kali Linux and we can carry out our
respective processes or laboratories

You might also like