When conducting ethical hacking, Kali Linux provides you with nearly all tools for penetration testing. In this video, learn how to obtain a premade virtual image from osboxes.org.
When conducting ethical hacking, you're going to need some tools. Kali Linux provides you with nearly every tool you'll possibly need. As you can see, I'm at the web page and it says our most advanced penetration testing distribution, ever. And if you scroll down here, it tells us a little bit about Kali Linux and for those of you who have been doing this a while, it was called BackTrack before this, and it's a Linux distribution. You can go to download, and here it gives you all of your choices. As you can see here there is a hash value that's offered that you can check for integrity of the file. One of the things I do when dealing with students and also presentations is providing a premade virtual image. So I'm at this website, osboxes.org. OSBoxes provides us with premade images. I'll go to About us and here it tells us a little bit about OSBoxes and how it provides ready-to-use Unix/Linux virtual machines, and here is an opportunity to donate and support this project. So if I go to Sitemap, and here we can see all of the possible operating systems that you can download and then it's ready to go. Again, as I said, this is great for students and also teachers. If you're teaching any of this content, you can just grab one of these and then you're good to go. So here's mine. I went to Kali Linux and it tells us again about Kali Linux and then down below, here you can see your choices, VirtualBox or VMware. And you can see different versions of this. I chose the latest one, but you want to go to information because there's where you're going to see the user name and the password. So the username is root, password, osboxes.org. And another thing is, it includes the VirtualBox guest edition. That's nice. All right, so now I'm in VirtualBox, and I'll select New and we'll say what the name is after I downloaded it, and it will take a while 'cause it's a pretty large file. We'll name this Kali Linux Jasper and I'll accept the default memory size because we're really just using this for testing. And now, here's where it says, create the machine and the hard disk. Well, we're going to use an existing virtual hard disk file and we'll have to go get it and it's in the downloads, and now we'll create it. And now we need to power it on. It prompts us and lets us know that the auto capture keyboard is also already turned on. And I'll go to full screen mode. Here's where we'll put the username, root, and the password, osboxes.org. Okay, you've installed Kali Linux on a virtual machine, and now you're ready to go.
Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312-50) version 10.
- Common causes of vulnerabilities
- Identifying and assessing vulnerabilities
- The Common Vulnerability Scoring System (CVSS)
- Outsourcing vulnerability analysis
- Leveraging Nikto and other vulnerability assessment tools
- Securing mobile devices
- Defending the LAN