SlideShare a Scribd company logo
Getting Started Kali Linux & Python
By Dhruv Sharma
1
Introduction
In this presentation we will understand:
• How to install Kali Linux.
• Assign an IP address.
• Shutdown the System.
• Install Terminator
• Introduction to Centos and setting up the web server.
• Introduction to Python.
• Getting started with Hack the Box.
2
Download
Use below link to download the required Kali Linux image.
https://www.kali.org/downloads/
We need to download an ISO Image.
3
Import the Image & Login
• Opt for Graphic Install
• Check for Python version on Kali.
4
Assign the IP Address
ifconfig eth0 192.168.1.5 netmask 255.255.255.0 up.
route add default gw 192.168.1.1.
5
Shutdown Kali
• Shutdown –h now
6
TMUX / Terminator [split windows]
7
Introduction to TMUX / Terminator
• System administrators often need to work on multiple consoles and thus they appreciate the
ability to switch from one to another in a snap with a quick keyboard shortcut or mouse click.
• Terminator is easy to install and it does exactly what it's supposed to do - it can split terminal
windows both horizontally and vertically, according to user's requirements. It also allows to keep
multiple tabs opened in case splitting one window is not enough.
8
• Centos linux
9
HTTP Service in Centos
• Drive 1
• Index.html needs to be created for hosting the website.
• Drive 2
• Httpd.conf file already exist
10
HTTP Service in Centos
• Index.html
11
HTTP Service in Centos
• httpd.conf file
12
HTTP Service in Centos
13
Remove CENTOS Firewall
• Website is not reachable from other systems due to a local firewall.
14
15
Few checkups
16
• Python
17
Python Installation
• Download Link: https://www.python.org/downloads/
• You can install Python either on Linux or Windows Operating system.
18
Python Installation
• View Version
• Python 2 and Python 3, both are installed on the Kali operating
system. If we run a program using #python <prog>.py, the code is
executed in python 2. If we want to execute the same in python 3
than use syntax - # python3 <prog>.py
19
• Hackthebox
20
Setup VPN on hack-the-box (1 of 3)
• Step 1: Login into Hack the box account & download the connection pack into Kali
Linux. Check out for cross under connected section.
21
Setup VPN on hack-the-box (2 of 3)
• Download the file and run the file as shown below.
22
Setup VPN on hack-the-box (3 of 3)
• Verify your connectivity.
23
24
HTB Benefits
• Hello All,
• We are excited to announce our support to (ISC)2 and becoming an official (ISC)2
CPE Submitter.
• This partnership is in line with our education strategy and we believe that it will
greatly benefit our community to demonstrate, prove and enhance their (ISC)2
certifications through their engagement and practice on Hack The Box.
• CPE Credits submission will be available to our VIP members. Our VIP members
can obtain credits, by completing Hack The Box Machines, Challenges, Endgames
and Pro Labs. In order to start tracking your activity and automatically get your
credits, you need to enable this option through your account settings.
• https://www.hackthebox.eu/press/view/8
25
• Metasploit
26
Import exploit
• In many situations we need to import exploit from internet into
metasploit.
• This guide will help you with the exploit.
27
Import exploit
• We cannot directly use an exploit from exploit.db with msfconsole.
• We need to import it.
28
Step 1 of 3
• Copy the exploit downloaded from internet or from exploit.db in below file location.
/usr/share/metasploit-framework/modules/exploits
• Based on the nature of exploit, create a folder and place the exploit as shown below.
29
Step 2 of 3
• Place the exploit and ensure there are no space and quit the msfconsole.
30
Step 3 of 3
• Use the exploit
31
• Hackbar with Cyber-Fox – This bar will be useful when performing
SQL injection attacks.
32
Hackbar with Cyber-fox
• Install cyberfox using below link and follow the steps:
https://sourceforge.net/projects/cyberfox/files/Beta/Browser/Linux/
•
• Remove Firefox, from your kali
https://installlion.com/kali/kali/main/f/firefox-esr/uninstall/index.html
33
Hackbar with Cyber-fox
• Import Hack-Bar
34
• Tmux
35
WHY ?
• Within one terminal window you can open multiple windows and
split-views
• tmux keeps these windows and panes in a session. You can exit a
session at any point. This is called “detaching”. tmux will keep this
session alive until you kill the tmux server (e.g. when you reboot).
This is incredibly useful because at any later point in time you can pick
that session up exactly from where you left it by simply “attaching” to
that session.
36
Tmux installation
• It is pre-installed in your kali
• You can install it on your ubuntu or mac os using below commands
sudo apt-get install tmux for ubuntu || brew install tmux for MAC
• Tmux configuration is placed inside .tmux.conf file, which is a hidden file. We
strongly recommend you to create your new tmux.conf file and place it in the
root directory.
• Vi /root/.tmux.conf and use the configuration from below link, provided by
ippsec.
https://gist.github.com/AvasDream/47f13a510e543009a50c8241276afc24
37
Tmux installation
• View the configuration.
38
Tmux Operations
• Create a new session
• Create a new terminal: [ctrl + a] + c (new terminal) and to kill the terminal =
prefix (ctrl+a)+ x
39
Tmux Operations - Moves
• Move 1: Swapping between the terminal 0 & 1= [ctrl + a] +0 || [ctrl + a] + 1
• Move 2: You might end up in a scenario, where you accidently closed a window. Using tmux, you
can reconnect and process will begin, from exact point where you left.
• View Tmux sessions
• Attach to specific
• Detach = Close or prefix + d
40
Tmux Operations - Moves
• Move 3: Delete the terminals: Right now we have two terminals, we can close the
terminal by typing > exit or ctrl + d
• Move 4: Within a single screen create split screens
• vertical split : Prefix + %
• Horizontal split : Prefix + “
41
Tmux Operations - Moves
• Move 5: Moving between the screens cannot happen by clicking the mouse
cursor in the terminal. Use Prefix + arrow sign ( <-- ) .
• Move 6: To create random distribution between the shapes of the terminal use
Prefix + Space Bar.
• Move 7: To increase the width of the window use prefix + ctrl + arrow sign ( <--
).
• Move 8: Kill a specific terminal window : Prefix + x (same as killing the bigger
terminal window)
42
Tmux Operations - Moves
• Move 9: Edit mode Scroll up and down : Prefix + [
Exit edit mode: Enter
• Move 10: Search in the document: Prefix + ? (search up) Or Prefix / (search down)
and press ‘n’ for next highlighted value.
Note: This is important to search for keywords like password in the dump file.
43
Reference
• https://www.youtube.com/watch?v=Lqehvpe_djs
44
45

More Related Content

PPTX
HPC Examples
PPTX
Auditing System Password Using L0phtcrack
PDF
DEF CON 27 - workshop - RICHARD GOLD - mind the gap
PPTX
Devnet 1005 Getting Started with OpenStack
PDF
454976614-Jenkins-Cheat-Sheet-pdf.pdf hoja de ayuda
PDF
DEF CON 27 - WENXIANG QIAN and YUXIANG LI HUIYU - breaking google home exploi...
PDF
Sublime Text3 for Django Development
PPTX
Todo lo lo que necesita saber para implementar FreePBX
HPC Examples
Auditing System Password Using L0phtcrack
DEF CON 27 - workshop - RICHARD GOLD - mind the gap
Devnet 1005 Getting Started with OpenStack
454976614-Jenkins-Cheat-Sheet-pdf.pdf hoja de ayuda
DEF CON 27 - WENXIANG QIAN and YUXIANG LI HUIYU - breaking google home exploi...
Sublime Text3 for Django Development
Todo lo lo que necesita saber para implementar FreePBX

Similar to Getting started kali linux (20)

PPTX
The Flink - Apache Bigtop integration
DOCX
Project Malware AnalysisCS 6262 Project 3Agenda.docx
PPTX
Moksha - HTML5/CSS with Qt5+Snowshoe on AM335x
PDF
Iot Bootcamp - abridged - part 1
DOC
Taishaun_OwnensCNS-533_Lab
PPTX
Docker Swarm secrets for creating great FIWARE platforms
PDF
D200011_2024_Dec13 (2).pdf aaaaaaaaaaaaa
PDF
Breaking Smart Speakers: We are Listening to You.
DOCX
INFA 620Lab 4 Firewall.docx
PDF
Hacking Highly Secured Enterprise Environments by Zoltan Balazs
PDF
Internal Pentest: from z3r0 to h3r0
PDF
Exploiting Client-Side Vulnerabilities and Establishing a VNC Session
PPTX
Creating Havoc using Human Interface Device
PPTX
Tmux and Tmuxinator ~ Rise of the Machines
PPTX
Automating Post Exploitation with PowerShell
PDF
Exploiting Llinux Environment
PDF
DSA Day 2 PPT.pdf
PDF
Webinar: Começando seus trabalhos com Machine Learning utilizando ferramentas...
PPTX
Introduction To Applets methods and simple examples
PDF
Tool Development 02 - Advanced WPF Controls
The Flink - Apache Bigtop integration
Project Malware AnalysisCS 6262 Project 3Agenda.docx
Moksha - HTML5/CSS with Qt5+Snowshoe on AM335x
Iot Bootcamp - abridged - part 1
Taishaun_OwnensCNS-533_Lab
Docker Swarm secrets for creating great FIWARE platforms
D200011_2024_Dec13 (2).pdf aaaaaaaaaaaaa
Breaking Smart Speakers: We are Listening to You.
INFA 620Lab 4 Firewall.docx
Hacking Highly Secured Enterprise Environments by Zoltan Balazs
Internal Pentest: from z3r0 to h3r0
Exploiting Client-Side Vulnerabilities and Establishing a VNC Session
Creating Havoc using Human Interface Device
Tmux and Tmuxinator ~ Rise of the Machines
Automating Post Exploitation with PowerShell
Exploiting Llinux Environment
DSA Day 2 PPT.pdf
Webinar: Começando seus trabalhos com Machine Learning utilizando ferramentas...
Introduction To Applets methods and simple examples
Tool Development 02 - Advanced WPF Controls
Ad

More from Dhruv Sharma (18)

PPTX
RAVPN EAP-IKEv2 VPN.pptx
PPTX
Load Balance with NSX-T.pptx
PPTX
NSX_Troubleshooting.pptx
PPTX
ASA VPN_Certificate authentication_ISE Authorization.pptx
PPTX
Setting up CDP (Cisco Discovery Protocol) between Cisco IOS and VMware Virtua...
PPTX
Routebased-Policybased VPN.pptx
PPTX
Ansible Network Automation session1
PPTX
Setting up Cisco WSA Proxy in Transparent and Explicit Mode
PPTX
Factory setup wsa_9.2_v1.0
PPTX
Tacacs+ with ise 2.4_ CCIE
PPTX
Get vpn multicast for CCIE Security
PPTX
Route tags with OSPF
PPTX
Aci vmware integration_youtube
PPTX
Introduction to nexux from zero to Hero
PPTX
Cisco umbrella youtube
PPTX
GTM vs AWS Route 53 with Cisco umbrella
PPTX
Setting up VPN between F5 LTM & ASA
PPTX
Unquoted service path exploitation
RAVPN EAP-IKEv2 VPN.pptx
Load Balance with NSX-T.pptx
NSX_Troubleshooting.pptx
ASA VPN_Certificate authentication_ISE Authorization.pptx
Setting up CDP (Cisco Discovery Protocol) between Cisco IOS and VMware Virtua...
Routebased-Policybased VPN.pptx
Ansible Network Automation session1
Setting up Cisco WSA Proxy in Transparent and Explicit Mode
Factory setup wsa_9.2_v1.0
Tacacs+ with ise 2.4_ CCIE
Get vpn multicast for CCIE Security
Route tags with OSPF
Aci vmware integration_youtube
Introduction to nexux from zero to Hero
Cisco umbrella youtube
GTM vs AWS Route 53 with Cisco umbrella
Setting up VPN between F5 LTM & ASA
Unquoted service path exploitation
Ad

Recently uploaded (20)

PDF
Machine learning based COVID-19 study performance prediction
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
cuic standard and advanced reporting.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Approach and Philosophy of On baking technology
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Machine learning based COVID-19 study performance prediction
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Reach Out and Touch Someone: Haptics and Empathic Computing
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Network Security Unit 5.pdf for BCA BBA.
20250228 LYD VKU AI Blended-Learning.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
cuic standard and advanced reporting.pdf
Spectral efficient network and resource selection model in 5G networks
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Approach and Philosophy of On baking technology
“AI and Expert System Decision Support & Business Intelligence Systems”
Digital-Transformation-Roadmap-for-Companies.pptx
Electronic commerce courselecture one. Pdf
Building Integrated photovoltaic BIPV_UPV.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton

Getting started kali linux

  • 1. Getting Started Kali Linux & Python By Dhruv Sharma 1
  • 2. Introduction In this presentation we will understand: • How to install Kali Linux. • Assign an IP address. • Shutdown the System. • Install Terminator • Introduction to Centos and setting up the web server. • Introduction to Python. • Getting started with Hack the Box. 2
  • 3. Download Use below link to download the required Kali Linux image. https://www.kali.org/downloads/ We need to download an ISO Image. 3
  • 4. Import the Image & Login • Opt for Graphic Install • Check for Python version on Kali. 4
  • 5. Assign the IP Address ifconfig eth0 192.168.1.5 netmask 255.255.255.0 up. route add default gw 192.168.1.1. 5
  • 7. TMUX / Terminator [split windows] 7
  • 8. Introduction to TMUX / Terminator • System administrators often need to work on multiple consoles and thus they appreciate the ability to switch from one to another in a snap with a quick keyboard shortcut or mouse click. • Terminator is easy to install and it does exactly what it's supposed to do - it can split terminal windows both horizontally and vertically, according to user's requirements. It also allows to keep multiple tabs opened in case splitting one window is not enough. 8
  • 10. HTTP Service in Centos • Drive 1 • Index.html needs to be created for hosting the website. • Drive 2 • Httpd.conf file already exist 10
  • 11. HTTP Service in Centos • Index.html 11
  • 12. HTTP Service in Centos • httpd.conf file 12
  • 13. HTTP Service in Centos 13
  • 14. Remove CENTOS Firewall • Website is not reachable from other systems due to a local firewall. 14
  • 15. 15
  • 18. Python Installation • Download Link: https://www.python.org/downloads/ • You can install Python either on Linux or Windows Operating system. 18
  • 19. Python Installation • View Version • Python 2 and Python 3, both are installed on the Kali operating system. If we run a program using #python <prog>.py, the code is executed in python 2. If we want to execute the same in python 3 than use syntax - # python3 <prog>.py 19
  • 21. Setup VPN on hack-the-box (1 of 3) • Step 1: Login into Hack the box account & download the connection pack into Kali Linux. Check out for cross under connected section. 21
  • 22. Setup VPN on hack-the-box (2 of 3) • Download the file and run the file as shown below. 22
  • 23. Setup VPN on hack-the-box (3 of 3) • Verify your connectivity. 23
  • 24. 24
  • 25. HTB Benefits • Hello All, • We are excited to announce our support to (ISC)2 and becoming an official (ISC)2 CPE Submitter. • This partnership is in line with our education strategy and we believe that it will greatly benefit our community to demonstrate, prove and enhance their (ISC)2 certifications through their engagement and practice on Hack The Box. • CPE Credits submission will be available to our VIP members. Our VIP members can obtain credits, by completing Hack The Box Machines, Challenges, Endgames and Pro Labs. In order to start tracking your activity and automatically get your credits, you need to enable this option through your account settings. • https://www.hackthebox.eu/press/view/8 25
  • 27. Import exploit • In many situations we need to import exploit from internet into metasploit. • This guide will help you with the exploit. 27
  • 28. Import exploit • We cannot directly use an exploit from exploit.db with msfconsole. • We need to import it. 28
  • 29. Step 1 of 3 • Copy the exploit downloaded from internet or from exploit.db in below file location. /usr/share/metasploit-framework/modules/exploits • Based on the nature of exploit, create a folder and place the exploit as shown below. 29
  • 30. Step 2 of 3 • Place the exploit and ensure there are no space and quit the msfconsole. 30
  • 31. Step 3 of 3 • Use the exploit 31
  • 32. • Hackbar with Cyber-Fox – This bar will be useful when performing SQL injection attacks. 32
  • 33. Hackbar with Cyber-fox • Install cyberfox using below link and follow the steps: https://sourceforge.net/projects/cyberfox/files/Beta/Browser/Linux/ • • Remove Firefox, from your kali https://installlion.com/kali/kali/main/f/firefox-esr/uninstall/index.html 33
  • 34. Hackbar with Cyber-fox • Import Hack-Bar 34
  • 36. WHY ? • Within one terminal window you can open multiple windows and split-views • tmux keeps these windows and panes in a session. You can exit a session at any point. This is called “detaching”. tmux will keep this session alive until you kill the tmux server (e.g. when you reboot). This is incredibly useful because at any later point in time you can pick that session up exactly from where you left it by simply “attaching” to that session. 36
  • 37. Tmux installation • It is pre-installed in your kali • You can install it on your ubuntu or mac os using below commands sudo apt-get install tmux for ubuntu || brew install tmux for MAC • Tmux configuration is placed inside .tmux.conf file, which is a hidden file. We strongly recommend you to create your new tmux.conf file and place it in the root directory. • Vi /root/.tmux.conf and use the configuration from below link, provided by ippsec. https://gist.github.com/AvasDream/47f13a510e543009a50c8241276afc24 37
  • 38. Tmux installation • View the configuration. 38
  • 39. Tmux Operations • Create a new session • Create a new terminal: [ctrl + a] + c (new terminal) and to kill the terminal = prefix (ctrl+a)+ x 39
  • 40. Tmux Operations - Moves • Move 1: Swapping between the terminal 0 & 1= [ctrl + a] +0 || [ctrl + a] + 1 • Move 2: You might end up in a scenario, where you accidently closed a window. Using tmux, you can reconnect and process will begin, from exact point where you left. • View Tmux sessions • Attach to specific • Detach = Close or prefix + d 40
  • 41. Tmux Operations - Moves • Move 3: Delete the terminals: Right now we have two terminals, we can close the terminal by typing > exit or ctrl + d • Move 4: Within a single screen create split screens • vertical split : Prefix + % • Horizontal split : Prefix + “ 41
  • 42. Tmux Operations - Moves • Move 5: Moving between the screens cannot happen by clicking the mouse cursor in the terminal. Use Prefix + arrow sign ( <-- ) . • Move 6: To create random distribution between the shapes of the terminal use Prefix + Space Bar. • Move 7: To increase the width of the window use prefix + ctrl + arrow sign ( <-- ). • Move 8: Kill a specific terminal window : Prefix + x (same as killing the bigger terminal window) 42
  • 43. Tmux Operations - Moves • Move 9: Edit mode Scroll up and down : Prefix + [ Exit edit mode: Enter • Move 10: Search in the document: Prefix + ? (search up) Or Prefix / (search down) and press ‘n’ for next highlighted value. Note: This is important to search for keywords like password in the dump file. 43
  • 45. 45