SlideShare a Scribd company logo
1 of 45
Getting Started Kali Linux & Python
By Dhruv Sharma
1
Introduction
In this presentation we will understand:
• How to install Kali Linux.
• Assign an IP address.
• Shutdown the System.
• Install Terminator
• Introduction to Centos and setting up the web server.
• Introduction to Python.
• Getting started with Hack the Box.
2
Download
Use below link to download the required Kali Linux image.
https://www.kali.org/downloads/
We need to download an ISO Image.
3
Import the Image & Login
• Opt for Graphic Install
• Check for Python version on Kali.
4
Assign the IP Address
ifconfig eth0 192.168.1.5 netmask 255.255.255.0 up.
route add default gw 192.168.1.1.
5
Shutdown Kali
• Shutdown –h now
6
TMUX / Terminator [split windows]
7
Introduction to TMUX / Terminator
• System administrators often need to work on multiple consoles and thus they appreciate the
ability to switch from one to another in a snap with a quick keyboard shortcut or mouse click.
• Terminator is easy to install and it does exactly what it's supposed to do - it can split terminal
windows both horizontally and vertically, according to user's requirements. It also allows to keep
multiple tabs opened in case splitting one window is not enough.
8
• Centos linux
9
HTTP Service in Centos
• Drive 1
• Index.html needs to be created for hosting the website.
• Drive 2
• Httpd.conf file already exist
10
HTTP Service in Centos
• Index.html
11
HTTP Service in Centos
• httpd.conf file
12
HTTP Service in Centos
13
Remove CENTOS Firewall
• Website is not reachable from other systems due to a local firewall.
14
15
Few checkups
16
• Python
17
Python Installation
• Download Link: https://www.python.org/downloads/
• You can install Python either on Linux or Windows Operating system.
18
Python Installation
• View Version
• Python 2 and Python 3, both are installed on the Kali operating
system. If we run a program using #python <prog>.py, the code is
executed in python 2. If we want to execute the same in python 3
than use syntax - # python3 <prog>.py
19
• Hackthebox
20
Setup VPN on hack-the-box (1 of 3)
• Step 1: Login into Hack the box account & download the connection pack into Kali
Linux. Check out for cross under connected section.
21
Setup VPN on hack-the-box (2 of 3)
• Download the file and run the file as shown below.
22
Setup VPN on hack-the-box (3 of 3)
• Verify your connectivity.
23
24
HTB Benefits
• Hello All,
• We are excited to announce our support to (ISC)2 and becoming an official (ISC)2
CPE Submitter.
• This partnership is in line with our education strategy and we believe that it will
greatly benefit our community to demonstrate, prove and enhance their (ISC)2
certifications through their engagement and practice on Hack The Box.
• CPE Credits submission will be available to our VIP members. Our VIP members
can obtain credits, by completing Hack The Box Machines, Challenges, Endgames
and Pro Labs. In order to start tracking your activity and automatically get your
credits, you need to enable this option through your account settings.
• https://www.hackthebox.eu/press/view/8
25
• Metasploit
26
Import exploit
• In many situations we need to import exploit from internet into
metasploit.
• This guide will help you with the exploit.
27
Import exploit
• We cannot directly use an exploit from exploit.db with msfconsole.
• We need to import it.
28
Step 1 of 3
• Copy the exploit downloaded from internet or from exploit.db in below file location.
/usr/share/metasploit-framework/modules/exploits
• Based on the nature of exploit, create a folder and place the exploit as shown below.
29
Step 2 of 3
• Place the exploit and ensure there are no space and quit the msfconsole.
30
Step 3 of 3
• Use the exploit
31
• Hackbar with Cyber-Fox – This bar will be useful when performing
SQL injection attacks.
32
Hackbar with Cyber-fox
• Install cyberfox using below link and follow the steps:
https://sourceforge.net/projects/cyberfox/files/Beta/Browser/Linux/
•
• Remove Firefox, from your kali
https://installlion.com/kali/kali/main/f/firefox-esr/uninstall/index.html
33
Hackbar with Cyber-fox
• Import Hack-Bar
34
• Tmux
35
WHY ?
• Within one terminal window you can open multiple windows and
split-views
• tmux keeps these windows and panes in a session. You can exit a
session at any point. This is called “detaching”. tmux will keep this
session alive until you kill the tmux server (e.g. when you reboot).
This is incredibly useful because at any later point in time you can pick
that session up exactly from where you left it by simply “attaching” to
that session.
36
Tmux installation
• It is pre-installed in your kali
• You can install it on your ubuntu or mac os using below commands
sudo apt-get install tmux for ubuntu || brew install tmux for MAC
• Tmux configuration is placed inside .tmux.conf file, which is a hidden file. We
strongly recommend you to create your new tmux.conf file and place it in the
root directory.
• Vi /root/.tmux.conf and use the configuration from below link, provided by
ippsec.
https://gist.github.com/AvasDream/47f13a510e543009a50c8241276afc24
37
Tmux installation
• View the configuration.
38
Tmux Operations
• Create a new session
• Create a new terminal: [ctrl + a] + c (new terminal) and to kill the terminal =
prefix (ctrl+a)+ x
39
Tmux Operations - Moves
• Move 1: Swapping between the terminal 0 & 1= [ctrl + a] +0 || [ctrl + a] + 1
• Move 2: You might end up in a scenario, where you accidently closed a window. Using tmux, you
can reconnect and process will begin, from exact point where you left.
• View Tmux sessions
• Attach to specific
• Detach = Close or prefix + d
40
Tmux Operations - Moves
• Move 3: Delete the terminals: Right now we have two terminals, we can close the
terminal by typing > exit or ctrl + d
• Move 4: Within a single screen create split screens
• vertical split : Prefix + %
• Horizontal split : Prefix + “
41
Tmux Operations - Moves
• Move 5: Moving between the screens cannot happen by clicking the mouse
cursor in the terminal. Use Prefix + arrow sign ( <-- ) .
• Move 6: To create random distribution between the shapes of the terminal use
Prefix + Space Bar.
• Move 7: To increase the width of the window use prefix + ctrl + arrow sign ( <--
).
• Move 8: Kill a specific terminal window : Prefix + x (same as killing the bigger
terminal window)
42
Tmux Operations - Moves
• Move 9: Edit mode Scroll up and down : Prefix + [
Exit edit mode: Enter
• Move 10: Search in the document: Prefix + ? (search up) Or Prefix / (search down)
and press ‘n’ for next highlighted value.
Note: This is important to search for keywords like password in the dump file.
43
Reference
• https://www.youtube.com/watch?v=Lqehvpe_djs
44
45

More Related Content

Similar to Getting started kali linux

Project Malware AnalysisCS 6262 Project 3Agenda.docx
Project Malware AnalysisCS 6262 Project 3Agenda.docxProject Malware AnalysisCS 6262 Project 3Agenda.docx
Project Malware AnalysisCS 6262 Project 3Agenda.docxbriancrawford30935
 
Moksha - HTML5/CSS with Qt5+Snowshoe on AM335x
Moksha - HTML5/CSS with Qt5+Snowshoe on AM335xMoksha - HTML5/CSS with Qt5+Snowshoe on AM335x
Moksha - HTML5/CSS with Qt5+Snowshoe on AM335xPrabindh Sundareson
 
Iot Bootcamp - abridged - part 1
Iot Bootcamp - abridged - part 1Iot Bootcamp - abridged - part 1
Iot Bootcamp - abridged - part 1Marcus Tarquinio
 
Taishaun_OwnensCNS-533_Lab
Taishaun_OwnensCNS-533_LabTaishaun_OwnensCNS-533_Lab
Taishaun_OwnensCNS-533_LabTaishaun Owens
 
Docker Swarm secrets for creating great FIWARE platforms
Docker Swarm secrets for creating great FIWARE platformsDocker Swarm secrets for creating great FIWARE platforms
Docker Swarm secrets for creating great FIWARE platformsFederico Michele Facca
 
Breaking Smart Speakers: We are Listening to You.
Breaking Smart Speakers: We are Listening to You.Breaking Smart Speakers: We are Listening to You.
Breaking Smart Speakers: We are Listening to You.Priyanka Aash
 
INFA 620Lab 4 Firewall.docx
INFA 620Lab 4 Firewall.docxINFA 620Lab 4 Firewall.docx
INFA 620Lab 4 Firewall.docxjaggernaoma
 
Hacking Highly Secured Enterprise Environments by Zoltan Balazs
Hacking Highly Secured Enterprise Environments by Zoltan BalazsHacking Highly Secured Enterprise Environments by Zoltan Balazs
Hacking Highly Secured Enterprise Environments by Zoltan BalazsShakacon
 
Internal Pentest: from z3r0 to h3r0
Internal Pentest: from z3r0 to h3r0Internal Pentest: from z3r0 to h3r0
Internal Pentest: from z3r0 to h3r0marcioalma
 
Exploiting Client-Side Vulnerabilities and Establishing a VNC Session
Exploiting Client-Side Vulnerabilities and Establishing a VNC SessionExploiting Client-Side Vulnerabilities and Establishing a VNC Session
Exploiting Client-Side Vulnerabilities and Establishing a VNC SessionVishal Kumar
 
Creating Havoc using Human Interface Device
Creating Havoc using Human Interface DeviceCreating Havoc using Human Interface Device
Creating Havoc using Human Interface DevicePositive Hack Days
 
Tmux and Tmuxinator ~ Rise of the Machines
Tmux and Tmuxinator  ~ Rise of the MachinesTmux and Tmuxinator  ~ Rise of the Machines
Tmux and Tmuxinator ~ Rise of the MachinesBrian Loomis
 
Automating Post Exploitation with PowerShell
Automating Post Exploitation with PowerShellAutomating Post Exploitation with PowerShell
Automating Post Exploitation with PowerShellEnclaveSecurity
 
Exploiting Llinux Environment
Exploiting Llinux EnvironmentExploiting Llinux Environment
Exploiting Llinux EnvironmentEnrico Scapin
 
Webinar: Começando seus trabalhos com Machine Learning utilizando ferramentas...
Webinar: Começando seus trabalhos com Machine Learning utilizando ferramentas...Webinar: Começando seus trabalhos com Machine Learning utilizando ferramentas...
Webinar: Começando seus trabalhos com Machine Learning utilizando ferramentas...Embarcados
 
Tool Development 02 - Advanced WPF Controls
Tool Development 02 - Advanced WPF ControlsTool Development 02 - Advanced WPF Controls
Tool Development 02 - Advanced WPF ControlsNick Pruehs
 
Practical White Hat Hacker Training - Post Exploitation
Practical White Hat Hacker Training - Post ExploitationPractical White Hat Hacker Training - Post Exploitation
Practical White Hat Hacker Training - Post ExploitationPRISMA CSI
 
Course 102: Lecture 9: Input Output Internals
Course 102: Lecture 9: Input Output Internals Course 102: Lecture 9: Input Output Internals
Course 102: Lecture 9: Input Output Internals Ahmed El-Arabawy
 

Similar to Getting started kali linux (20)

Project Malware AnalysisCS 6262 Project 3Agenda.docx
Project Malware AnalysisCS 6262 Project 3Agenda.docxProject Malware AnalysisCS 6262 Project 3Agenda.docx
Project Malware AnalysisCS 6262 Project 3Agenda.docx
 
Moksha - HTML5/CSS with Qt5+Snowshoe on AM335x
Moksha - HTML5/CSS with Qt5+Snowshoe on AM335xMoksha - HTML5/CSS with Qt5+Snowshoe on AM335x
Moksha - HTML5/CSS with Qt5+Snowshoe on AM335x
 
Iot Bootcamp - abridged - part 1
Iot Bootcamp - abridged - part 1Iot Bootcamp - abridged - part 1
Iot Bootcamp - abridged - part 1
 
Taishaun_OwnensCNS-533_Lab
Taishaun_OwnensCNS-533_LabTaishaun_OwnensCNS-533_Lab
Taishaun_OwnensCNS-533_Lab
 
Docker Swarm secrets for creating great FIWARE platforms
Docker Swarm secrets for creating great FIWARE platformsDocker Swarm secrets for creating great FIWARE platforms
Docker Swarm secrets for creating great FIWARE platforms
 
Breaking Smart Speakers: We are Listening to You.
Breaking Smart Speakers: We are Listening to You.Breaking Smart Speakers: We are Listening to You.
Breaking Smart Speakers: We are Listening to You.
 
INFA 620Lab 4 Firewall.docx
INFA 620Lab 4 Firewall.docxINFA 620Lab 4 Firewall.docx
INFA 620Lab 4 Firewall.docx
 
Hacking Highly Secured Enterprise Environments by Zoltan Balazs
Hacking Highly Secured Enterprise Environments by Zoltan BalazsHacking Highly Secured Enterprise Environments by Zoltan Balazs
Hacking Highly Secured Enterprise Environments by Zoltan Balazs
 
Internal Pentest: from z3r0 to h3r0
Internal Pentest: from z3r0 to h3r0Internal Pentest: from z3r0 to h3r0
Internal Pentest: from z3r0 to h3r0
 
Exploiting Client-Side Vulnerabilities and Establishing a VNC Session
Exploiting Client-Side Vulnerabilities and Establishing a VNC SessionExploiting Client-Side Vulnerabilities and Establishing a VNC Session
Exploiting Client-Side Vulnerabilities and Establishing a VNC Session
 
Creating Havoc using Human Interface Device
Creating Havoc using Human Interface DeviceCreating Havoc using Human Interface Device
Creating Havoc using Human Interface Device
 
Tmux and Tmuxinator ~ Rise of the Machines
Tmux and Tmuxinator  ~ Rise of the MachinesTmux and Tmuxinator  ~ Rise of the Machines
Tmux and Tmuxinator ~ Rise of the Machines
 
Automating Post Exploitation with PowerShell
Automating Post Exploitation with PowerShellAutomating Post Exploitation with PowerShell
Automating Post Exploitation with PowerShell
 
Exploiting Llinux Environment
Exploiting Llinux EnvironmentExploiting Llinux Environment
Exploiting Llinux Environment
 
DSA Day 2 PPT.pdf
DSA Day 2 PPT.pdfDSA Day 2 PPT.pdf
DSA Day 2 PPT.pdf
 
Webinar: Começando seus trabalhos com Machine Learning utilizando ferramentas...
Webinar: Começando seus trabalhos com Machine Learning utilizando ferramentas...Webinar: Começando seus trabalhos com Machine Learning utilizando ferramentas...
Webinar: Começando seus trabalhos com Machine Learning utilizando ferramentas...
 
Tool Development 02 - Advanced WPF Controls
Tool Development 02 - Advanced WPF ControlsTool Development 02 - Advanced WPF Controls
Tool Development 02 - Advanced WPF Controls
 
Practical White Hat Hacker Training - Post Exploitation
Practical White Hat Hacker Training - Post ExploitationPractical White Hat Hacker Training - Post Exploitation
Practical White Hat Hacker Training - Post Exploitation
 
Course 102: Lecture 9: Input Output Internals
Course 102: Lecture 9: Input Output Internals Course 102: Lecture 9: Input Output Internals
Course 102: Lecture 9: Input Output Internals
 
Deploying your app.pptx
Deploying your app.pptxDeploying your app.pptx
Deploying your app.pptx
 

More from Dhruv Sharma

RAVPN EAP-IKEv2 VPN.pptx
RAVPN EAP-IKEv2 VPN.pptxRAVPN EAP-IKEv2 VPN.pptx
RAVPN EAP-IKEv2 VPN.pptxDhruv Sharma
 
Load Balance with NSX-T.pptx
Load Balance with NSX-T.pptxLoad Balance with NSX-T.pptx
Load Balance with NSX-T.pptxDhruv Sharma
 
NSX_Troubleshooting.pptx
NSX_Troubleshooting.pptxNSX_Troubleshooting.pptx
NSX_Troubleshooting.pptxDhruv Sharma
 
ASA VPN_Certificate authentication_ISE Authorization.pptx
ASA VPN_Certificate authentication_ISE Authorization.pptxASA VPN_Certificate authentication_ISE Authorization.pptx
ASA VPN_Certificate authentication_ISE Authorization.pptxDhruv Sharma
 
Setting up CDP (Cisco Discovery Protocol) between Cisco IOS and VMware Virtua...
Setting up CDP (Cisco Discovery Protocol) between Cisco IOS and VMware Virtua...Setting up CDP (Cisco Discovery Protocol) between Cisco IOS and VMware Virtua...
Setting up CDP (Cisco Discovery Protocol) between Cisco IOS and VMware Virtua...Dhruv Sharma
 
Routebased-Policybased VPN.pptx
Routebased-Policybased VPN.pptxRoutebased-Policybased VPN.pptx
Routebased-Policybased VPN.pptxDhruv Sharma
 
Ansible Network Automation session1
Ansible Network Automation session1Ansible Network Automation session1
Ansible Network Automation session1Dhruv Sharma
 
Setting up Cisco WSA Proxy in Transparent and Explicit Mode
Setting up Cisco WSA Proxy in Transparent and Explicit ModeSetting up Cisco WSA Proxy in Transparent and Explicit Mode
Setting up Cisco WSA Proxy in Transparent and Explicit ModeDhruv Sharma
 
Factory setup wsa_9.2_v1.0
Factory setup wsa_9.2_v1.0Factory setup wsa_9.2_v1.0
Factory setup wsa_9.2_v1.0Dhruv Sharma
 
Tacacs+ with ise 2.4_ CCIE
Tacacs+ with ise 2.4_ CCIE Tacacs+ with ise 2.4_ CCIE
Tacacs+ with ise 2.4_ CCIE Dhruv Sharma
 
Get vpn multicast for CCIE Security
Get vpn multicast for CCIE SecurityGet vpn multicast for CCIE Security
Get vpn multicast for CCIE SecurityDhruv Sharma
 
Route tags with OSPF
Route tags with OSPFRoute tags with OSPF
Route tags with OSPFDhruv Sharma
 
Aci vmware integration_youtube
Aci vmware integration_youtubeAci vmware integration_youtube
Aci vmware integration_youtubeDhruv Sharma
 
Introduction to nexux from zero to Hero
Introduction to nexux  from zero to HeroIntroduction to nexux  from zero to Hero
Introduction to nexux from zero to HeroDhruv Sharma
 
Cisco umbrella youtube
Cisco umbrella youtubeCisco umbrella youtube
Cisco umbrella youtubeDhruv Sharma
 
GTM vs AWS Route 53 with Cisco umbrella
GTM vs AWS Route 53 with Cisco umbrellaGTM vs AWS Route 53 with Cisco umbrella
GTM vs AWS Route 53 with Cisco umbrellaDhruv Sharma
 
Setting up VPN between F5 LTM & ASA
Setting up VPN between F5 LTM & ASASetting up VPN between F5 LTM & ASA
Setting up VPN between F5 LTM & ASADhruv Sharma
 
Unquoted service path exploitation
Unquoted service path exploitationUnquoted service path exploitation
Unquoted service path exploitationDhruv Sharma
 

More from Dhruv Sharma (18)

RAVPN EAP-IKEv2 VPN.pptx
RAVPN EAP-IKEv2 VPN.pptxRAVPN EAP-IKEv2 VPN.pptx
RAVPN EAP-IKEv2 VPN.pptx
 
Load Balance with NSX-T.pptx
Load Balance with NSX-T.pptxLoad Balance with NSX-T.pptx
Load Balance with NSX-T.pptx
 
NSX_Troubleshooting.pptx
NSX_Troubleshooting.pptxNSX_Troubleshooting.pptx
NSX_Troubleshooting.pptx
 
ASA VPN_Certificate authentication_ISE Authorization.pptx
ASA VPN_Certificate authentication_ISE Authorization.pptxASA VPN_Certificate authentication_ISE Authorization.pptx
ASA VPN_Certificate authentication_ISE Authorization.pptx
 
Setting up CDP (Cisco Discovery Protocol) between Cisco IOS and VMware Virtua...
Setting up CDP (Cisco Discovery Protocol) between Cisco IOS and VMware Virtua...Setting up CDP (Cisco Discovery Protocol) between Cisco IOS and VMware Virtua...
Setting up CDP (Cisco Discovery Protocol) between Cisco IOS and VMware Virtua...
 
Routebased-Policybased VPN.pptx
Routebased-Policybased VPN.pptxRoutebased-Policybased VPN.pptx
Routebased-Policybased VPN.pptx
 
Ansible Network Automation session1
Ansible Network Automation session1Ansible Network Automation session1
Ansible Network Automation session1
 
Setting up Cisco WSA Proxy in Transparent and Explicit Mode
Setting up Cisco WSA Proxy in Transparent and Explicit ModeSetting up Cisco WSA Proxy in Transparent and Explicit Mode
Setting up Cisco WSA Proxy in Transparent and Explicit Mode
 
Factory setup wsa_9.2_v1.0
Factory setup wsa_9.2_v1.0Factory setup wsa_9.2_v1.0
Factory setup wsa_9.2_v1.0
 
Tacacs+ with ise 2.4_ CCIE
Tacacs+ with ise 2.4_ CCIE Tacacs+ with ise 2.4_ CCIE
Tacacs+ with ise 2.4_ CCIE
 
Get vpn multicast for CCIE Security
Get vpn multicast for CCIE SecurityGet vpn multicast for CCIE Security
Get vpn multicast for CCIE Security
 
Route tags with OSPF
Route tags with OSPFRoute tags with OSPF
Route tags with OSPF
 
Aci vmware integration_youtube
Aci vmware integration_youtubeAci vmware integration_youtube
Aci vmware integration_youtube
 
Introduction to nexux from zero to Hero
Introduction to nexux  from zero to HeroIntroduction to nexux  from zero to Hero
Introduction to nexux from zero to Hero
 
Cisco umbrella youtube
Cisco umbrella youtubeCisco umbrella youtube
Cisco umbrella youtube
 
GTM vs AWS Route 53 with Cisco umbrella
GTM vs AWS Route 53 with Cisco umbrellaGTM vs AWS Route 53 with Cisco umbrella
GTM vs AWS Route 53 with Cisco umbrella
 
Setting up VPN between F5 LTM & ASA
Setting up VPN between F5 LTM & ASASetting up VPN between F5 LTM & ASA
Setting up VPN between F5 LTM & ASA
 
Unquoted service path exploitation
Unquoted service path exploitationUnquoted service path exploitation
Unquoted service path exploitation
 

Recently uploaded

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Getting started kali linux

  • 1. Getting Started Kali Linux & Python By Dhruv Sharma 1
  • 2. Introduction In this presentation we will understand: • How to install Kali Linux. • Assign an IP address. • Shutdown the System. • Install Terminator • Introduction to Centos and setting up the web server. • Introduction to Python. • Getting started with Hack the Box. 2
  • 3. Download Use below link to download the required Kali Linux image. https://www.kali.org/downloads/ We need to download an ISO Image. 3
  • 4. Import the Image & Login • Opt for Graphic Install • Check for Python version on Kali. 4
  • 5. Assign the IP Address ifconfig eth0 192.168.1.5 netmask 255.255.255.0 up. route add default gw 192.168.1.1. 5
  • 7. TMUX / Terminator [split windows] 7
  • 8. Introduction to TMUX / Terminator • System administrators often need to work on multiple consoles and thus they appreciate the ability to switch from one to another in a snap with a quick keyboard shortcut or mouse click. • Terminator is easy to install and it does exactly what it's supposed to do - it can split terminal windows both horizontally and vertically, according to user's requirements. It also allows to keep multiple tabs opened in case splitting one window is not enough. 8
  • 10. HTTP Service in Centos • Drive 1 • Index.html needs to be created for hosting the website. • Drive 2 • Httpd.conf file already exist 10
  • 11. HTTP Service in Centos • Index.html 11
  • 12. HTTP Service in Centos • httpd.conf file 12
  • 13. HTTP Service in Centos 13
  • 14. Remove CENTOS Firewall • Website is not reachable from other systems due to a local firewall. 14
  • 15. 15
  • 18. Python Installation • Download Link: https://www.python.org/downloads/ • You can install Python either on Linux or Windows Operating system. 18
  • 19. Python Installation • View Version • Python 2 and Python 3, both are installed on the Kali operating system. If we run a program using #python <prog>.py, the code is executed in python 2. If we want to execute the same in python 3 than use syntax - # python3 <prog>.py 19
  • 21. Setup VPN on hack-the-box (1 of 3) • Step 1: Login into Hack the box account & download the connection pack into Kali Linux. Check out for cross under connected section. 21
  • 22. Setup VPN on hack-the-box (2 of 3) • Download the file and run the file as shown below. 22
  • 23. Setup VPN on hack-the-box (3 of 3) • Verify your connectivity. 23
  • 24. 24
  • 25. HTB Benefits • Hello All, • We are excited to announce our support to (ISC)2 and becoming an official (ISC)2 CPE Submitter. • This partnership is in line with our education strategy and we believe that it will greatly benefit our community to demonstrate, prove and enhance their (ISC)2 certifications through their engagement and practice on Hack The Box. • CPE Credits submission will be available to our VIP members. Our VIP members can obtain credits, by completing Hack The Box Machines, Challenges, Endgames and Pro Labs. In order to start tracking your activity and automatically get your credits, you need to enable this option through your account settings. • https://www.hackthebox.eu/press/view/8 25
  • 27. Import exploit • In many situations we need to import exploit from internet into metasploit. • This guide will help you with the exploit. 27
  • 28. Import exploit • We cannot directly use an exploit from exploit.db with msfconsole. • We need to import it. 28
  • 29. Step 1 of 3 • Copy the exploit downloaded from internet or from exploit.db in below file location. /usr/share/metasploit-framework/modules/exploits • Based on the nature of exploit, create a folder and place the exploit as shown below. 29
  • 30. Step 2 of 3 • Place the exploit and ensure there are no space and quit the msfconsole. 30
  • 31. Step 3 of 3 • Use the exploit 31
  • 32. • Hackbar with Cyber-Fox – This bar will be useful when performing SQL injection attacks. 32
  • 33. Hackbar with Cyber-fox • Install cyberfox using below link and follow the steps: https://sourceforge.net/projects/cyberfox/files/Beta/Browser/Linux/ • • Remove Firefox, from your kali https://installlion.com/kali/kali/main/f/firefox-esr/uninstall/index.html 33
  • 34. Hackbar with Cyber-fox • Import Hack-Bar 34
  • 36. WHY ? • Within one terminal window you can open multiple windows and split-views • tmux keeps these windows and panes in a session. You can exit a session at any point. This is called “detaching”. tmux will keep this session alive until you kill the tmux server (e.g. when you reboot). This is incredibly useful because at any later point in time you can pick that session up exactly from where you left it by simply “attaching” to that session. 36
  • 37. Tmux installation • It is pre-installed in your kali • You can install it on your ubuntu or mac os using below commands sudo apt-get install tmux for ubuntu || brew install tmux for MAC • Tmux configuration is placed inside .tmux.conf file, which is a hidden file. We strongly recommend you to create your new tmux.conf file and place it in the root directory. • Vi /root/.tmux.conf and use the configuration from below link, provided by ippsec. https://gist.github.com/AvasDream/47f13a510e543009a50c8241276afc24 37
  • 38. Tmux installation • View the configuration. 38
  • 39. Tmux Operations • Create a new session • Create a new terminal: [ctrl + a] + c (new terminal) and to kill the terminal = prefix (ctrl+a)+ x 39
  • 40. Tmux Operations - Moves • Move 1: Swapping between the terminal 0 & 1= [ctrl + a] +0 || [ctrl + a] + 1 • Move 2: You might end up in a scenario, where you accidently closed a window. Using tmux, you can reconnect and process will begin, from exact point where you left. • View Tmux sessions • Attach to specific • Detach = Close or prefix + d 40
  • 41. Tmux Operations - Moves • Move 3: Delete the terminals: Right now we have two terminals, we can close the terminal by typing > exit or ctrl + d • Move 4: Within a single screen create split screens • vertical split : Prefix + % • Horizontal split : Prefix + “ 41
  • 42. Tmux Operations - Moves • Move 5: Moving between the screens cannot happen by clicking the mouse cursor in the terminal. Use Prefix + arrow sign ( <-- ) . • Move 6: To create random distribution between the shapes of the terminal use Prefix + Space Bar. • Move 7: To increase the width of the window use prefix + ctrl + arrow sign ( <-- ). • Move 8: Kill a specific terminal window : Prefix + x (same as killing the bigger terminal window) 42
  • 43. Tmux Operations - Moves • Move 9: Edit mode Scroll up and down : Prefix + [ Exit edit mode: Enter • Move 10: Search in the document: Prefix + ? (search up) Or Prefix / (search down) and press ‘n’ for next highlighted value. Note: This is important to search for keywords like password in the dump file. 43
  • 45. 45