Lab 1: Kali Linux (Tiger Box) : Objectives
Lab 1: Kali Linux (Tiger Box) : Objectives
Objectives In this practical you will set up your lab PC for course related
practical activities. The setup primarily involves the installation of
relevant software tools.
CLO: 3
Duration: 60min+
Requirements Lab PC
Lab Files: Software tools:
o Kali Linux
Student Notes
1 | Intrusion Detection | Lab Student Manual | Dr. Samer Aoudi | Updated September 2018
The Security Lab
Lab Resources:
VM Workstation (or Player): This will be our main virtual machine
software
PC: High-end PCs will be used. All software should be installed on these
machines (RAM –Minimum 8GB –Recommended 16GB. Storage –
Minimum 50GB –Recommended 100+GB)
SW Tools: Relevant software tools will be provided
Student Requirements:
Backup Disk: It is highly recommended that you backup your lab work
2 | Intrusion Detection | Lab Student Manual | Dr. Samer Aoudi | Updated September 2018
Task 1: Install Kali Linux
Task Objectives
You will install Kali Linux as the Tiger Box for the course
Kali Linux is a free open source toolbox with more than 600 penetration testing
tools included. Kali Linux will be our main tiger box (toolbox) for the course.
Kali Linux is an open source project that is maintained and funded by Offensive
Security. In addition to Kali Linux, Offensive Security also maintains the Exploit
Database and the free online course, Metasploit Unleashed.
Screenshots and steps in this lab are based on Kali Linux 2018.3 AMD 64 bits,
and VMWare Workstation 14 Pro.
1. Download the latest Kali ISO image from the Kali website (kali-linux-2018.3-
amd64.iso is the version used in this lab activity)
2. Open VMware Workstation and create a new virtual Machine (File New Virtual
Machine…)
5. For the Operating System, select Linux and from the dropdown menu, select Debian
(any version since Kali is a ‘Debian-like’ distribution), and click Next
3 | Intrusion Detection | Lab Student Manual | Dr. Samer Aoudi | Updated September 2018
RAM 4
6. Type Kali 2018.3 as the VM name and note the default location folder (don’t change
it), then click Next
The default folder is where all your VMs should be in case you copied or moved
a machine later in the course.
7. The default size of 20GB should be enough. Keep the defaults and click Next
We will change the memory (RAM) in the next step. The default of 512 MB is not
enough.
4 | Intrusion Detection | Lab Student Manual | Dr. Samer Aoudi | Updated September 2018
9. Click the Edit virtual machine settings to change the memory to 2048 MB (2GB) as
shown below
13. Leave the default language (English), country (OtherAsiaUnited Arab Emirates),
locale United States, and keyboard (American English)
14. For the hostname, type kaliyourname (e.g. kalisamer) and continue
5 | Intrusion Detection | Lab Student Manual | Dr. Samer Aoudi | Updated September 2018
15. Leave the domain name empty and continue
16. Type password (all lowercase) as the root password, re-enter and continue
20. Let the system finish installing, and when done, select No for network mirror
21. Select Yes to install GRUB boot loader and continue to choose the device as shown
below (/dev/sda)
22. When the installation is complete, click Continue for the final cleanup
23. Click the I Finished Installing button at the bottom of your VMWare window. If you
cannot see this button, ignore this step
24. The system will restart. Login using root/password as the credentials
Notice that the Kali VM window will be relatively small and visually may not be
very practical (depending on the resolution of your host computer).
6 | Intrusion Detection | Lab Student Manual | Dr. Samer Aoudi | Updated September 2018
Kali VM Window
7 | Intrusion Detection | Lab Student Manual | Dr. Samer Aoudi | Updated September 2018
Task 2: Customize Kali
Task Objectives
You will get familiar with the Kali GUI
You will customize Kali
1. From VMWare, click the VM menu and select Install VMware Tools
8 | Intrusion Detection | Lab Student Manual | Dr. Samer Aoudi | Updated September 2018
8. Right-click any empty point in the folder and click Open in Terminal
9. In the terminal window, run the command shown below
./vmware-install.pl
10. During the installation, you will be prompted for file locations, accept the defaults by
hitting Enter on each prompt
11. You will be asked for configuration questions, accept the default by hitting Enter on
each prompt
12. When done, shutdown your Kali VM
13. If you haven’t done so already, select the Autofit Guest option as shown below
Kali VM Window
15. Try to copy/paste or drag-and-drop files between your host computer and your
guest VM
9 | Intrusion Detection | Lab Student Manual | Dr. Samer Aoudi | Updated September 2018
Task 3: Kali GUI
Task Objectives
You will get familiar with the Kali GUI
1. Open the web browser and ensure you have an internet connection
2. Get familiar with Kali’s user interface and answer the questions below
3. Kali Linux supports what is known as workspace (shown below). Research Linux
Workspace and write your findings in the space below:
What is a Linux
Workspace?
10 | Intrusion Detection | Lab Student Manual | Dr. Samer Aoudi | Updated September 2018
5. Click the Show Applications icon
Notice that the screenshot shows 3 pages of applications, and that they are
searchable.
7. In the search field, type metasploit and notice how as you type, the application
appears
8. Let’s turn off the screen lock in our Kali. Type screen lock in the search field and then
select the Privacy setting
Select Privacy
11 | Intrusion Detection | Lab Student Manual | Dr. Samer Aoudi | Updated September 2018
9. Turn off the screen lock as shown below and then close the privacy settings window
12 | Intrusion Detection | Lab Student Manual | Dr. Samer Aoudi | Updated September 2018
Task 4: Kali Linux Terminal and Shell
Task Objectives
You will use Linux commands and discover what they do
In Linux, the Terminal is a window that allows you to write commands and
execute.
When the Terminal opens, it would have a program running in it called bash,
which is a shell that can interpret and execute commands. The output is sent
back to the Terminal.
Most of our work will be through the Terminal and its Shell, using commands.
1. Independent Step:
Open a Terminal window and find out how you zoom in and out using keyboard
shortcuts (Hint: Preferences)
man: Linux man pages help to explain what each command can do. Each man
page should give you a general overview of the command, its flags (options) and
possibly an example of how to use it.
In practical exams, you are allowed to use the man pages and the help system.
2. In your Terminal, open a new tab (not a new window), and run the following
command: man ifconfig
3. Try: help ifconfig (did it work?)
4. Independent Step:
13 | Intrusion Detection | Lab Student Manual | Dr. Samer Aoudi | Updated September 2018
Using man and/or help, find out about the following commands, and write down
what each command does:
clear
cd
ls
mkdir
tar
pwd
7. Type the following command (note you should be inside the Desktop directory; also
note the space)
10. What are the contents of the Desktop directory? And what command did you use?
11. Type the following command (replace Samer with your name)
12. Type the following command (note that you should be in your name folder)
14 | Intrusion Detection | Lab Student Manual | Dr. Samer Aoudi | Updated September 2018
15. After the above command, try the pwd command again. What is the output?
16. Using one command change the directory from the root / folder to the folder you
created earlier on the Desktop (your name). What command did you use?
cd root/Desktop/Samer
17. Start the web browser
18. Minimize the browser but keep it open
19. Go back to the terminal window and clear it
20. Type the following command
21. Scroll down until you find firefox-esr and write down the PID (process ID):
22. Type the following command (basically, we filtering the output with results that
contain “fire”)
23. Now, we want to kill the firefox process using the kill command. Find out how it’s
done. What command did you use?
15 | Intrusion Detection | Lab Student Manual | Dr. Samer Aoudi | Updated September 2018
Review Questions
The following questions are based on the information and activities performed
in the activity you just completed.
3. If you want to find out more about a command or utility in Linux, what tool(s)
would you use?
A. help
B. man
C. help or man
D. ?
4. Which one of the following is NOT an option for the VM Network Adaptor setting
in VMware Workstation?
A. Internal
B. Bridged
C. NAT
D. Host-Only
5. How many categories of tools are available in the current Kali distribution?
A. 12
B. 5
C. 8
D. 14
16 | Intrusion Detection | Lab Student Manual | Dr. Samer Aoudi | Updated September 2018