3.10 Kali Linux

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
6 hours 28 minutes
Difficulty
Intermediate
CEU/CPE
7
Video Transcription
00:00
>> Welcome back to the Cybrary course
00:00
in building your Infosec lab.
00:00
I'm your host and instructor,
00:00
>> Kevin Hernandez.
00:00
>> In our previous lessons,
00:00
we've been installing all our SIEM variants.
00:00
We looked at Curator, Splunk,
00:00
>> and specifically in our last lesson, OSSIM.
00:00
>> In a corporate environment,
00:00
this is a tool where all the different locks sources
00:00
>> from firewalls to data loss prevention tools
00:00
>> will send their lock suit.
00:00
Correlation happens within this engine
00:00
>> and we can have a more general overview
00:00
>> of what's occurring in our network.
00:00
In today's lesson, we'll be installing Kali Linux,
00:00
a pen testing operating
00:00
system developed by Offensive Security.
00:00
Kali is a well-known system throughout
00:00
the information security field
00:00
that is adopted by many experts.
00:00
If you look for information security lapse,
00:00
most likely you'll end up in a Kali lab configuration
00:00
>> rather than a security engineering.
00:00
>> Now let's get started.
00:00
>> One of the most, if not
00:00
the most popular pen
00:00
testing tool and ethical hacking tool
00:00
it's Kali Linux.
00:00
It doesn't mean necessarily that
00:00
>> it's the best out there,
00:00
>> however, is the most recognized
00:00
>> and the one with the most following.
00:00
>> The best of all is that it is completely free.
00:00
Let's go ahead and download Kali Linux here.
00:00
You have different variants, 64 bits, 32 bits,
00:00
>> you have to HTTP version and a torrent version.
00:00
>> Therefore, you don't have to go
00:00
to any of the installation,
00:00
just download the image
00:00
>> and spin it up in your VMware,
00:00
>> so let's go ahead and try that.
00:00
>> Here we go.
00:00
>> Offensive Security.
00:00
These are the people that produce this software
00:00
>> and you see you have both VMware
00:00
>> and VirtualBox images.
00:00
>> In this case, since ESXi is part of VMware,
00:00
we're going to download that version.
00:00
However, we're going to run these
00:00
>> in our personal computers.
00:00
>> Let's go ahead.
00:00
>> Kali Linux, 64-bit subset.
00:00
7z, sorry, it's basically that it requires
00:00
7-Zip to uncompress.
00:00
Now let's look into some set real quick.
00:00
7-Zip is basically a free archiving tool.
00:00
Now all you have to do really is click
00:00
"Download" and that's pretty much it.
00:00
>> Tool's pretty simple.
00:00
>> You can see, it's right here.
00:00
The thing I like about 7-Zip is that, for example,
00:00
the thing about 7-Zip is V or
00:00
right-click and extract all,
00:00
it will probably use the Windows compression tool.
00:00
However, 7-Zip to actually
00:00
drop down into its menus and extract files here.
00:00
One of the things I like is that
00:00
>> if you add it to our archive,
00:00
>> you can actually password protect this with AES 256.
00:00
Not only that, you can also break this
00:00
>> into smaller chunk files
00:00
>> if there are size limitations
00:00
>> in whatever you're trying to transfer.
00:00
>> A really good tool, especially for the cost.
00:00
Now let's go ahead
00:00
>> and give Kali Linux a chance to download.
00:00
>> Kali Linux has since downloaded,
00:00
let's go ahead and extract it, 7-Zip.
00:00
Let's wait for the process to finish.
00:00
Now what I like about this is
00:00
it's already pre-configured, pre-installed.
00:00
You don't have to do anything.
00:00
I cannot say that enough.
00:00
You can save so many headaches.
00:00
Even though this software itself is not complex,
00:00
all the tools are not as friendly as this one,
00:00
therefore, I really appreciate this.
00:00
Here we are.
00:00
>> Fully downloaded right here.
00:00
>> You can see it has a lot of information here.
00:00
Let's go ahead and pick up the image right here.
00:00
As you can see, it's already loading
00:00
>> and I say, I copied it.
00:00
>> This is in my personal computer
00:00
>> would be in where player,
00:00
>> which is completely free of cost.
00:00
The default is root S username
00:00
and the password is toor or T-O-O-R,
00:00
which is root backwards
00:00
>> and here we go.
00:00
>> This is Kali Linux.
00:00
>> Today's lesson,
00:00
>> we basically installed Kali Linux within our box.
00:00
As I mentioned before,
00:00
this is a pen testing tool
00:00
>> which will help us identifying
00:00
>> and exploiting potential vulnerabilities
00:00
>> within our network.
00:00
>> In our next lesson,
00:00
>> we'll install our SIFT - Forensics tool
00:00
>> an operating system as well.
00:00
>> I hope to see you soon.
00:00
>> Have a great day.
Up Next