Lab 2 - Installing the Security Workstation Virtual Machine (Kali Linux)
.docx
keyboard_arrow_up
School
Community College of Philadelphia *
*We aren’t endorsed by this school
Course
152
Subject
Information Systems
Date
Apr 3, 2024
Type
docx
Pages
5
Uploaded by thebigd130
Lab 2 – Installing the Security Workstation Virtual Machine Objectives
Part 1: Prepare a Personal Computer for Virtualization
Part 2: Import a Virtual Machine into VirtualBox Inventory
Background / Scenario
Computing power and resources have increased tremendously over the last 10 years. A benefit of having multicore processors and large amounts of RAM is the ability to use virtualization. With virtualization, one or more virtual computers operate inside one physical computer. Virtual computers that run within physical computers are called virtual machines. Virtual machines are often called guests, and physical computers are often called hosts. Anyone with a modern computer and operating system can run virtual machines.
A virtual machine image file has been created for you to install on your computer. In this lab, you will download and import this image file using a desktop virtualization application, such as VirtualBox.
Required Resources
Computer with a minimum of 2 GB of RAM and 8 GB of free disk space
High speed Internet access to download Oracle VirtualBox and the virtual machine image file
Part 1: Prepare a Host Computer for Virtualization
In Part 1, you will download and install desktop virtualization software, and also download an image file that can be used to complete labs throughout the course. For this lab, the virtual machine is running Linux.
Step 1: Open Oracle VirtualBox.
VMware Player, Microsoft Virtual PC and Oracle VirtualBox are two virtualization programs that you can download and install to support the image file. In this lab, you will use VirtualBox.
a.
If you haven’t installed Oracle VirtualBox, you can download the program and install it. https://www.virtualbox.org/wiki/Downloads
- You can install either Windows version or MAC.
b.
Once you have installed the Oracle VirtualBox program, you can then launch the program
c.
You are now ready to install OS.
Step 2: Download the Virtual Machine image file.
The image file was created in accordance with the Open Virtualization Format (OVA or OVF). OVF is an open
standard for packaging and distributing virtual appliances. An OVF package has several files placed into one directory. This directory is then distributed as an OVA package. This package contains all of the OVF files necessary for the deployment of the virtual machine. The virtual machine used in this lab was exported in accordance with the OVF standard.
You can now download the Kali Linux image file for Oracle VirtualBox - https://www.kali.org/get-kali/#kali-
virtual-machines
. You will need to extract the file first in a folder once downloaded.
Part 2: Import the Virtual Machine into the VirtualBox Inventory
In Part 2, you will import the virtual machine image into VirtualBox and start the virtual machine.
Step 1: Import the virtual machine file into VirtualBox.
a.
Open VirtualBox
. Click File
>
Import Appliance...
to import the virtual machine image.
Page 1
of 5
Lab 2 - Installing the Security Workstation Virtual Machine
b.
A new window will appear. Specify the location of the .OVA file and click Next
.
c.
A new window will appear presenting the settings suggested in the OVA archive. Check the "Reinitialize the MAC address of all network cards"
box at bottom of the window. Leave all other settings as default.
Click Import
.
d.
When the import process is complete, you will see the new Virtual Machine added to the VirtualBox inventory in the left panel. The virtual machine is now ready to use.
Step 2: Start the virtual machine and log in.
a.
Select the Kali Workstation
virtual machine.
b.
Click the green arrow Start
button at the top portion of the VirtualBox application window. If you get the following dialog box, click Change Network Settings
and set your Bridged Adapter. Click the dropdown list next the Name and choose your network adapter (
will vary for each computer
). Note
: If your network is not configured with DHCP services, click Change Network Settings and select NAT in the Attached to dropdown box. The network settings can also be access via Settings
in the Oracle VirtualBox Manager or in the virtual machine menu, select Devices > Network >
Network Settings
. You may need to disable and enable the network adaptor for the change to take effect.
c.
Click OK
. A new window will appear, and the virtual machine boot process will start.
d.
When the boot process is complete, the virtual machine will ask for a username and password. Use the following credentials to log into the virtual machine:
Username: kali
Page 2
of 5
Lab 2 - Installing the Security Workstation Virtual Machine
Password: kali
You will be presented with a desktop environment: there is a launcher bar at the bottom, icons on the desktop, and an application menu at the top.
Note
: The window running the virtual machine is a completely different computer than your host. Functions, such as copy and paste, will not work between the two without special software tools installed. Notice the keyboard and mouse focus. When you click inside the virtual machine window, your mouse and keyboard will operate the guest operating system. Your host operating system will no longer detect keystrokes or mouse movements. Press the right CTRL key to return keyboard and mouse focus to the host operating system.
Step 3: Familiarize yourself with the Virtual Machine.
The virtual machine you just installed can be used to complete many of the labs in this course. Familiarize yourself with the icons in the list below:
The launcher bar icons are (from left to right):
Show the desktop
Terminal application
File manager application
Web browser application (Firefox)
File search tool
Current user's home directory
All course related applications are located under Applications Menu
>
kali
a.
List the applications in the root menu.
The applications in the root menu are About Xfce, Accessibility, Advanced Network Configuration, aircrack-ng, Appearance, Application Finder, arping, Atril Document Viewer, autopsy (root), binwalk, blkcalc, blkcat, blkls, blkstat, Bluetooth Adapters, Bluetooth Manager, bulk_extractor, Bulk Rename, bully,
burpsuite, cadaver, Catfish File Search, cewl, CherryTree, chntpw, clang, clang++, Clipboard Manager, Clipboard Manager Settings, Color Profiles, commix, crackmapexec, crunch, cutycapt, davtest, dbd, Default Applications, Desktop, dirb, dirbuster, Display, dmitry, dns2tcpc, dns2tcpd, dnschef, dnsenum, dnsrecon, Engrampa Archive Manager, enum4linux, ettercap-graphical, evil-winrm, exe2hex, Exploit Database, faraday start, faraday stop, fern wifi cracker (root), ffind, ffuf, fierce, File Manager, File Manager Settings, Firefox ESR, fls, fping, fsstat, GParted, guymager (root), Hardware Locality Istopo, hashcat, hashdeep, hashid, hash-identifier, hfind, hping3, hydra, hydra-graphical, icat-sleuthkit, ifind, ike-
scan, ils-sleuthkit, img_cat, img_stat, iodine, istat, jcat, jls, john, Kali Bugs, Kali Docs, Kali Forums, Kali HiDPI Mode, Kali Linux, Kali Tools, Kali Tweaks, Kali Undercover Mode, Keyboard, King Phisher, kismet, laudanum, lbd, legion (root), LightDM GTK+ Greeter settings, Log Out, macchanger, mactime-sleuthkit, magicrescue, Mail Reader, masscan, MATE Calculator, medusa, metasploit framework, mimikatz, minicom, miredo, mitmproxy, mmcat, mmls, mmstat, Mouse and Touchpad, Mousepad, msf payload creator, NASM shell, nbtscan, ncrack, netdiscover, NetHunter, netmask, netsniff-ng, nikto, nmap, Notifications, Offensive Security Training, Onboard, Onboard Settings, onesixtyone, ophcrack, ophcrack-
cli, Panel, Parole Media Player, patator, pdfid, pdf-parser, pipal, pixiewps, Power Manager, PowerShell, powershell empire, powersploit, proxychains4, proxytunnel, pth-curl, pth-net, pth-rpcclient, pth-smbclient, pth-smbget, pth-sqsh, pth-winexe, pth-wmic, pth-wmis, pth-xfreerdp, ptunnel, PulseAudio Volume Control,
pwnat, Qt5 Settings, QTerminal, QTerminal drop down, radare2, reaver, rebind, recon-ng, recordmydesktop, Removable Drives and Media, responder, Ristretto Image Viewer, Root Terminal Emulator, rsmangler, Run Program…, samdump2, sbd, scalpel, Screenshot, scrounge-ntfs, searchsploit, Sensor Viewer, Session and Startup, Settings Editor, Settings Manager, sigfind, skipfish, smbmap, snmp-
check, social engineering toolkit (root), sorter, spiderfoot, spiderfoot-cli, spike-generic_chunked, spike-
generic_listen_tcp, spike-generic_send_tcp, spike-generic_send_udp, spooftooph, SQLite database browser, sqlmap, srch_strings, ssldump, sslh, sslscan, sslsplit, sslyze, stunnel4, swaks, Task Manager, tcpreplay, Terminal Emulator, TeXdoctk, Text Editor, Text Editor Settings, thcping6, thc-pptp-bruter, Page 3
of 5
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help