Lab 2 - Installing the Security Workstation Virtual Machine (Kali Linux)

docx

School

Community College of Philadelphia *

*We aren’t endorsed by this school

Course

152

Subject

Information Systems

Date

Apr 3, 2024

Type

docx

Pages

5

Uploaded by thebigd130

Report
Lab 2 – Installing the Security Workstation Virtual Machine Objectives Part 1: Prepare a Personal Computer for Virtualization Part 2: Import a Virtual Machine into VirtualBox Inventory Background / Scenario Computing power and resources have increased tremendously over the last 10 years. A benefit of having multicore processors and large amounts of RAM is the ability to use virtualization. With virtualization, one or more virtual computers operate inside one physical computer. Virtual computers that run within physical computers are called virtual machines. Virtual machines are often called guests, and physical computers are often called hosts. Anyone with a modern computer and operating system can run virtual machines. A virtual machine image file has been created for you to install on your computer. In this lab, you will download and import this image file using a desktop virtualization application, such as VirtualBox. Required Resources Computer with a minimum of 2 GB of RAM and 8 GB of free disk space High speed Internet access to download Oracle VirtualBox and the virtual machine image file Part 1: Prepare a Host Computer for Virtualization In Part 1, you will download and install desktop virtualization software, and also download an image file that can be used to complete labs throughout the course. For this lab, the virtual machine is running Linux. Step 1: Open Oracle VirtualBox. VMware Player, Microsoft Virtual PC and Oracle VirtualBox are two virtualization programs that you can download and install to support the image file. In this lab, you will use VirtualBox. a. If you haven’t installed Oracle VirtualBox, you can download the program and install it. https://www.virtualbox.org/wiki/Downloads - You can install either Windows version or MAC. b. Once you have installed the Oracle VirtualBox program, you can then launch the program c. You are now ready to install OS. Step 2: Download the Virtual Machine image file. The image file was created in accordance with the Open Virtualization Format (OVA or OVF). OVF is an open standard for packaging and distributing virtual appliances. An OVF package has several files placed into one directory. This directory is then distributed as an OVA package. This package contains all of the OVF files necessary for the deployment of the virtual machine. The virtual machine used in this lab was exported in accordance with the OVF standard. You can now download the Kali Linux image file for Oracle VirtualBox - https://www.kali.org/get-kali/#kali- virtual-machines . You will need to extract the file first in a folder once downloaded. Part 2: Import the Virtual Machine into the VirtualBox Inventory In Part 2, you will import the virtual machine image into VirtualBox and start the virtual machine. Step 1: Import the virtual machine file into VirtualBox. a. Open VirtualBox . Click File > Import Appliance... to import the virtual machine image. Page 1 of 5
Lab 2 - Installing the Security Workstation Virtual Machine b. A new window will appear. Specify the location of the .OVA file and click Next . c. A new window will appear presenting the settings suggested in the OVA archive. Check the "Reinitialize the MAC address of all network cards" box at bottom of the window. Leave all other settings as default. Click Import . d. When the import process is complete, you will see the new Virtual Machine added to the VirtualBox inventory in the left panel. The virtual machine is now ready to use. Step 2: Start the virtual machine and log in. a. Select the Kali Workstation virtual machine. b. Click the green arrow Start button at the top portion of the VirtualBox application window. If you get the following dialog box, click Change Network Settings and set your Bridged Adapter. Click the dropdown list next the Name and choose your network adapter ( will vary for each computer ). Note : If your network is not configured with DHCP services, click Change Network Settings and select NAT in the Attached to dropdown box. The network settings can also be access via Settings in the Oracle VirtualBox Manager or in the virtual machine menu, select Devices > Network > Network Settings . You may need to disable and enable the network adaptor for the change to take effect. c. Click OK . A new window will appear, and the virtual machine boot process will start. d. When the boot process is complete, the virtual machine will ask for a username and password. Use the following credentials to log into the virtual machine: Username: kali Page 2 of 5
Lab 2 - Installing the Security Workstation Virtual Machine Password: kali You will be presented with a desktop environment: there is a launcher bar at the bottom, icons on the desktop, and an application menu at the top. Note : The window running the virtual machine is a completely different computer than your host. Functions, such as copy and paste, will not work between the two without special software tools installed. Notice the keyboard and mouse focus. When you click inside the virtual machine window, your mouse and keyboard will operate the guest operating system. Your host operating system will no longer detect keystrokes or mouse movements. Press the right CTRL key to return keyboard and mouse focus to the host operating system. Step 3: Familiarize yourself with the Virtual Machine. The virtual machine you just installed can be used to complete many of the labs in this course. Familiarize yourself with the icons in the list below: The launcher bar icons are (from left to right): Show the desktop Terminal application File manager application Web browser application (Firefox) File search tool Current user's home directory All course related applications are located under Applications Menu > kali a. List the applications in the root menu. The applications in the root menu are About Xfce, Accessibility, Advanced Network Configuration, aircrack-ng, Appearance, Application Finder, arping, Atril Document Viewer, autopsy (root), binwalk, blkcalc, blkcat, blkls, blkstat, Bluetooth Adapters, Bluetooth Manager, bulk_extractor, Bulk Rename, bully, burpsuite, cadaver, Catfish File Search, cewl, CherryTree, chntpw, clang, clang++, Clipboard Manager, Clipboard Manager Settings, Color Profiles, commix, crackmapexec, crunch, cutycapt, davtest, dbd, Default Applications, Desktop, dirb, dirbuster, Display, dmitry, dns2tcpc, dns2tcpd, dnschef, dnsenum, dnsrecon, Engrampa Archive Manager, enum4linux, ettercap-graphical, evil-winrm, exe2hex, Exploit Database, faraday start, faraday stop, fern wifi cracker (root), ffind, ffuf, fierce, File Manager, File Manager Settings, Firefox ESR, fls, fping, fsstat, GParted, guymager (root), Hardware Locality Istopo, hashcat, hashdeep, hashid, hash-identifier, hfind, hping3, hydra, hydra-graphical, icat-sleuthkit, ifind, ike- scan, ils-sleuthkit, img_cat, img_stat, iodine, istat, jcat, jls, john, Kali Bugs, Kali Docs, Kali Forums, Kali HiDPI Mode, Kali Linux, Kali Tools, Kali Tweaks, Kali Undercover Mode, Keyboard, King Phisher, kismet, laudanum, lbd, legion (root), LightDM GTK+ Greeter settings, Log Out, macchanger, mactime-sleuthkit, magicrescue, Mail Reader, masscan, MATE Calculator, medusa, metasploit framework, mimikatz, minicom, miredo, mitmproxy, mmcat, mmls, mmstat, Mouse and Touchpad, Mousepad, msf payload creator, NASM shell, nbtscan, ncrack, netdiscover, NetHunter, netmask, netsniff-ng, nikto, nmap, Notifications, Offensive Security Training, Onboard, Onboard Settings, onesixtyone, ophcrack, ophcrack- cli, Panel, Parole Media Player, patator, pdfid, pdf-parser, pipal, pixiewps, Power Manager, PowerShell, powershell empire, powersploit, proxychains4, proxytunnel, pth-curl, pth-net, pth-rpcclient, pth-smbclient, pth-smbget, pth-sqsh, pth-winexe, pth-wmic, pth-wmis, pth-xfreerdp, ptunnel, PulseAudio Volume Control, pwnat, Qt5 Settings, QTerminal, QTerminal drop down, radare2, reaver, rebind, recon-ng, recordmydesktop, Removable Drives and Media, responder, Ristretto Image Viewer, Root Terminal Emulator, rsmangler, Run Program…, samdump2, sbd, scalpel, Screenshot, scrounge-ntfs, searchsploit, Sensor Viewer, Session and Startup, Settings Editor, Settings Manager, sigfind, skipfish, smbmap, snmp- check, social engineering toolkit (root), sorter, spiderfoot, spiderfoot-cli, spike-generic_chunked, spike- generic_listen_tcp, spike-generic_send_tcp, spike-generic_send_udp, spooftooph, SQLite database browser, sqlmap, srch_strings, ssldump, sslh, sslscan, sslsplit, sslyze, stunnel4, swaks, Task Manager, tcpreplay, Terminal Emulator, TeXdoctk, Text Editor, Text Editor Settings, thcping6, thc-pptp-bruter, Page 3 of 5
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Lab 2 - Installing the Security Workstation Virtual Machine theharvester, Thunar File Manager, Time and Date, tsk_comparedir, tsk_gettimes, tsk_loaddb, tsk_recover, udptunnel, unix-privesc-check, Users and Groups, Vim, voihopper, VulnHub, wafw00f, wapiti, Web Browser, weevely, wfuzz, whatweb, wifite, Window Manager, Window Manager Tweaks, wireshark, wordlists, Workspaces, and wpscan. ____________________________________________________________________________________ b. Open the Terminal Emulator application. Type ip address at the prompt to determine the IP address of your virtual machine. What are the IP addresses assigned to your virtual machine? The IP addresses assigned to the virtual machine are 127.0.0.1/8 for the loopback and 10.0.2.15/24 for the ethernet. ____________________________________________________________________________________ c. Locate and launch the web browser application. Can you navigate to your favorite search engine? Yes, I can navigate to my favorite search engine. Step 4: Shut down the VMs. When you are done with the VM, you can save the state of VM for future use or shut down the VM. Closing the VM using GUI: From the Virtual Box File menu, choose Close... Click the power off the machine radio button and click OK . The next time you start the virtual machine, you will be able to resume working in the operating system in its current state. The other two options are: Send the shutdown signal : simulates pressing the power button on a physical computer Power off the machine : simulates pulling the plug on a physical computer Closing the VM using CLI: To shut down the VM using the command line, you can use the menu options inside the VM or enter sudo shutdown -h now command in a terminal window and provide the password root when prompted. Rebooting the VM: If you want to reboot the VM, you can use the menu options inside the VM or enter reboot command in a terminal and provide the password root when prompted. Note : You can use the web browser in this virtual machine to research security issues. By using the virtual machine, you may prevent malware from being installed on your computer. Page 4 of 5
Lab 2 - Installing the Security Workstation Virtual Machine Reflection 1. What are the advantages and disadvantages of using a virtual machine? The advantages for using a virtual machine are testing new applications and systems that appear on the workstation (such as when you use the VM version of Windows or Kali), and you can save the state of the VM when you close it. _______________________________________________________________________________________ The disadvantages for using a virtual machine is the amount of free space and RAM, as well as specific hardware and software, that you need if you want to download the VM. _______________________________________________________________________________________ _______________________________________________________________________________________ 2. What is the name of Operating System you just used for Lab 2? The name of the Operating System I used was Debian (64-bit). _______________________________________________________________________________________ 3. What is the command line command to shutdown the Operating System for Lab 2? The command line command to shutdown the Operating System is “sudo shutdown -h now”, and is followed by the password “root”. _______________________________________________________________________________________ 4. Screen shot of your installed Kali Linux on Oracle VirtualBox program below – (5 points) Page 5 of 5