U21cs704 Isp Experiment 1
U21cs704 Isp Experiment 1
NO : 01
Study and installation of Kali Linux operating
DATE : system
AIM :
To install and configure Kali Linux, ensuring access to a wide range of tools for ethical hacking,
security testing, and digital forensics.
Requirements:
You may need to do a little research into how to access your BIOS and boot menu. It usually
involves spamming (continuously pressing) a key on your keyboard when the computer starts
to boot.
As mentioned before, if you are dual booting, take note of the partition size you made for Kali
so you don’t overwrite your other OS.
After disabling secure boot, we can finally boot to the drive. At startup, you’ll have to access
the boot menu and then choose the stick you just made. You should be welcomed with the Kali
Installer Menu.
Fill in a hostname as this will identify your computer on a public network. You can skip the
domain name part as this isn’t necessary. Next, type in your full name for your new user account.
Quick lesson: On the terminal, Linux allows you to send and receive emails with commands.
However, Gmail and Yahoo make sending a lot easier these days. You may never have to use
this feature in your lifetime. Next type, in the username for your account (This could be your
hacker alias ).
Choose a strong password/passphrase to input in the next menu.
Select your time zone. This is important as it could affect your network configurations post-
installation.
Step 5: Set up the storage
Next would be to select the partitioning method. Now for the cool head mentioned earlier. If
you want to format the entire hard drive for Kali, the Guided options will be best.
LVM (Logic Volume Management) is a feature that allows you to have relatively flexible
partitions. This means that you can extend, shrink or even merge partitions while the OS is being
run. It's a pretty nifty feature.
The encrypted LVM feature keeps your data safe if someone unauthorized gets access to your
hard drive. Just note that there is a trade-off here: your hard drive will tend to be slower than if
it wasn’t encrypted. So most people go with the ‘Guided -use entire disk’ option.
If you are dual-booting, though, you will need to choose the manual option and make the
necessary configurations. I’ll go with the use entire disk option here.
Choose the hard drive you want to install Kali on. I’m using a virtual machine so my only option
is a small 21 GB drive.
Choose how you want your files to be partitioned. Each option differs by separating certain
important directories in separate partitions (More on that in a later post).
Desktop environments are basically the way the desktop looks to the user. Kali offers Xfce
(most common), Gnome, and KDE. I’m a sucker for Gnome so I went with that option. You
can still install all three and later configure your computer to choose the one you’d like.
You can check the sixth box to install the top 10 most popular tools on Kali. These are:
1. Aircrack-ng
2. Burpsuite
3. Crackmapexec
4. Hydra
5. Johntheripper (jtr)
6. Metasploit
7. Nmap (Network Mapper)
8. Responder
9. Sqlmap
10. Wireshark
As a hacker, you’re definitely going to need one of these sooner or later, so it’s best if you check
that box. You can check the ‘default — recommended tools’ box if you want a whole bunch of
tools on your system, but note that this will take a lot of time and space. Hit continue and wait.
Quick tip: It is generally recommended that you only have the tools you absolutely need on your
computer. This is because additional tools could slow your computer down, you could waste
data updating tools you never use, and you are likely to be more vulnerable if there is an active
exploit on the loose.
Mission Accomplished. You have successfully installed your Kali Linux OS. Hit continue to
clean up and reboot your computer.
Note: If you performed dual boot, you may need to change the boot menu to load Kali first
before Windows so you have the option of choosing which OS to use. Once booted up, your
screen should be like the one below.
If you installed the xfce desktop environment, you will have to put in your username, enter your
password, and you should have a nice looking desktop.
Result:
Thus the installation and configuration of Kali Linux was done successfully to ensuring access
to a wide range of tools for ethical hacking, security testing, and digital forensics.