CS 231: Computer Security

Comically brief intro to Kali Linux

Nothing to hand in

Kali Linux is a Linux distribution pre-loaded with tons of security-related tools. Officially targeted at the community of professional penetration testers, Kali is a very convenient way to get up and running as a student of computer security, an ethical hacker, or, of course, a not-so-ethical hacker.

This term, we will be using Kali as the basis for many of our hands-on activities. Thanks to the efforts of the awesome Rebecca Barkmeier and Mike Tie, the machines in Weitz 138 are set up to run Kali in a virtual machine. We can also run Metasploitable, an intentionally vulnderable Linux virtual machine, to act as our target machine when we are learning about various types of attack. More on this in the coming weeks.

Today, we just want to fire up the Kali virtual machine and give it a spin.

Running Kali in Weitz 138

  1. Boot into macOS and login.
  2. Launch VirtualBox. It's in /Applications, or you can use Spotlight Search (Command-Spacebar, type VirtualBox, etc.), or however you choose to go about finding apps on Macs.
  3. Start Kali. Select the Kali virtual machine in the left-hand panel of VirtualBox, and hit the Start button. (Double-clicking on the VM also works, of course.)
  4. Login as root. Once Kali has booted up, login with username root and password toor. These are the default settings for Kali. NOTE: we kept the default root password in this virtual machine because we're using the VM only for lab exercises. If we were storing important data ZZ not changing default settings is one of the main reasons
  5. Open a terminal. The icon is in the dock on the left side of the Kali desktop.
  6. Execute a command. Try
    ifconfig
    and then
    man ifconfig
    to start thinking about your homework.