With a clear understanding of expectations, deliverables, and scope, it is now time to start working on getting our penetration systems ready to go. For the hardware, I will be utilizing a decently powered laptop. The laptop is a Macbook Pro with 16 GB of RAM, a 256 GB SSD, and a quad-core 2.3 GHz Intel i7 running VMware Fusion. I will also be using the Raspberry Pi 3. The Raspberry Pi 3 is a 1.2 GHz ARMv8 64-bit Quad Core, with 1 GB of RAM and a 32 GB microSD. Obviously, there is quite a power discrepancy between the laptop and the Raspberry Pi. That is okay though, because I will be using both these devices differently. Any task that requires any sort of processing power will be done on the laptop. I love using the Raspberry Pi because of its small form factor and flexibility. It can be placed in just about any location we need, and if needed, it can be easily concealed.
For software, I will be using Kali Linux as my operating system of choice. Kali is a security-oriented Linux distribution that contains a bunch of security tools already installed. Its predecessor, Backtrack, was also a very popular security operating system. One of the benefits of Kali Linux is that it is also available for the Raspberry Pi, which is perfect in our circumstance. This way, we can have a consistent platform between the devices we plan to use in our penetration-testing labs. Kali Linux can be downloaded from their site at https://www.kali.org. For the Raspberry Pi, the Kali images are managed by Offensive Security at https://www.offensive-security.com. As for the various tools, we will talk about those as we use them in other chapters.
Even though I am using Kali Linux as my software platform of choice, feel free to use whichever software platform you feel most comfortable with. In this book, we will be using a bunch of open source tools for testing. A lot of these tools are available for other distributions and operating systems.
Setting up Kali Linux on both systems is a bit different since they are different platforms. Since this is an intermediate-level book, we won't be diving into a lot of details about the installation, but we will be hitting all the major points. This is the process you can use to get the software up and running.
We will start with the installation on the Raspberry Pi:
- Download the images from Offensive Security at https://www.offensive-security.com/kali-linux-arm-images/.
- Open the Terminal app on OS X.
- Using the utility
xz
, you can decompress the Kali image that was downloaded:
xz-d kali-2.1.2-rpi2.img.xz
- Next, you insert the USB microSD card reader with the microSD card into the laptop and verify the disks that are installed so that you know the correct disk to put the Kali image on:
diskutil list
- Once you know the correct disk, you can unmount the disk to prepare to write to it:
diskutil unmountDisk/dev/disk2
- Now that you have the correct disk unmounted, you will want to write the image to it using the
dd
command. This process can take some time, so if you want to check on the progress, you can run the Ctrl + T command any time:
sudo dd if=kali-2.1.2-rpi2.imgof=/dev/disk2bs=1m
- Since the image is now written to the microSD drive, you can eject it with the following command:
disk utile ject/dev/disk2
- You then remove the USB microSD card reader, place the microSD card in the Raspberry Pi, and boot it up for the first time. The default login credentials are as follows:
Username:root Password:toor
- You then change the default password on the Raspberry Pi with the following command to make sure no one can get into it:
Passwd<INSERTPASSWORDHERE>
- Making sure the software is up to date is important for any system, especially a secure penetration-testing system. You can accomplish this with the following commands:
apt-get update apt-get upgrade apt-get dist-upgrade
- After a reboot, you are ready to go with the Raspberry Pi.
Next, we will move on to setting up the Kali Linux install on the Mac. Since you will be installing Kali as a VM within Fusion, the process will vary compared to another hypervisor, or installing on a bare metal system. For me, I like having the flexibility of having OS X running so that I can run commands on there as well:
- Similar to the Raspberry Pi setup, you need to download the image. You will do that directly via the Kali website. They offer virtual images for downloads as well. If you go to select these, you will be redirected to the Offensive Security site at https://www.offensive-security.com/kali-linux-vmware-virtualbox-image-download/.
- Now that you have the Kali Linux image downloaded, you need to extract the VMDK. We used
7z
via CLI to accomplish this task:
- Since the VMDK is ready to import now, you will need to go into VMware Fusion and navigate to
File
|New
. A screen similar to the following should be displayed:
- Click on
Create a custom virtual machine
. You can select the OS asOther
|Other
and click onContinue
:
- Now, you will need to import the previously decompressed VMDK. Click on the
Use an existing virtual disk
radio button, and hitChoose virtual disk
. Browse the VMDK. Click onContinue
. Then, on the last screen, click on theFinish
button. The disk should now start to copy. Give it a few minutes to complete:
- Once completed, the Kali VM will now boot. Log in with the credentials we used with the Raspberry Pi image:
Username:root Password:toor
- You need to then change the default password that was set to make sure no one can get into it. Open up a terminal within the Kali Linux VM and use the following command:
Passwd<INSERTPASSWORDHERE>
- Make sure the software is up to date, like you did for the Raspberry Pi. To accomplish this, you can use the following commands:
apt-get update apt-get upgrade apt-get dist-upgrade
- Once this is complete, the laptop VM is ready to go.