Python Black Hat programming 1.1 virtual machine installation and configuration Kali Linux 2016

Source: Internet
Author: User
Tags kali linux


Python Black Hat programming 1.1 virtual machine installation and configuration Kali Linux 2016




PythonBlack Hat Programming 1.1 virtual machine installation and configuration Kali Linux 20160.1 Tutorial instructions in this series


This series of tutorials, the use of the outline of the parent for the "Understanding Network Hacks Attack and Defense with Python", in order to solve many students fear of English books, solve the problems encountered in the actual process after reading. Because many places in the original book is too brief, the author according to the actual test situation and the latest technology development of the content made a lot of changes, of course, the most important is personal preference. The tutorials are available in both graphic and video tutorials for students of different tastes. Since the tutorial is still in the process of authoring, before the end of the complete tutorial, interested students please follow my subscription number (xuanhun521, the QR code below), I will be the first time in the subscription number to push the text tutorial and video tutorial. Question discussion please add QQ Group: Hacking (1 group): 303242737 Hacking (2 group): 147098303.






Figure 1 xuanhun521 Subscription number


0.2 Preface





About Virtual machine installation Kali Linux has been a cliché, my previous blog post (Kali Linux penetration test 1.2 environment installation and initialization) and video tutorials (Kali Linux web penetration test-Beginner Tutorial 1) are described in detail. Relative to previous articles and tutorials, the system used is the latest Kali Linux 2016.1, there is no difference in installation, the configuration needs to be aware of the use of new update sources. Even so, in order to take care of the students who have not contacted Kali Linux, this article will describe every step and detail in as much detail as possible.



As for why to use Kali Linux as a development environment, simply speaking, Kali Linux provides us with all the testing tools required for Python black Hat programming, which makes it easier to build a target environment.



Of course you can choose your favorite system, Windows or Mac Os,ubuntu can, after all, using Kali Linux in the update source of a little bit of a barrier, but in order to learn security, customer service this hurdle is worth.


1.1 Image File Download


: https://www.kali.org/downloads/.






Figure 2 Kali List of Linux images



Select the corresponding operating system image according to your environment, and if it is a 64-bit system, download the 64-bit file as much as possible.


1.2 System Installation


After the image download is successful, it's time to start our long installation process.



First turn on VMware and create a new virtual machine.






Figure 3 Creating a new virtual machine



Select Custom, click Next, 4.






Figure 4



Select the latest software version, Next, 5.






Figure 5



Select Install system from ISO file, click Browse to install, select your image file from the File selection box, 6.






Figure 6 Selecting an image file



Click Next. Operating system type Select "Linux" and "Debian7-64bit" (32-bit system select DEBIAN7).






Figure 7 Selecting the operating system type



Click Next. Fill in the virtual machine name, open the File Browse dialog box, and select the file storage location.






Figure 8 Configuring the virtual machine File Store



Click Next. Configure the CPU and the kernel. 9.






Figure 9 Configuring the CPU



Depending on your computer's actual configuration to measure the virtual machine configuration, otherwise it will affect the performance of the computer, the next memory configuration is the same.



Click Next. Configure memory.






Figure 10 Configuring memory



Click Next to configure the network type. If your network supports DHCP, you can choose how to bridge, otherwise Nat is selected.






Figure 11 Choosing a network type



Click Next to select the IO type.






Figure 12 Selecting the IO type



Click Next to select the disk type.






Figure 13 Selecting a disk type



Click Next, select New Virtual Disk, 14.









Figure 14



Click Next to set the disk size and storage mode. It is important to note that the disk size must be greater than 20G, or there will be problems that cannot be started. I also mentioned this problem in the previous it, but it was ignored by many students. 15.






Figure 15 Setting the virtual disk size



Click Next to set the virtual disk file storage location. 16.






Figure 16 Setting the virtual disk storage location



Click "Next", 17.






Figure 17 Confirmation information



Click Finish, 18, to start the virtual machine.






Figure 18



Select Graphical install,19.






Figure 19



Enter. Select language, 19.






Figure 20 Choosing a language



Click "Continue". Select "Yes", 21.






Figure 21



Click "Continue". Select country and Region, 22.






Figure 22



Click "Continue". Configure the keyboard type, 23.






Figure 23



Click "Continue". The installer starts loading the component, 24.






Figure 24



After the component is loaded, start configuring the hostname and fill it out according to your preferences, 25.






Figure 25



Click Continue. Configure the domain name, just fill it out, these can be changed when needed, 26.






Figure 26 Configuring the domain name



Click "Continue". Set the password for the root account, 27.






Figure 27 Setting the root password



Click Continue. The system will set the time, and after that, select the disk partitioning method. Depending on your ability to choose, you can default to the entire disk, or you can customize the partition. 28.






Figure 28



Click Continue to select the partition. Here I choose the entire disk installation, so there is only one option, 29.






Figure 29



Click Continue. Select the default item to do so. 30.






Figure 30



Click "Continue" and select write to disk, 31.






Figure 31



Click "Continue" and select "Yes", 32.






Figure 32



Click "Continue". Start the installation system, 33.






Figure 33



During the installation process, you will see the option to select a network image, and be sure to choose "No", 34.






Figure 34



Click "Continue". Select Yes to install GRUB on the MBR record. 35.






Figure 35



Click "Continue". Select a unique device. 36.






Figure 36



Click "Continue". After the MBR finishes writing, the installation process finishes. 37.






Figure 37



Click "Continue". End the installation process. System restart, 38.






Figure 38



The installation process officially ends, we enter the account root and the password set during installation to enter the system, start the configuration phase.






Figure 39






Figure 40


1.3 System Configuration


Because our current requirement is to develop a Python program, the system configuration relative penetration testing will be much simpler, only need to configure the update source, update the system, install the VMware Enhancement Tool, configure the shared directory.


1.3.1 Update System


Open the terminal and enter the following command:



Vim/etc/apt/sources.list



Clear the contents of the Sources.list file and enter the following:



#kali official source





Deb Http://http.kali.org/kali kali-rolling main Non-free contrib





# University of Science and Technology of China source






Deb Http://mirrors.ustc.edu.cn/kali kali-rolling main Non-free contrib


To save and exit, start with the following command:



Apt-get Update & Apt-get Upgrade



As shown in result 41.






Figure 41



When you see the "done" two words in the picture in Figure 42, it proves that the acquisition of the updated data is complete.






Figure 42



This time the picture will still be here, do not wait, direct carriage return, 43.






Figure 43



Now that it's really time to update the core of the system, execute the following command:



Apt-get Dist-upgrade



Enter "Y" in the confirmation interface, 44.






Figure 44 confirming the update



Next is the download phase until the download is complete, 45.






Figure 45 Update package Download complete



Immediately thereafter, the content of the UPDATE statement appears, return to 100%, and enter ": Q", as shown in the package update, 46, 47.






Figure 46






Figure 47



Some packages may have reminders, manual selection is OK.



Due to network reasons, it is possible to update the failure, this time through the VPN or socks agent FQ is necessary. If you find it difficult to complete FQ in Kali, please refer to my previous article "Kali Linux 2.0 virtual machine through the host agent for scientific internet-second play", you can ensure that you can update smoothly. The whole update is a long process, to be well prepared psychologically.



After all packages have been successfully updated, enter the following command to restart the system.



Reboot






Figure 48


1.3.2 Installation Vm-tools


After re-entering the system, we will find that the resolution of the system desktop environment can not be adjusted, only a small window, the virtual machine and external system cannot share the Clipboard, cannot set the shared directory. We need to install Open-vm-tools to solve these problems.



To start the terminal, enter the following command:



Apt-get Install Open-vm-tools-desktop Fuse









Figure 49



After the installation is successful, restart the system and you will see the effect.


1.4 Summary


This article, as the first section of Python Black Hat programming, seems to do a lot of things unrelated to programming itself, but with the installation and updating of the Kali system, we have installed Python and the usual Python modules, a large number of security tools developed using Python.



In the next section, we install vs code on Kali and build the Python development environment with VS code.





1.5 articles corresponding to video tutorial get method


In the subscription number, look at the article history, find the corresponding article, the end of the article to get a video tutorial method.









Since the tutorial is still in the process of authoring, before the end of the complete tutorial, interested students please follow my subscription number (xuanhun521, the QR code below), I will be the first time in the subscription number to push the text tutorial and video tutorial. Question discussion please add QQ Group: Hacking (1 group): 303242737 Hacking (2 group): 147098303.






After the attention, reply please reply "Python", get the video tutorial and other related content.






Series Articles Directory:



Python Black Hat Programming outline (in change)



Python Black Hat programming 1.1 virtual machine installation and configuration Kali Linux 2016


Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.