Python Black Hat programming 1.1 virtual machine installation and configuration Kali Linux 2016

Source: Internet
Author: User
Tags kali linux
Python Black Hat programming 1.1 virtual machine installation and configuration Kali Linux 2016 PythonBlack Hat Programming 1.1 virtual machine installation and configuration Kali Linux 20160.1 Tutorial instructions in this series

This series of tutorials, the use of the outline of the parent for the "Understanding Network Hacks Attack and Defense with Python", in order to solve many students fear of English books, solve the problems encountered in the actual process after reading. Because many places in the original book is too brief, the author according to the actual test situation and the latest technology development of the content made a lot of changes, of course, the most important is personal preference. The tutorials are available in both graphic and video tutorials for students of different tastes. Since the tutorial is still in the process of authoring, before the end of the complete tutorial, interested students please follow my subscription number (xuanhun521, the QR code below), I will be the first time in the subscription number to push the text tutorial and video tutorial. Question discussion please add QQ Group: Hacking (1 group): 303242737 Hacking (2 group): 147098303.

Figure 1 xuanhun521 Subscription number

0.2 Preface

About Virtual machine installation Kali Linux has been a cliché, my previous blog post (Kali Linux penetration test 1.2 environment installation and initialization) and video tutorials (Kali Linux web penetration test-Beginner Tutorial 1) are described in detail. Relative to previous articles and tutorials, the system used is the latest Kali Linux 2016.1, there is no difference in installation, the configuration needs to be aware of the use of new update sources. Even so, in order to take care of the students who have not contacted Kali Linux, this article will describe every step and detail in as much detail as possible.

As for why to use Kali Linux as a development environment, simply speaking, Kali Linux provides us with all the testing tools required for Python black Hat programming, which makes it easier to build a target environment.

Of course you can choose your favorite system, Windows or Mac Os,ubuntu can, after all, using Kali Linux in the update source of a little bit of a barrier, but in order to learn security, customer service this hurdle is worth.

1.1 Image File Download

: https://www.kali.org/downloads/.

Figure 2 Kali List of Linux images

Select the corresponding operating system image according to your environment, and if it is a 64-bit system, download the 64-bit file as much as possible.

1.2 System Installation

After the image download is successful, it's time to start our long installation process.

First turn on VMware and create a new virtual machine.

Figure 3 Creating a new virtual machine

Select Custom, click Next, 4.

Figure 4

Select the latest software version, Next, 5.

Figure 5

Select Install system from ISO file, click Browse to install, select your image file from the File selection box, 6.

Figure 6 Selecting an image file

Click Next. Operating system type Select "Linux" and "Debian7-64bit" (32-bit system select DEBIAN7).

Figure 7 Selecting the operating system type

Click Next. Fill in the virtual machine name, open the File Browse dialog box, and select the file storage location.

Figure 8 Configuring the virtual machine File Store

Click Next. Configure the CPU and the kernel. 9.

Figure 9 Configuring the CPU

Depending on your computer's actual configuration to measure the virtual machine configuration, otherwise it will affect the performance of the computer, the next memory configuration is the same.

Click Next. Configure memory.

Figure 10 Configuring memory

Click Next to configure the network type. If your network supports DHCP, you can choose how to bridge, otherwise Nat is selected.

Figure 11 Choosing a network type

Click Next to select the IO type.

Figure 12 Selecting the IO type

Click Next to select the disk type.

Figure 13 Selecting a disk type

Click Next, select New Virtual Disk, 14.

Figure 14

Click Next to set the disk size and storage mode. It is important to note that the disk size must be greater than 20G, or there will be problems that cannot be started. I also mentioned this problem in the previous it, but it was ignored by many students. 15.

Figure 15 Setting the virtual disk size

Click Next to set the virtual disk file storage location. 16.

Figure 16 Setting the virtual disk storage location

Click "Next", 17.

Figure 17 Confirmation information

Click Finish, 18, to start the virtual machine.

Figure 18

Select Graphical install,19.

Figure 19

Enter. Select language, 19.

Figure 20 Choosing a language

Click "Continue". Select "Yes", 21.

Figure 21

Click "Continue". Select country and Region, 22.

Figure 22

Click "Continue". Configure the keyboard type, 23.

Figure 23

Click "Continue". The installer starts loading the component, 24.

Figure 24

After the component is loaded, start configuring the hostname and fill it out according to your preferences, 25.

Figure 25

Click Continue. Configure the domain name, just fill it out, these can be changed when needed, 26.

Figure 26 Configuring the domain name

Click "Continue". Set the password for the root account, 27.

Figure 27 Setting the root password

Click Continue. The system will set the time, and after that, select the disk partitioning method. Depending on your ability to choose, you can default to the entire disk, or you can customize the partition. 28.

Figure 28

Click Continue to select the partition. Here I choose the entire disk installation, so there is only one option, 29.

Figure 29

Click Continue. Select the default item to do so. 30.

Figure 30

Click "Continue" and select write to disk, 31.

Figure 31

Click "Continue" and select "Yes", 32.

Figure 32

Click "Continue". Start the installation system, 33.

Figure 33

During the installation process, you will see the option to select a network image, and be sure to choose "No", 34.

Figure 34

Click "Continue". Select Yes to install GRUB on the MBR record. 35.

Figure 35

Click "Continue". Select a unique device. 36.

Figure 36

Click "Continue". After the MBR finishes writing, the installation process finishes. 37.

Figure 37

Click "Continue". End the installation process. System restart, 38.

Figure 38

The installation process officially ends, we enter the account root and the password set during installation to enter the system, start the configuration phase.

Figure 39

Figure 40

1.3 System Configuration

Because our current requirement is to develop a Python program, the system configuration relative penetration testing will be much simpler, only need to configure the update source, update the system, install the VMware Enhancement Tool, configure the shared directory.

1.3.1 Update System

Open the terminal and enter the following command:

Vim/etc/apt/sources.list

Clear the contents of the Sources.list file and enter the following:

#kali official source





Deb Http://http.kali.org/kali kali-rolling main Non-free contrib





# University of Science and Technology of China source






Deb Http://mirrors.ustc.edu.cn/kali kali-rolling main Non-free contrib

To save and exit, start with the following command:

Apt-get Update & Apt-get Upgrade

As shown in result 41.

Figure 41

When you see the "done" two words in the picture in Figure 42, it proves that the acquisition of the updated data is complete.

Figure 42

This time the picture will still be here, do not wait, direct carriage return, 43.

Figure 43

Now that it's really time to update the core of the system, execute the following command:

Apt-get Dist-upgrade

Enter "Y" in the confirmation interface, 44.

Figure 44 confirming the update

Next is the download phase until the download is complete, 45.

Figure 45 Update package Download complete

Immediately thereafter, the content of the UPDATE statement appears, return to 100%, and enter ": Q", as shown in the package update, 46, 47.

Figure 46

Figure 47

Some packages may have reminders, manual selection is OK.

Due to network reasons, it is possible to update the failure, this time through the VPN or socks agent FQ is necessary. If you find it difficult to complete FQ in Kali, please refer to my previous article "Kali Linux 2.0 virtual machine through the host agent for scientific internet-second play", you can ensure that you can update smoothly. The whole update is a long process, to be well prepared psychologically.

After all packages have been successfully updated, enter the following command to restart the system.

Reboot

Figure 48

1.3.2 Installation Vm-tools

After re-entering the system, we will find that the resolution of the system desktop environment can not be adjusted, only a small window, the virtual machine and external system cannot share the Clipboard, cannot set the shared directory. We need to install Open-vm-tools to solve these problems.

To start the terminal, enter the following command:

Apt-get Install Open-vm-tools-desktop Fuse

Figure 49

After the installation is successful, restart the system and you will see the effect.

1.4 Summary

This article, as the first section of Python Black Hat programming, seems to do a lot of things unrelated to programming itself, but with the installation and updating of the Kali system, we have installed Python and the usual Python modules, a large number of security tools developed using Python.

In the next section, we install vs code on Kali and build the Python development environment with VS code.

1.5 articles corresponding to video tutorial get method

In the subscription number, look at the article history, find the corresponding article, the end of the article to get a video tutorial method.

Since the tutorial is still in the process of authoring, before the end of the complete tutorial, interested students please follow my subscription number (xuanhun521, the QR code below), I will be the first time in the subscription number to push the text tutorial and video tutorial. Question discussion please add QQ Group: Hacking (1 group): 303242737 Hacking (2 group): 147098303.

After the attention, reply please reply "Python", get the video tutorial and other related content.

Series Articles Directory:

Python Black Hat Programming outline (in change)

Python Black Hat programming 1.1 virtual machine installation and configuration Kali Linux 2016

Related Article
Large-Scale Price Reduction
  • 59% Max. and 23% Avg.
  • Price Reduction for Core Products
  • Price Reduction in Multiple Regions
undefined. /
Connect with us on Discord
  • Secure, anonymous group chat without disturbance
  • Stay updated on campaigns, new products, and more
  • Support for all your questions
undefined. /
Free Tier
  • Start free from ECS to Big Data
  • Get Started in 3 Simple Steps
  • Try ECS t5 1C1G
undefined. /

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.