Vmware

All posts tagged Vmware

Good Morning friends. Today let us see how to install Kali Linux Rolling 2016 in Vmware Workstation. We will use Vmware Workstation 10 for this howto. The rolling edition of Kali Linux gives users the best of all worlds – the stability of Debian, together with the latest versions of the many outstanding penetration testing tools created and shared by the information security community.  Watch the video or scroll down for step-by-step guide.

Ever since Sana has been released, the makers of Kali Linux have also released Pre-built virtual images for virtual box and Vmware. We will use that virtualbox image in this howto. Go here and download the Pre-built vmware image. After download is finished, you will get a zip file as shown below..

kalirvm1

Extract the contents of this file using any unzipping software into a folder  as shown below. The extracted file will be around 12GB, so make space appropriately.

kalirvm2

After extraction, the files will look like below.

kalirvm3

Now open Vmware Workstation and open the New Virtual Machine wizard( or just hit CTRL + N). Select the Custom radio button as shown below and click on “Next”.

kalirvm4

Click on “Next”.

kalirvm5

Select the option “I will install the operating system later” and click on “Next”.

kalirvm6

Select guest operating system as Linux and version as Debian 7 64-bit if you downloaded a 64 bit Vmware virtual image and Debian if you downloaded a 32bit Vmware image. Click on “Next”.

kalirvm7

Give any name to your virtual machine, allocate the location for it and click on “Next”.

kalirvm8

Click on “Next”.

 

kalirvm9

The system will take the required RAM as shown below. If you have more memory, you can allocate more RAM. Click on “Next”.

kalirvm10

For network type, choose NAT and click on “Next”.

kalirvm11

Click on “Next”.

kalirvm12

Click on “Next”.

kalirvm13

In the disk selection, choose the option “use an existing virtual disk” and click on “Next”.

kalirvm14


Now browse to the folder where we have earlier extracted files of our zip file. Click on “Next”.

kalirvm15

You will be shown a summary of your virtual machine. Your virtual machine has been successfully created. Click on “Finish”.

kalirvm16

Now power on the Virtual machine. It should be like below. Hope it was helpful. If you face any problems during installation, please comment below.

openvm7

Virtual penetration testing lab is a lab created on a single system using any virtualization software. It can be very helpful for people practising for CEH or similar certification. Any penetration testing lab has two machines, attacker and victim. In this lab we will set up Kali Linux as the attacker and Windows XP( most favourite victim machine ) as the victim. I am going to set up this lab in Vmware Workstation 9. Hope this will be helpful.

First of all install Kali Linux and Windows XP in Vmware Workstation.

vpl1

 

vpl2

Shut them down. In the Vmware Workstation menu, Select Edit” and click on Virtual Network editor.

vpl3

The window below will open showing the virtual network adapters. Click on “Add network”.

vpl4

Vmware provides nine virtual networks from 0 to 9. Vmnet0, Vmnet1 and Vmnet8 are automatically assigned for  bridged, Host-only and NAT types of network respectively. Select the network “Vmnet3″.

vpl5

We can see that our network is added as Host-Type with a automatically assigned subnet IP.

vpl6

 

Click on our network. We can see its settings below.

vpl7

 

Deselect the option ‘Connect a host virtual adapter to the network‘.This will make our network a custom type. Change the subnet IP to 10.10.10.0( choice is yours).  Select the ‘Use local DHCP service to distribute IP address to VMs‘ option. This will automatically assign IP addresses to our machines. Click on ‘DHCP settings‘.

vpl8

You will see the below window. Make changes if you like. I am going to leave it default. Click OK twice to exit.

vpl9

 

We have successfully created our custom network. Now let’s add our machines to the network. Open the tab of Kali Linux and click on ‘network adapter‘ setting.

vpl10

In the settings, select the ‘custom radio button and select the network Vmnet3 from the dropdown menu. Click on OK.

vpl11

Do the same for Windows XP. Then let’s boot up our victim machine and check it’s IP address by typing ‘ipconfig‘ in the command line.The DHCP server has automatically assigned it the IP address 10.10.10.129.

vpl12

 

Boot the attacker machine and check it’s ip address by typing ‘ifconfig’ in the terminal. It has been assigned the address 10.10.10.128.

vpl13

Ping the victim IP machine (10.10.10.129) to see whether the two machines can communicate.

vpl14

 

We have successfully created a virtual penetration testing lab. Happy testing.