Assignment 1
Assignment 1
Objectives
In this lab, you will complete the following objectives:
Background / Scenario
Linux is an open-source operating system known for its speed, reliability, and efficiency.
It can run on minimal hardware resources and is highly customizable. Unlike proprietary
systems like Windows and Mac OS X, Linux is maintained by a community of developers,
making it adaptable for various applications, from embedded devices to
supercomputers.
Kali Linux is a specialized distribution designed for security auditing and penetration
testing. It includes numerous tools for these tasks, but it is not intended for everyday
use like gaming or general development. As a cybersecurity professional, it’s crucial to
be adept at navigating both the graphical user interface (GUI) and the command line in
Kali Linux.
Required Resources
• Kali Linux virtual machine (VM) customized for Internship Training course.
• Internet access.
Instructions
Part 1: Familiarize Yourself with the Kali Linux GUI
1. Log In: Start your Kali VM and log in with the username kali and the
password kali. You should see the Kali desktop.
2. Explore the Desktop:
o The desktop contains icons like the trash, file explorer, and application
links.
o The top panel includes running application icons and allows you to switch
between different desktops, each of which can have unique configurations.
3. Customize the Panel:
o Right-click the panel, select Panel, then + Add New Items… to explore
options for adding frequently used items.
o Access Panel Preferences… to adjust the appearance and functionality of
the panel. Experiment with the settings and then close the windows.
4. Access Settings: The top-right corner displays settings and system information,
including network status and power options.
1. Open the Applications Menu: Click the first icon on the left side of the panel to
access the Applications menu, similar to the Start menu in Windows.
2. Explore Applications: Browse through the categories, examining the various
tools available in Kali Linux, particularly those related to security.
3. Open a Terminal: Close any application windows and click the square black-and-
white icon in the panel to open a terminal for the next part of the lab.
The shell (or terminal) is a powerful interface for interacting with the Linux operating
system.
man man
o This command displays documentation about the man command. Use q to
exit the man page.
o Question: Name a few sections included in a man page?
2. Basic Commands: The following table lists some basic Linux commands and their
functions:
Command Description
mv Moves or renames files and directories.
chmod Modifies file permissions.
chown Changes the ownership of a file.
dd Copies data from an input to an output.
pwd Displays the name of the current directory.
ps Lists the processes currently running in the system.
su Simulates a login as another user or to become a superuser.
sudo Runs a command as a superuser or another named user.
grep Searches for specific strings of characters within a file.
ifconfig Displays or configures network card information (deprecated; use ip address).
apt-get Installs, configures, and removes packages on Debian-based systems.
iwconfig Displays or configures wireless network card information.
shutdown Shuts down the computer or performs related tasks.
passwd Changes the password for the current user.
cat Lists the contents of a file.
In this step, you will use the cd, mkdir, and ls commands.
pwd
cd /home/kali
ls -l
mkdir Test
ls
ls
cp gvm_admin_passwd.txt backup_gvm_passwd.txt
ls
mv gvm_admin_passwd.txt Documents/
ls Documents/
rm backup_gvm_passwd.txt
2. Verify Deletion:
ls
cat gvm_admin_passwd.txt
2. Paginated Viewing: If the file is long, use less for paginated viewing:
less gvm_admin_passwd.txt
Conclusion
Navigating the Kali Linux file system is essential for effective system management. By
mastering basic commands such as cd, ls, mkdir, cp, mv, rm, and cat, you can efficiently
manage files and directories in your environment. Understanding the GUI and the shell
will enhance your ability to perform tasks in Kali Linux.
Lab 2: Installing Packages and
Applications
Objectives
In this lab, you will:
• Use the Advanced Package Tool (APT) to manage packages in Kali Linux.
• Install, upgrade, and remove applications using command-line tools.
• Search for packages and manage repositories.
Background / Scenario
Kali Linux, built on Debian, utilizes the APT package management system, which
simplifies the process of installing, upgrading, and managing software packages.
Understanding how to use APT is essential for maintaining a functional and secure
environment, particularly in cybersecurity roles.
Required Resources
• Kali Linux virtual machine (VM).
• Internet access.
Instructions
Part 1: Updating Package Lists
1. Open a Terminal:
o Log into your Kali Linux VM.
Open a terminal by clicking on the terminal icon in the taskbar.
o
2. Update the Package List:
o Run the following command to update the list of available packages and
their versions:
o Explanation:
▪ The sudo command allows you to run programs with the security
privileges of another user (typically the superuser).
▪ apt is the command-line tool for managing packages.
▪ update fetches the latest package information from the repositories
configured on your system. This ensures you have the most current
information about the software available for installation.
o Example Output:
o Get:1 http://kali.download/kali kali-rolling InRelease [30.5 kB]
o ...
o Reading package lists... Done
1. Install curl:
o Use APT to install curl, a command-line tool for transferring data with
URLs:
o Explanation:
▪ install tells APT to fetch the specified package and any required
dependencies from the repository and install them.
▪ curl is a useful tool for testing endpoints and downloading files.
o Example Output:
o The following NEW packages will be installed:
o curl
o ...
o Do you want to continue? [Y/n] Y
2. Verify the Installation:
o Check the version of curl to confirm the installation was successful:
curl --version
1. Remove curl:
o To uninstall curl, use the following command:
curl --version
1. Edit Repositories:
o Open the sources.list file to view and manage your APT repositories:
o Explanation: This file contains a list of repositories that APT uses to fetch
packages. Using nano opens the file in a text editor.
2. Modify Repository Entries:
o Check for any commented-out entries (lines starting with #). Uncomment
(remove the #) any repositories you want to enable.
o Example: Change #deb http://kali.download/kali kali-rolling main
non-free contrib to deb http://kali.download/kali kali-rolling main
non-free contrib.
o Explanation: Enabling additional repositories allows you to access more
packages that are not available in the default repositories.
3. Save and Exit:
o After making your changes, press Ctrl + O to save and Ctrl + X to exit
the editor.
o Explanation: This command lists all installed packages, filtering out any
that have been marked for deinstallation.
o Example Output:
o curl
o vim
o nmap
Conclusion
In this lab, you have learned how to manage packages in Kali Linux using APT. You
should now be comfortable installing, upgrading, and removing applications, as well as
searching for and managing software repositories. Mastery of these skills is essential for
effective system administration and cybersecurity tasks.
Lab 3: Networking Commands
Objectives
In this lab, you will:
Background / Scenario
Networking is a fundamental aspect of cybersecurity and system administration.
Familiarity with networking commands allows you to configure, manage, and
troubleshoot network connections effectively. Kali Linux includes a range of powerful
tools for networking, making it an essential skill for ethical hackers and security
professionals.
Required Resources
• Kali Linux virtual machine (VM).
• Internet access.
Instructions
Part 1: Displaying Network Configuration
1. Open a Terminal:
o Start your Kali Linux VM.
oOpen a terminal by clicking the terminal icon.
2. Check Network Interfaces:
o Use the following command to display the current network interfaces and
their configuration:
ip addr show
o Explanation: The ip addr show command provides detailed information
about all network interfaces, including IP addresses, MAC addresses, and
status.
o Example Output:
o 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc
pfifo_fast state UP qlen 1000
o link/ether 08:00:27:12:34:56 brd ff:ff:ff:ff:ff:ff
o inet 192.168.1.10/24 brd 192.168.1.255 scope global eth0
o valid_lft forever preferred_lft forever
3. List Routing Table:
o To view the routing table, run:
ip route show
1. Ping a Host:
o Use the ping command to test connectivity to a remote host, such as
Google:
ping -c 4 google.com
traceroute google.com
ifconfig
1. Install tcpdump:
o Use the following command to install tcpdump, a powerful packet analysis
tool:
Conclusion
In this lab, you have learned essential networking commands and tools available in Kali
Linux. Mastery of these commands allows you to effectively manage and troubleshoot
network connections, which is crucial in cybersecurity roles.