Skip to main content

Kali Linux installaton process guide

                                     HOW TO INSTALL KALI LINUX IN PC...

                                                 "Dual Boot or Single boot"


Installation Prerequisites


  • Kali Linux required a minimum of 10 GB hard disk space for installation.
  • A minimum of 512MB Ram for i386 and amd64 architectures.
  • A bootable CD-DVD Drive or a USB stick.
Installing Kali Linux

  • First go the download page of Kali Linux Iso File Link is given Below
                  https://www.kali.org/downloads/
  • After downloading, either burn the downloaded ISO image to CD/DVD drive, or prepare a USB bootable stick with Kali Linux Live as the installation medium

  • How To Boot If you don't Know How to boot See Picture 
                       


  •         Click Option Write then after Completing restart Computer and insert before starting                    computer press Boot menu botten
                  HP- f9
                  Lenove f2 oe f12
                  dell f2
                  other esc and select on menu

  • To start the installation process, boot the Kali Linux with your chosen installation medium CD/DVD or USB. You should be presented with the Kali Boot screen. Select either Graphical or Text mode installation. In this example, I’m going to choose graphical installation.



  •  Choose your respective language for the installation and then your country location, 








  • By default it will configure the Network, if you have a DHCP server from router or from our local dedicated DHCP server. If not, you have to assign the IP and host name as follows


Here I’m going to choose manual configuration




  • Next, provide the gateway IP address of the default router. If you don’t have a router, in this case you can leave this blank or consult your network administrator to configure it if you don't want to give let it go



  •  Now enter the IP address of your Name Server (DNS), if you don’t want to use any name servers, you can leave this option has blank

  • Next, enter the hostname for your Kali Linux installation, by default it set to Kali as hostname, but here I’ve used the same hostname as “Kali“, but you can choose whatever you want

  • Next, set the domain name if you have one or leave blank and click Continue to move ahead

  • On the next screen, you need to set a password for root user, it’s always a good practice to use mixture of letters, numbers and special characters in passwords

  • Configure the clock to match with your chosen location, if you connected to the internet this will set automatically 


  • Now it’s time to partition our disk for installation. Choosing LVM will be a good option


  • Choose the Disk from the list, here we have only one disk to choose, click continue to move forward for the installation.


  •  For simplifying our installation and easy to set up, we can choose All files in one partition. This will be recommended for new users to Kali. For advance, user’s they can choose manually for a separate partition for each /home/var/usr, etc




  •  Before the LVM configured, the proper partitioning scheme has to be written to disk and these changes cannot be reverted back.

  • Here, you will get an overview of your current partition layout and mount points, which configured automatically from the installer. If you wish to change any settings, you can or else select Finish partition and write changes to disk and choose to continue to move forward for the next step.

  • Partitions are created and asking to format the disk by using below file-system types. With root and swap. Choose YES and click on Continue.



  • After copying files, you will be asked to configuring package manager. In this step, we’re going to configure the mirror network to get the packages for the future installations

  • In some organizations they have there local mirror, in such case, you can enter the information of your local mirror URL here, or else just click on Continue to move forward





  • After installation completes, click on Continue to finish installation,








                See video in description







                                                                           Written By Sanjay Kumar
                                  
                                                                                                       https://www.instagram.com/sanjayer111/
                                                                                                       https://www.facebook.com/mang786
                                                                                                      https://www.linkedin.com/in/sanjaykumar111/

Comments

Popular posts from this blog

exploit rpcbind

                            exploit rpcbind with nfs What is nfs?     Network File System (NFS) is a distributed file system protocol originally developed by Sun Microsystems in 1984,allowing a user on a client computer to access files over a network in a manner similar to how local storage is accessed. NFS, like many other protocols, builds on the Open Network Computing Remote Procedure Call (ONC RPC) system. The Network File System is an open standard defined in RFCs, allowing anyone to implement the protocol. What is rpcbind?     The rpcbind utility maps RPC services to the ports on which they listen. RPC processes notify rpcbind when they start, registering the ports they are listening on and the RPC program numbers they expect to serve. The client system then contacts rpcbind on the server with a particular RPC program number. The rpcbind service redirects the client to the proper port number so it can communicate with the requested service. Because RPC-based services

Exploit and connect to port 512 ,513, and 514

               Exploit and connect to port 512 ,513, and 514 ༄ Unix Basics      TCP ports 512, 513, and 514 are known as "r" services, and have been misconfigured       to allow remote access from any host (a standard ".rhosts + +" situation).       To take advantage of this, make sure the "rsh-client" client is installed (on Ubuntu), and      run the following command as your local root user. If you are prompted for an SSH key,      this means the rsh-client tools have not been installed and Ubuntu is defaulting to       using  SSH. 🔂 Step-1:               First type "nmap -v <victim ip>" 🔄 Step-2:               type "rlogin  -l <user account> <ip address of victim>                                                                          by Er. SANJAY KUMAR                                                                                                            sanjayyadav11210@gmail.com

Exploit Smtp service port 25

                          Exploit SMTP service port 25   ✍️ Total 4 Ways we can exploit Smtp service ✍️ Type  -1 --> metasploit step -1 : Type msfconsole in terminal the it will open metasploit step - 2 type - search smtp step  3 : find auxiliary/scanner/smtp/smtp_enum then use it by use command  ex  msf> use auxiliary/scanner/smtp/smtp_enum   step  4 : Show options -- for requirement identity step  5 : set attribute using set command. ex set rhost <rhostip> Step 6 : exploit/run it using exploit command.                                                                             by Er. Sanjay Kumar ✍️ Type  -2 --> smtp-user-enum smtp-user-enum smtp-user-enum is a tool for enumerating OS-level user accounts on Solaris via the SMTP service (sendmail). Enumeration is performed by inspecting the responses to VRFY, EXPN, and RCPT TO commands. It could be adapted to work against other vu