Good evening Kali Linux users. Everything was going well with your Kali Linux( 1.1.0 to rolling ), you updated(apt-get update) and when you rebooted you got struck at Login screen. No matter how many times you entered your credentials correctly you are once again presented the login screen as shown below. Today I will show you how to fix Kali login error for good. I tested this howto on the latest rolling version.
At the login screen, hit CTRL +ALT+F1 or F2. When you get the terminal, login with your credentials. Type apt-get update as shown below.
Next type apt-get upgrade -y. The system will upgrade and the screen will look like below. Have patience as it will take some time.
After the upgrade is over type command “apt-get install -f gdm3“. When it prompts if you want to continue, type Y. After this operation, reboot the system. You should be able to login normally without any problems. Hope that was helpful.
NOTE : Kali Linux Rolling 2020.4 has been released. This guide works even for that too.
Good evening friends. I have seen that most of the people are still facing many problems while installing Kali Linux in Virtualbox. So today i brought the easiest method to install Kali linux in Virtualbox. It doesn’t involve typing of any lengthy commands. For this howto, I am installing Kali Linux v2.0 Sana in virtualbox version 5. This howto works for any host OS, from Windows XP to Windows 10. Just install the latest Virtualbox version for that operating system.
The makers of Kali Linux are providing prebuilt virtualbox images which are available for download here. First download the image. It would be a compressed image. Now extract the contents of the file at any location of your choice.
It would be a ova extension file as shown below.
Now open Virtualbox. Go to “File” and choose option “Import appliance”. Click on it.
As soon as you click on it, the below window will open.
Now, browse to the location of the OVA file we just downloaded. Click on “Next”.
You will see the below window. Check out all the options shown. Change any options if required.
Make sure that the location where you are creating disk has enough space. Click on Import.
The process of importing will start as shown below.
It will take some time to process. Just wait. As soon as the importing is over you will see the virtual machine as shown below.
Power On the virtual machine. After some system processes, you will be asked for the username. The username is “root”.
Next you will be prompted for password. The default password is “toor”.
If everything went well, you should see the interface as shown below. Go to full screen to see if its working. You are all good to go. See, this is the easiest way to install Kali Linux in virtualbox. Hope it was helpful. Please comment if you encounter any problem. I would be happy to solve it.
Windows 10 is familiar and easy to use, with lots of similarities to Windows 7 including the Start menu. It starts up and resumes fast, has more built-in security to help keep you safe, and is designed to work with software and hardware you already have. See how to install Windows 10 in Virtualbox.
Matriux Krypton is a pen testing distribution based on Debian. It consists of almost 300 security tools for ethical hacking categorized as arsenals. It has a category for data recovery which is not prevalent in other penetration testing distros. Today we are going to see how to install Matriux Krypton Ec-Centric in Oracle Virtual box. It can be downloaded from here. Open Virtualbox and click on “New virtual machine”. On the popup window, give the name as Matriux ( in fact any name you like ). Select operating system as “Linux” and version as “Ubuntu”. Click on “Next”.
Select the appropriate memory you want to assign to the virtual machine and click on “Next”.
Select the option “create a virtual hard drive file” and click on “Create”.
Select Hard drive file type as VDI. Click on “Next”.
Choose appropriate storage option and click on “Next”.
Set your virtual hard disk size appropriately but I suggest you to keep it above 8 GB. Click on “Create”.
Select the location of the iso file and click on “Start”.
Select the option “Live” and hit Enter.
Log into account matriux. The default password is “toor“.
If everything went well, your system should look like this.
Before running the Matriux disk Installer, we need to perform some operations. Go to “System>Administration>Gparted” as shown below.
Enter the administrative password as “toor”. Click on “OK”.
In the gparted window, click on “Create Partition table”.
When a warning is shown, click on “Apply”.
Right click on the unallocated hard disk and select “New” as shown below.
Change the file system to ext3 and click on “Add”.
We can see our “New Partition” ready to be created. Click on the “tick mark with blue background”.
We can see our partition created as below.
Close the window and click on “Matriux Disk Installer” we saw above. When the window opens as below, click on “Yes”.
Choose the partition we created( i.e /dev/sda1) and click on “OK”.
Click on “OK”.
Click on “OK”.
Create a personal account login name.
Choose the password for you personal account. Click on “OK”.
Choose the root account password. Click on “OK”.
Select the appropriate locale as en_US. Click on “OK”.
If everything goes well, we will get a window as shown below. Click on “Yes”.
We will get the below message after successful installation. Click on “Yes” to reboot your system and you are ready to go.
Good evening friends. We have seen how to create a virtual pentest lab both in Oracle VirtualBox (see here) and Vmware Workstation(see here). Although both penetration testing labs were almost similar, there is a small difference between them . As the title of this howto already implies it is the absence of DHCP server in the pentest lab we created using Virtualbox. VirtualBox provides a DHCP server but it can’t be turned on using the GUI feature unlike Vmware Workstation. So let’s see how to enable DHCP server in Virtualbox networks. I am going to assign DHCP server to my pentest lab I created above. I will assume that virtualbox is installed on Windows. Open CMD and navigate to the directory where Virtualbox is installed. By default it will be “C:Program Files OracleVirtualBox”. Type the command “vboxmanage dhcpserver add –ip 10.10.10.1 –netmask 255.0.0.0 –lowerip 10.10.10.2 –upperip 10.10.10.10 –netname pentestlab”. Hit Enter.
In the above command, “vboxmanage dhcpserver add –ip 10.10.10.1” starts a DHCP server with IP address 10.10.10.1 . The “–netmask 255.0.0.0″ assigns subnet mask for the network. The “–lowerip” and “–upperip” options assign a lower ip address and upper ip address respectively. The “–enable” option enables the DHCP server we just created. The “–netname” option assigns a name to the network. Now we have successfully created an internal network named pentest lab with its own DHCP server. Now change the network adapter settings of the attacker machine ( Kali Linux ) to pentest lab.
Similarly change the network settings of the victim machine.
Now start the attacker machine (Kali Linux) to see if the IP address is automatically assigned. If the IP address has not been assigned, disable the adapter using command “ifdown eth0″ and re enable it by typing command “ifup eth0″. Now check if the IP address has been assigned or not by typing command “ifconfig”.
Similarly check on the victim machine.
We can see that the IP addresses have been automatically assigned successfully starting from the range of 10.10.10.2. Hope this was helpful.
Oracle VirtualBox is the virtualization software we will be using to create our lab. We will be using Kali Linux as the attacker machine and Metasploitable 2 as the victim machine. Install Kali Linux and Metasploitable 2 in VirtualBox.
Select Kali Linux, Go to settings > network. Enable “network adapter 1″. Set the “Attached to” option to “internal network”. Set the name of the network adapter to “intnet”. Click on “OK” to save the settings.
Do the same for Metasploitable virtual machine.
Power on the metasploitable VM. Log into the system. Default username and password are “msfadmin”.
Type the command “ifconfig” to see the IP addresses of interfaces.
The ‘lo’ interface is the loopback. Now we are going to set the IP address on the interface “eth0”. Type the command “sudo ifconfig eth0 10.10.10.2 netmask 255.0.0.0 up”. The sudo password is “msfadmin. Verify that the IP address is set by typing command “ifconfig”.
Power on Kali Linux. In the terminal, type command “ifconfig eth0 10.10.10.1 netmask 255.0.0.0 up”. Verify if the IP address is set by typing command “ifconfig”.
Test whether this system can communicate with victim system by pinging the victim machine as shown below.
The connection is successful. Our penetration testing lab is ready. Happy practicing.
In this howto, you will installing metasploitable in VirtualBox. What is Metasploitable? Learning penetration testing or ethical hacking requires practical knowledge and good practice needs a vulnerable target. That is where Metasploitable comes into picture. It is an intentionally vulnerable operating system made by the makers of Metasploit themselves so that aspiring ethical hackers can practice and hone their hacking skills. As its name conveys Metasploitable is loaded with vulnerabilities that can be exploited with Metasploit modules.
This virtual machine can be used to conduct security training, test security tools, and practice common penetration testing techniques. For this i am going to use Metasploitable 2 which can be downloaded from here. After downloading the zip archive, extract the files into a folder. The file contents look like below.
Open VirtualBox and click on “New Virtual machine wizard”. Type the name of your choice. I am using ‘Metasploitable-2‘. Choose ‘Type’ as Linux and ‘version’ as Ubuntu. Click on “Next”.
Choose the memory size appropriate to the availability of RAM on your host machine although 512MB is more than enough. Click on “Next”.
In the hard drive creation window, select option “Use an existing virtual hard drive”, browse to the folder where we have extracted our zip files and select the ‘vmdk’ file available. Click on “Create”.
Then you are automatically booted into the metasploitable OS. The default username and password are “msfadmin”.
With this we successfully finished installing Metasploitable in Virtualbox. See how to create a penetration testing lab.
The makers of Kali Linux have a released the second version (2020.2) of Kali Linux for the year 2020. Since many versions have been released since we last wrote this article, we decided to update this article on how to install Kali in Virtualbox.
Kali Linux 2020.2 has many brand new features. With xfce and gnome given Kali Linux feel, this release has given themes for KDE Plasma. This is like going back to its roots as Backtrack used to have this desktop environment. The login screen also has been given new graphics along with a new layout. Also now you can install Powershell by default by selecting the meta package while installing. This release also updated gnome to 3.36. The new tools included in this release include NextNet, the pivot point discovery tool and SpiderFoot the OSINT tool.
The makers also included python2-pip once again to add support to some tools still depending on python2 although overall it upgraded to Python 3.8. This release also replaces CherryTree, the note taking application with Joplin. Now, let us see the simplest process to install Kali in Virtualbox. For this download the virtualbox image of Kali Linux 2020.2 from here. We have performed this installation in the Oracle Virtualbox 6.
This howto is using the Kali Linux 32bit OVA . Your downloaded contents should look like below. As you can see, we have an ova file.
Now open Virtualbox and go to File Menu > Import Appliance as shown below. It can also be accessed using shortcut CTRL+ I.
A window like below will open. Browse to the OVA file we downloaded.
After selecting the OVA file, click on “Next”. If you want to make any changes to the virtual machine settings like RAM, name etc, you can do it here. You can also leave it to default values if you want. Click on “Import”.
Click “Agree” when the software license agreement pops up as shown below. The import process starts.
After the import process is completed, Power On the virtual machine. You will see a login screen prompt. Login using the credentials kali:kali.
Here is the final look of the Kali Linux virtual machine we installed.