Kali Linux additional tools setup
The steps are pretty straight forward. The only tool that might cause some confusion is SMBexec. This requires you to interact 3 times with a different option every time. So here’s the options you need to use, in the correct order
- Select option 1 (When prompted for the path, write: /opt/tools)
- Select option 4
- Select option 5
Right after you have written the path to where to install SMBexec, the script will ask you the same question. Make sure that you write the same, /opt/tools, there as well. This is so the bash script knows where to find the new install.sh script for SMBexec.
Other than this, the rest of the process is very simple.
You can either download the script from my gist here , or copy the code from below
#!/bin/bash echo "" echo "==========================================================================" echo "= Pentest Attack Machine Setup =" echo "= Based on the setup from The Hacker Playbook =" echo "==========================================================================" echo "" # Prepare tools folder echo "[+] Creating tools folder in /opt" mkdir /opt/tools/ echo "" # Setting up metasploit with postgresql echo "[+] Setting up metasploit with postgresql" service postgresql start service metasploit start echo "" # Discover Scripts - Passive reconnaissance echo "[+] Installing Discover Scripts" cd /opt/tools/ git clone https://github.com/leebaird/discover.git cd /opt/tools/discover/ /opt/tools/discover/setup.sh echo "" # SMBexec - Grab hashes out of the Domain Controller and reverse shells # Step 1: Select option 1 # Step 2: Select option 4 # Step 3: Select option 5 echo "[+] Installing SMBexec" cd /tmp/ git clone https://github.com/brav0hax/smbexec.git cd /tmp/smbexec/ echo "[+] Select option 1" /tmp/smbexec/install.sh echo "[*] Where did you install SMBexec?: " read smbexecpath $smbexecpath/smbexec/install.sh echo "" # Veil - Create Python based Meterpreter executable echo "[+] Installing Veil Framework" cd /opt/tools/ git clone https://github.com/Veil-Framework/Veil-Evasion.git Veil cd /opt/tools/Veil/setup /opt/tools/Veil/setup/setup.sh echo "" # WCE (Windows Credential Editor) - Pulls passwords from memory echo "[+] Downloading and installing WCE (Windows Credential Editor)" mkdir /opt/tools/wce/ cd /tmp/ wget http://www.ampliasecurity.com/research/wce_v1_41beta_universal.zip unzip -d /opt/tools/wce/ wce_v1_41beta_universal.zip rm -f wce_v1_41beta_universal.zip echo "" # Mimikatz - Pulls passwords from memory echo "[+] Installing Mimikatz" mkdir /opt/tools/mimikatz/ cd /tmp/ wget https://github.com/gentilkiwi/mimikatz/releases/download/2.0.0-alpha-20150122/mimikatz_trunk.zip unzip -d /opt/tools/mimikatz/ mimikatz_trunk.zip rm -f mimikatz_trunk.zip echo "" # PeepingTom - Website snapshots echo "[+] Installing PeepingTom" cd /opt/tools/ git clone https://bitbucket.org/LaNMaSteR53/peepingtom.git cd /opt/tools/peepingtom/ wget https://gist.githubusercontent.com/nopslider/5984316/raw/423b02c53d225fe8dfb4e2df9a20bc800cc78e2c/gnmap.pl echo "" # Download appropriate PhantomJS package if $(uname -m | grep '64'); then wget http://phantomjs.googlecode.com/files/phantomjs-1.9.2-linux-x86_64.tar.bz2 tar xf phantomjs-1.9.2-linux-x86_64.tar.bz2 cp /opt/tools/peepingtom/phantomjs-1.9.2-linux-x86_64/bin/phantomjs . else wget http://phantomjs.googlecode.com/files/phantomjs-1.9.2-linux-i686.tar.bz2 tar xf phantomjs-1.9.2-linux-i686.tar.bz2 cp /opt/tools/peepingtom/phantomjs-1.9.2-linux-i686/bin/phantomjs . fi echo "" # Nmap script - Quicker scanning and smarter identification echo "[+] Installing nmap scripts" cd /usr/share/nmap/scripts/ wget https://raw.githubusercontent.com/hdm/scan-tools/master/nse/banner-plus.nse echo "" # PowerSploit - Scripts for post exploitation echo "[+] Installing PowerSploit" cd /opt/tools/ git clone https://github.com/mattifestation/PowerSploit.git cd /opt/tools/PowerSploit/ wget https://raw.githubusercontent.com/obscuresec/random/master/StartListener.py wget https://raw.githubusercontent.com/darkoperator/powershell_scripts/master/ps_encoder.py echo "" # Responder - Used to gain NTLM challenge/response echo "[+] Installing Responder" cd /opt/tools/ git clone https://github.com/SpiderLabs/Responder.git echo "" # SET (Social Engineering Toolkit) - Pre-installed on Kali Linux echo "[+] Installing SET (Social Engineering Toolkit)" cd /opt/tools/ git clone https://github.com/trustedsec/social-engineer-toolkit.git set cd /opt/tools/set/ /opt/tools/set/setup.py install echo "" # Bypassuac - Used to bypass UAC in post exploitation # → https://www.trustedsec.com/downloads/ echo "[+] Installing Bypass UAC" cd /tmp/ wget https://www.trustedsec.com/files/bypassuac.zip unzip bypassuac.zip cp bypassuac/bypassuac.rb /opt/metasploit/apps/pro/msf3/scripts/meterpreter/ mv bypassuac/uac/ /opt/metasploit/apps/pro/msf3/data/exploits/ rm -Rf bypassuac echo "" # BeEF - cross-site scripting framework # → http://beefproject.com/ echo "[+] Installing BeEF" apt-get install beef-xss echo "" # PEDA - Python Exploit Development Assistance for GDB # → Repository: https://github.com/longld/peda echo "[+] Installing PEDA" git clone https://github.com/longld/peda.git /opt/peda echo "source /opt/peda/peda.py" >> ~/.gdbinit echo "" # The End echo "[+] All tools installed successfully!" echo "[+] ~~~ Happy Hacking! ~~~" echo ""
Kali Linux additional tools setup的更多相关文章
- 2018 kali linux install tools
1.VM setup https://www.vmware.com/products/workstation-pro/workstation-pro-evaluation.html VMware-Wo ...
- 关于kali linux 2.0的vmware tools的安装问题
在安装好kali linux 2.0 后,首先要做的就是添加源并更新系统,否则会出现软件定位问题. 在kali 2.0中,vmware tools已经不能使用了,官方放了一个工具下载安装就好. 添加源 ...
- Kali Linux安装VMWare Tools
操作环境: 虚拟机操作系统: Kali Linux 2017.2 虚拟化软件: VMWare workstation 14 pro 加载光盘 在VMWare上依次点击"虚拟机->安装V ...
- Kali linux 2016.2(Rolling) 的详细安装(图文教程)附安装VMare Tools 增强工具
写在前面的话 因读研期间,实验室团队需要,所以,接触上了Kali Linux,需去获得网络安全方面的数据,即数据和信息收集.以便为后续的数据处理和分析,准备! 用到hadoop和spark.机器学习等 ...
- Kali Linux下安装VMware Tools
引言 Kali Linux是基于Debian的Linux发行版, 设计用于数字取证和渗透測试.安装Kali Linux非常easy,可是安装VMware Tools的过程就有点麻烦了,由于在安装中途会 ...
- kali linux与虚拟机Vmware安装vmware tools(主机与虚拟机的文件拖拽)
一.打开虚拟机任务栏"虚拟机"-----点击安装Vmware tools 二.回到开启的kali linux系统中,找到vmware tools CD文件夹,拖拽出文件中的压缩文件 ...
- kali linux tools
1.HTTrack:网站复制机制 2.Google高级搜索命令 site:domain terms to search site :dsu.edu pat engebreston 3.kali lin ...
- KALI LINUX系统初始化配置
1.Kali Linux安装VirtualBox增强功能 VirtualBox增强功能介绍:物理机与虚拟机之间的文件共享.物理机与虚拟机之间的剪切板共享.虚拟机的direct3D支持,这样虚拟机窗口就 ...
- kali linux Python开发环境初始化
kali linux Python 黑客编程1 开发环境初始化 为什么要选择Python? Python作为目前Linux系统下最流行的编程语言之一,对于安全工作者的作用可以和C++相提并论.Pyth ...
随机推荐
- USB协议规范学习(一)
什么是USB OHCI规范? OHCI(Open HCI)是目前使用比较广泛的三种USB主机控制器规范之一.USB体系结构是由四个主要部分组成:客户软件/USB驱动,主机控制器驱动(HCD),主机控制 ...
- Performance Considerations for Entity Framework 4, 5, and 6
Performance Considerations for Entity Framework 4, 5, and 6 https://msdn.microsoft.com/en-sg/data/hh ...
- mount: /dev/sdb1 already mounted or /mnt/hdb busy 导致NameNode无法启动
最近,公司由于断电导致的服务器关机,等到来电了,重启集群发现Namenode无法启动,查看原因是由于无法加在faimage文件,在查看一下Namenode的磁盘挂在情况(df -h命令查看),发现磁盘 ...
- UITableView去掉section的header的粘性
思路:若header的高度为25,在滑动的时候将scrollView的内容偏移量上衣25,其实他还是粘在上面只不过我们看不到他了. ///---用于判断往上滑还是往下滑 var deltaY:CGFl ...
- NSString,NSArray,NSNumber等类的继承问题
问题引入,我想给NSString类扩展一些新的方法.在Objective-C中可以有两种方法,一是继承,二是类别.本文先不讨论类别,我们用继承的方法试一下: @interface StringEx : ...
- GCHandler的使用
众所周知,我们在使用c#托管代码时,内存地址和GC回收那不是我们关心的,CLR已经给我们暗箱操作. 但是如果我们在c#中调用了一个非托管代码,比如vc的DLL,而且他有个回调函数,需要引用c#中的某个 ...
- NOIP 考前 Tarjan复习
POJ 1236 给定一个有向图,求: 1) 至少要选几个顶点,才能做到从这些顶点出发,可以到达全部顶点 2) 至少要加多少条边,才能使得从任何一个顶点出发,都能到达全部顶点 第一个就是缩点之后有多少 ...
- 购物车数字加减按钮HTML+CSS+JS(有需要嫌麻烦的小伙伴拿走不谢)
之前在写详情页的时候,如下图 因为自己嫌麻烦,就去看其他网站是怎么写的,想直接拿来用,后来看来看去觉得写得很麻烦,于是最后还是决定自己写,附上HTML+CSS+JS代码,一条龙一站式贴心服务2333 ...
- PHP 记录日志
public function writelog($message) { $logFileDir = LOG_PATH; $logFile = 'monitor' . date('Y-m-d') . ...
- Keepalived双机热备
一,Keepalived双机热备的应用场景 1,网站流量不高,压力不大,但是对服务器的可靠性要求极其高,例如实时在线OA系统,政府部门网站系统,医院实时报医系统,公安局在线报案系统,股市后台网站系统等 ...