Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line




Download 6,34 Mb.
Pdf ko'rish
bet126/203
Sana10.01.2024
Hajmi6,34 Mb.
#134102
1   ...   122   123   124   125   126   127   128   129   ...   203
Bog'liq
Linux This Book Includes 4 Manuscripts The Underground Bible

The Installation Process
It is relatively easy to install Kali Linux on your computer. You need to
have compatible computer hardware to facilitate the process. The hardware
requirements are not many, but having good hardware leads to better
performance. You will need at least 20GB disk space before you start the
installation process. You will also need a RAM for i386 and at least 1GB.
You will also need a CD-DVD Drive or a USB boot support. Once you have
all the requirements, download Kali Linux, burn it to DVD and set your
computer to boot from CD in the BIOS.
There are video and monitor adapter requirements that affect the Linux
installation process. Linux is known to support all standard CGA,
Hercules, VGA, and EGA monitors for the interface. You will likely use a
mouse for the most part, but other Linux applications not linked to the
graphics environment also use it. Start by booting the selected installation
medium to start your installation. You will be greeted with a Kali Boot
screen and give options to choose from. You can choose a text-mode or
graphical install. Choose the language that you prefer and your location.
You will be asked to configure the keyboard with a suitable keymap. Once
you do that, you can indicate your geographic location.
The person who is installing Kali Linux will copy the image to your hard
drive and ask for your network interface. Once you give the information,
you will be asked to enter the hostname for the system. You can enter ‘kali’
as the hostname. You are allowed to use a domain name for the system to
use. Apart from the hostname, you also need to give the name for a non-
root use. The system will create a default user ID which can be changed
easily. 
Once you set the time, the installer will review your disk and give four
options to choose from. For more granular configuration choices,
experienced users can opt for manual partitioning. You can either choose to
keep the files in one partition or separate them. Before the installer makes


final changes, you will have the final chance to analyze your disk
configuration. You have some time to make changes before the installer
locks you out. Once you click Continue, the installer will work on the disk,
and the installation process will almost be over.
The good thing about Linux is that it is an open-source and free OS that can
be used by anyone with programming skills. It can be modified and adapted
to a new operating system based on a user’s requirements. Furthermore,
Linux is user-friendly and has several features that make it ideal. There is
no need for antivirus with Linux. It is also reliable when used with servers
and can run nonstop for years with the boot. It is low-maintenance, and this
makes it convenient for all. Linux has several distributions including
Redhat, Ubuntu, and Fedora and the installation process is the same for all.
You can install Linux using CD-ROM. You can download the ISO files
from the Internet and keep it in the CD-ROM.
Alternatively, you can make it bootable and store it in the USB stick. To
boot it into the USB stick, you need to follow certain steps. After attaching
CR-ROM into the computer, restart it, then press enter when boot starts.
Proceed to select the CD-ROM to begin the booting process. You can opt
for a manual boot by pressing F12 which will give you different boot
options to choose from. You need to select one option from the list given.
Keep in mind that you will see a new screen called GNU GRUB when the
computer boots. 
It is the boot loader responsible for the installations of Linux. It will appear
when there is more than one OS. After booting into the USB stick, you
need to select the derive. Choose the drive upon which the installation of
the operating system will be done. If you want to replace the current OS,
select ‘erase the disk and install new one’ but if you want something
different, click the install number. Once you have determined where the
installation process will be completed, start the process. You will be asked
to confirm the installation by a small panel. If you are satisfied with the
information provided, click continue. Choose your location on the map
provided and start the installation process. Ensure that you give the login
details. When the installation is done, you will be told to restart your
computer to complete the installation process. To make operations easy,
download drivers that you like in the system settings menu.


Some people prefer to install encrypted Kali Linux. Sometimes we have
sensitive data that we do not want others to access. In such a scenario, we
go the extra mile to protect the data, and this is where encrypted Kali Linux
comes in. Thanks to Kali, you can now install an LVM encrypted install on
a USB drive or Hard Disk. If you are not comfortable with one, you can use
the other one. The good thing is that the installation process is similar to the
regular Kali Linux install. 
The only difference comes in picking an encrypted LVM partition when
installing it. For an encrypted Kali Linux install, you need compatible
computer hardware. The requirements are similar to normal Kali Linux
install. Once you are set, download Kali Linux, and burn it in a DVD and
set the computer to boot from the CD. The installation process is similar
only that now you are dealing with an LVM encrypted Kali Linux install.
Before you start, you need an install medium. 
It is better to use a USB, and proceed to pick an image from the Kali
download page. Ensure that you have an empty drive. Another thing to
note is that it might take some time to write, so you need to be patient
throughout the process. Once you get the USB, insert it into the computer
you intend to install the Kali and boot it. Choose the USB drive as the
booting device. Installing Kali Linux is not easy, but if you know Debian, it
should not be problematic. After configuring the drives, Kali will start the
installation process. Things may seem different if you are a Debian user.
The installation process does not take long. Once it is done, you will be
alerted on what to do next.
There are several reasons why you should install Kali Linux. Unlike other
software, it is free of charge.
It also has more tools to pick fr and users are free to weigh their options. It
is also multi-language support, enabling users to operate in their native
language. While the while penetration tools are written in English, users
have the liberty to use the language they are comfortable with. Moreover, it
is easy to locate and use tools at any time. Kali Linux is popular because it
is customizable.


The developers know that not everybody accepts their design model and
allows people to customize Kali Linux to their tastes. Kali Linux comes
with a set of tools that makes it more appealing. It comes with an aircrack-
ng, which is a set of tools used to get Wi-Fi network security. It deals with
pertinent areas of Wi-Fi security, such as attacking, monitoring, cracking
and testing. Monitoring refers to packet capturing and export of data to text
files for extensive analysis. This is done using third-party tools. Testing is
the process of checking Wi-Fi card abilities. Attacking is examining fake-
access points, de-authentication, and replay attacks.
The tools are made in such a way that they allow heavy scripting. Another
tool that comes with Kali Linux and why you should install it is Nmap. This
is a network mapper that is an open-source for security auditing and
network discovery. It employs raw IP packers in know hosts that are
available on a network and types of services they offer. It also considers
operating systems run by the available host. Nmap is also used to perform
network inventory and monitoring hosts. THC Hydra is another tool that
comes with Kali Linux. It is effective when in need of a force to crack an
authentication service. It is also used to perform rapid dictionary attacks on
telnets, SMB, HTTP, and FTP. It can be employed to crack web scanners or
packet crafters. Nessus can also be used in a similar manner. It is a tool that
is used to scan for computer vulnerabilities.
You need to do a couple of things after installing Kali Linux. While Kali
Linux is efficient, it does not have everything required to run daily
penetration testing. You can adopt some tricks and tips to start using Kali
Linux with ease. The majority of Linux Distributions are customizable,
which means that it is hectic to personalize the penetration testing
distribution. However, you can do some things to improve your interaction
with the OS .
Immediately the installation process ends, install Git, an open-source
software control application. It is used to edit or share code. It is an
important tool used for penetration testers who want to expand toolsets to
surpass what is currently there in the Kali Repositories. It is also important
to configure bash aliases after installing Kali Linux. These are great for
creating customized commands. Users can choose to create new low
privilege users. Never open or use certain applications as root users because


they can be problematic. Instead, install a terminal multiplexer to open
terminal sessions easily.



Download 6,34 Mb.
1   ...   122   123   124   125   126   127   128   129   ...   203




Download 6,34 Mb.
Pdf ko'rish

Bosh sahifa
Aloqalar

    Bosh sahifa



Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line

Download 6,34 Mb.
Pdf ko'rish