Chuyển đến nội dung chính

Hướng Dẫn Thực Hành - Cài Đặt BackTrack 5 (Lesson 1)


Bài thực hành (cài đặt trên náy tính của học viên tại lớp học hoặc cài trên máy tính làm việc tại văn phòng / on-site)

What is BackTrack 

    • BackTrack is an operating system based on the Ubuntu GNU/Linux distribution aimed at digital forensics and penetration testing use. It is named after backtracking, a search algorithm. The current version is BackTrack 5, code name "Revolution."

    • BackTrack provides users with easy access to a comprehensive and large collection of security-related tools ranging from port scanners to password crackers. Support for Live CD and Live USB functionality allows users to boot BackTrack directly from portable media without requiring installation, though permanent installation to hard disk is also an option

    • BackTrack includes many well known security tools including
      • Metasploit integration
      • RFMON Injection capable wireless drivers
      • Aircrack-NG
      • Kismet
      • Nmap
      • Ophcrack
      • Ettercap
      • Wireshark (formerly known as Ethereal)
      • BeEF (Browser Exploitation Framework)
      • Hydra
    • BackTrack Download
Lưu ý : Để thực hiện bài lab các bạn cần cài đặt sẳn ứng dụng VMWare bản mới nhất và download tập tin ảnh của công cụ BackTrack (file iso) lưu trên thư mục VMWare ISO's.
Section 1. Create a New Virtual Machine
  1. Create a New Virtual Machine. (See Below)
  2. New Virtual Machine Wizard
    • Instructions:
      1. Select the radio button "Installer disc image file (iso):"
      2. Click the Browse Button.
      3. Navigate to where you BT5 iso is located.
      4. Select the BT5 iso
      5. Click Next
  3. New Virtual Machine Wizard
    • Instructions:
      1. Guest operating system:  Linux
      2. Version: Ubuntu
      3. Select Next
  4. New Virtual Machine Wizard
    • Instructions:
      1. Virtual machine name: BackTrack5R1
      2. Location: In my case, I saved it to my USB drive, located in H:\BackTrack5R1\
      3. Select Next
  5. New Virtual Machine Wizard
    • Instructions:
      1. Maximum disk size (GB): For our purposes use 20GB.
      2. Radio Button:  Store virtual disk as an single file
      3. Select Next
  6. New Virtual Machine Wizard
    • Instructions:
      1. Click on the "Customize Hardware..." button
  7. New Virtual Machine Wizard
    • Instructions:
      1. Click on Memory (which is highlighted in blue)
      2. Click on 512 MB. (Recommended is 1024 MB, but not really needed for lab purposes).
      3. Do not click on OK
  8. New Virtual Machine Wizard
    • Instructions:
      1. Click on Network Adapter
      2. Click on "Bridged: Connected directly to the physical network"
      3. Click OK.
  9. Click on the Finish button.
    • Instructions:
      1. Click the Customize Hardware... button
  10.  Start the Boot Process
    • Instructions:
      1. Press Enter
  11. BackTrack Live CD
    • Instructions:
      1. Select "BackTrack Text - Default Boot Text Mode"
      2. Press <Enter>
  12. Bring up the GNOME
    • Instructions:
      1. Type startx

Section 2. Install BackTrack to Harddrive
  1. Install BackTrack to Harddrive
    • Instructions:
      1. Option 1: Double Click on the icon labeled "Install BackTrack"
        • OR
      2. Option 2: System --> Administration --> Install BackTrack Live
  2. Select Language
    • Instructions:
      1. In my case: English.
      2. Click Forward
  3. Select Language
    • Instructions: (In my case)
      1. Region: English
      2. Time Zone: United States (Chicago)
      3. Click Forward
  4. Select Language
    • Instructions: (In my case)
      1. Suggested option: USA
      2. Click Forward
  5. Select Language
    • Instructions:
      1. Select "Erase and use the entire disk"
      2. Select Forward
    • OR Note (This is optional)
      1. If you select "Specify partitions manually", then you can create you own file systems layout.
        • /     - 2000 MB
        • /boot - 500  MB
        • swap  - 1280 MB (Double Memory)
        • /tmp  - 1000 MB
        • /home - 2000 MB
        • /var  - 2000 MB
        • /usr  - 3000 MB
        • Then use the rest as needed using volume management.
  6. Select Language
    • Instructions:
      1. Click on Install
  7. Informational
    • Note(FYI):
      • The installation process will take between 10 and 45 minutes depending on your systems resources.
  8. Consistency Reboot
    • Instructions:
      1. Click on Restart Now

Section 3. Login to BackTrack
  1. Edit Virtual Machine Settings
    • Instructions:
      1. Virtual Machine --> Virtual Machine Settings...
  2. Edit CD/DVD (IDE)
    • Instructions:
      1. Select CD/DVD (IDE)
      2. Click on Use physical drive:
        • Select Auto detect
      3. Click the OK Button
  3. Login to BackTrack
    • Instructions:
      1. Login: root
      2. Password: toor
  4. Bring up the GNOME
    • Instructions:
      1. Type startx
  5. Bring up a console terminal
    • Instructions:
      1. Click on the Terminal Console Icon
  6. Change root's password
    • Instructions:
      1. passwd root
      2. Use our standard class password
  7. Create a student account and set password
    • Instructions:
      1. useradd -m -d /home/student -c "Security Student" -s /bin/bash student
      2. passwd student
      3. Use our standard class password

Section 4. Installing VMware Tools
  • Why are we installing VMware tools?
    • It's nice to be able to cut and paste from the host machine into the VMWare instance.
  1. Install build-essentials and linux-headers
    • Instructions:
      1. You must be root!!!
      2. aptitude install build-essential linux-headers-$(uname -r)
  2. Installation Question and Answer
    • Instructions:
      1. Do you want to continue? [Y/n/?] Y
  3. Mount VMware Tools
    • Instructions:
      1. Virtual Machine --> Install VMware Tools...
  4. Check if VMware Tools is mounted
    • Instructions:
      1. df -k
    • Notice that /media/VMware Tools is mounted.
  5. VMware Tools Set Up Work
    • Instructions:
      1. cd /media/VMware\ Tools
      2. ls -lrta
      3. cp VMwareTools* /var/tmp
      4. cd /var/tmp
      5. gunzip VMwareTools*
      6. tar xovf VMwareTools*
  6. Install VMware Tools
    • Instructions:
      1. cd /var/tmp/vmware-tools-distrib
      2. ./vmware-install.pl
      3. yes
  7. Press Enter on the following Questions (See Below)
  8. Press Enter on the following Questions (See Below)
  9. Press Enter on the following Questions (See Below)
    • Note(FYI):
      • Answer "no" to changing the kernel header path...
  10. Press Enter on the following Questions (See Below)

Section 5. Proof of Lab
  1. Proof of Lab
    • Note(FYI):
      1. A new /boot/initrd.img-2.6.39.4 will be generated.
      2. You will have to reboot for the changes to take affect.
    • Instructions:
      1. cd /
      2. ls -l /boot/initrd.img-2.6.39.4
      3. echo "Your Name"
        • Replace the string "Your Name" with your actual name.
        • e.g., echo "Nguyen Van Minh"
    • Proof of Lab Instructions
      1. Press both the <Ctrl> and <Alt> keys at the same time.
      2. Do a <PrtScn>
      3. Paste into a word document
      4. Email to CSiRT247@Gmail.Com
  2. Power Off Machine
    • Note(FYI):
      • If you want to continue using BackTrack, then don't power off the machine.
    • Instructions:
      1. poweroff
    •  
      Các bạn có thể tham khảo video thực hành step by step trong thư mục Demo.

Bài đăng phổ biến từ blog này

Pentest lab - Metasploitable 2

Today I will walk through different ways of exploiting Metasploitable 2, the newer release of Rapid7’s popular vulnerable machine. First, what is Metasploitable? Metasploitable is an intentionally vulnerable Linux virtual machine. This VM can be used to conduct security training, test security tools, and practice common penetration testing techniques. In my lab environment, the IP of the attacker machine is 192.168.127.159, and the victim machine is 192.168.127.154. Since this is a test lab, I won’t be concerned about stealth. Instead, I will try to get the most information out of the scans. Let’s start by port scanning the target with nmap. I did a full port, aggresive scan against the target. Here are the results. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 ...

Metasploitable 2 vulnerability assessment

A vulnerability assessment is a crucial part in every penetration test and is the process of identifying and assessing vulnerabilities on a target system. In this part of the tutorial we will be assessing the vulnerabilities available on the network side of the Metasploitable 2 virtual machine. We will be assessing the web applications on the Metasploitable 2 machine in a later tutorial. In the previous Metasploit enumeration and fingerprinting tutorial we’ve learned that the Metasploitable 2 machine contains a lot of vulnerabilities. We have collected valuable information about the target system which we will be using to find known vulnerabilities both on- and offline. Exploitation of these vulnerabilities will be demonstrated in the next exploitation tutorial. In this tutorial we will be looking at a few different ways to perform vulnerability analysis. We will be manually searching for exploits, use scanning tools like Nmap with scripts and we will be...

CEH v9 (CEHVIETNAM.COM) - Hacking Metasploitable Lab

CEH v9 : Hacking Metasploitable VM In this guide, I will demonstrate how to root a Metasploitable 2 virtual machine. Metasploitable is an intentionally vulnerable Ubuntu machine. I’ll explore just a few of the many ways Metasploitable can be attacked, from vulnerabilities in common services to little known exploits and web vulnerabilities. I’ve set up Kali Linux and Metasploitable VMs in VirtualBox on the same network (bridged mode). Kali – 192.168.56.101 Metasploitable – 192.168.56.102 - Hãy thay IP của bạn cho thích hợp Contents   1 Footprinting 1.1 Ping 1.2 Traceroute 2 Scanning 2.1 Port Scanning 2.2 OS Fingerprinting 2.2.1 nmap 2.2.2 xprobe2 3 Enumeration 3.1 FTP (TCP 21) Enumeration 3.2 Telnet (TCP 53) Enumeration 3.3 SMTP (TCP 25) Enumeration 3.4 VNC (TCP 5900) Enumeration 3.5 X11 (TCP 6000) Enumeration 3.6 RLogin (TCP 513) Enumeration 3.7 IRC (TCP 6667) Enumeration 4 Exploitation 4.1 FTP Exploit 4.2 VNC Password Cracking 4.3 IRC E...