Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Kali Linux Wireless Penetration Testing Cookbook

You're reading from   Kali Linux Wireless Penetration Testing Cookbook Identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security

Arrow left icon
Product type Paperback
Published in Dec 2017
Publisher
ISBN-13 9781783554089
Length 216 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Sean-Philip Oriyano Sean-Philip Oriyano
Author Profile Icon Sean-Philip Oriyano
Sean-Philip Oriyano
Arrow right icon
View More author details
Toc

Installing Kali in a virtual environment

Installing Kali within a virtual environment is another option and one that is not much more difficult than installing it on a hard drive. In this recipe, we will create our own virtual machine with Kali. The goal at the end of this recipe is to have our own fully configured, operational, and customized virtual machine which will run the Kali distro.

One thing to keep in mind is that on the kali.org website virtual machines, which can be used both in Oracle's VirtualBox and in VMware, are available for download. If you do not wish to create your own virtual machine from scratch, you can simply download one of these virtual machine images, load in the virtualization software of your choice, and be ready to go. However, keep in mind that you may be more comfortable creating your own virtual machine from scratch, so that you can customize and set it up exactly the way you want it to be.

Getting ready

Something to be aware of if you choose to virtualize Kali and use it for wireless network testing is that you will need to configure your virtual environment to work with an external adapter on the host system. In most cases, you will need to use an external USB wireless adapter and find out how to configure your virtualization software to use a technique commonly known as USB Passthrough. Since this is unique to a virtualization software package, we will not be covering this process here.

How to do it...

The steps documented here were performed using VMware Player, but is fairly similar on other virtualization platforms such as VirtualBox. However, no matter the virtualization platform, you will need to download either the 32 bit or 64 bit ISO file from the Kali website.

  1. In your software, you will need to create a new virtual machine.
  2. Choose the ISO file you downloaded when prompted.
  1. Select Guest Operating System which many virtualization packages will auto-detect, but you may need to adjust the settings in some cases.
  2. Set name and location of the new virtual machine.
  3. Set disk space (20 GB is good enough, but more is better).
  4. Review the hardware configuration and start the virtual machine.
  5. Select Graphical Install go through normal selection of the language, time zone, hostname, and so on.
  6. When prompted for disk partition, select hard-drive and select all-in-one.
  7. Click on finish partitioning and write changes to disk, choose yes to write.
  8. Set the network mirror and the boot-loader.
  9. Wait for the installation to finish.
You have been reading a chapter from
Kali Linux Wireless Penetration Testing Cookbook
Published in: Dec 2017
Publisher:
ISBN-13: 9781783554089
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €18.99/month. Cancel anytime