Installing additional weapons
Prior to or during a penetration test, it may be necessary to include other tools that are not commonly available with Kali Linux. The art of penetration testing has a great many individuals constantly creating tools that you can include. As a result, it may be necessary to install these tools to your Kali Linux setup. In other circumstances, it is generally a good idea to ensure that your tools are up to date prior to starting any penetration test.
When including additional penetration testing tools, it is advised to look within the Kali Linux repository first. If the package is available there, you can use the package and install using commands detailed below. Another option, if the tool is not available from the repository, the creator will often have a download option either on their website or through the software sharing and aggregation site GitHub.com.
While there are a number of tools available outside the Kali Linux repository, you should rely on those as it is easy to add these to your Kali Linux installation. Also, many of the packages that are not in the repository have dependencies on other software and may cause stability issues.
There are several package management tools that can be used to help you manage the software package in your system, such as dpkg
, apt
, and aptitude
. Kali Linux comes with dpkg
and apt
installed by default.
In this section, we will briefly discuss the apt
command in a practical way that is related to the software package installation process.
To search for a package name in the repository, you can use the following command:
This command will display the entire software package that has the name package_name
. To search for a specific package, use the following command:
If you have located the package but want more detailed information, use the following command:
To install a new package or to update an existing package, use the apt-get
command. The following is the command:
If the package is not available in the repository, you can download it from the developer's site or through the https://github.com/ website. Be sure to only include software from trusted sources. For those developers that include a Debian package format (the package will have the file extension .deb
), you can utilize the dpkg
command. For other packages, you will often find that they are compressed using a compression program such as 7-Zip and will often have the extension .zip
or .tar
.
To install a compressed file, the following steps usually work:
- Extract the software package using archiver programs such as Tar and 7-Zip.
- Change to the extracted directory.
- Run the following commands:
./configure
make
make installh
In this section, we will provide you with examples on how to install several additional security tools that are not available from the Kali Linux repository. We will give various mechanisms that can be used to install the software:
- Downloading the Debian package and installing it
- Downloading from the source package and installing it
Installing the Nessus vulnerability scanner
As an example, we want to install the latest Nessus vulnerability scanner (Version 6) for the first installation mechanism. We have searched the Kali Linux repository but are unable to find Nessus.
Nessus Version 6 has many new features as compared to Nessus Version 4, such as more flexible results filtering and report creation and simplified policy creation; we chose to use this version instead of Nessus Version 5.
We can download the latest Nessus package generated for Debian 6 Linux distribution from the Nessus website (http://www.nessus.org/products/nessus/nessus-download-agreement). To install this package, we issue the following command:
Tip
We used x.y.z
in the previous command to denote the Nessus version number. You need to change those numbers to the Nessus version that you just downloaded successfully.
You can then follow the instructions given on the screen to configure your Nessus server:
- Start the Nessus server by typing the following if it has not started yet:
- Open your browser and connect to
https://localhost:8834
. You will then be prompted with a warning about an invalid SSL certificate used by Nessus. You need to check the SSL certificate and then store the exception for that SSL certificate. The following is the Nessus page that will be shown after you have stored the SSL certificate exception. - After that, you will be guided to create a Nessus admin credential. Next, you will be asked to enter your activation code to register the Nessus scanner to Tenable. You need to register at http://www.nessus.org/register/ to obtain the activation code:
- After you have registered successfully, you will be able to download the newest Nessus plugins. The plugin download process will take some time to complete; you can do something else while waiting for the download process to finish:
Installing the Cisco password cracker
For the second example, we will use a simple program called cisco_crack
(http://insecure.org/sploits/cisco.passwords.html). This tool is used to crack the Cisco type 7 password.
Note
Cisco type 7 password is a very weak password, so it should not be used anymore. However, for penetration testing, we see that it is still being used, although it's not widespread anymore. This tool will be a help for this occasion.
After downloading the source code, the next step is to compile it. Before you can compile the source code cleanly, you need to add the following include statements:
#include <string.h>
#include <stdlib.h>
Now you have four include statements in the source code.
To compile the code, you can just give the following command:
If there is no error, an executable file with the name of cisco_crack
will be created. The following is the help screen of cisco_crack
: