Kali Linux
Date: 2020-10-21
Skill Level: Advanced
Kali Linux is a distribution of Linux configured for penetration testing, or pentesting. Kali has a wide variety of tools preinstalled for pentesting. This session's challenges will go through a selection of the tools available in Kali Linux.
Challenges
You can access the session through SSH.
SSH using [email protected]
with the password this-password-sucss
. Anything on the network 172.19.0.0/24
is fair game to attack except for items named sucss-kali
; you must not attack these.
There are five flags available in this session - they are of a higher value, as we expect the challenges to take longer than usual. There is a bonus flag worth 25 points for completing all five flags.
This session will only be available until Wednesday 28th October at 6pm.
Useful Resources for Session
A network mapper; this is an invaluable tool for networking purposes, such as checking what IP addresses are 'live' so to say and what services are running on a given IP address. Always a good place to start when checking over a range of IP addresses.
The Metasploit Framework specifically is a tool for executing exploit code against a remote target machine. This will come in useful for a few of the challenges.
Prerequisite Knowledge
This sessions assumes that you are familiar with a Unix shell. If you are not but wish to take part, we highly recommend that you read the first three chapters of this crash course.
Prerequisite Technology
You will need to be able to use SSH.
If you are on macOS or a Linux operating system, you can use the ssh
command in your terminal.
If you are on Windows, you can either use PuTTY by entering the details. You can also use the Windows Subsystem for Linux, which would then allow for the use of the ssh
command.