01 Ethical Hacking Introduction

本文详细介绍Kali Linux的安装与使用,包括虚拟环境搭建、常用Linux命令详解及网络渗透测试的基本步骤。从实验室环境设置到网络攻击技巧,全面覆盖预连接攻击、获取访问权限及后连接攻击等关键环节。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

List of Content

  1. Network Hacking
  2. Gaining Access
  3. Post Exploitation
  4. Website Hacking

1. Setting up the Lab

  • Download VirtualBox and VirtualBox Extension Pack
  • Download Kali Linux
  • Install and enter Kali linux
    • Default Username: root
    • Default Password: toor

2. Linux Command

Reference and Descriptions

CommandDescriptionExample
lsList information about file(s)ls -la
cdchange directorycd /opt/test
pwdPrint Working Directorypwd
touchChange file timestamps or Create a new filetouch desc.txt
mkdirDisplay a calendarmkdir -p /opt/test/img
catConcatenate files and print on the standard outputcat desc.txt
moreDisplay output one screen at a timemore desc.txt
tailOutput the last part of filestail -100 desc.txt
cpCopy one or more files to another locationcp desc.txt /mnt/
cp -r test /mnt/
mvMove or rename files or directoriesmv desc.txt /mnt/
rmRemove filesrm -rf test
findSearch for files that meet a desired criteriafind /opt -name '*.txt'
lnMake links between filesln -s /opt/test ./link2test
ifconfigdisplay current network configuration informationifconfig
netstatdisplay network connectionsnetstat -a
psProcess statusps -ef
ps-ef | grep java
duEstimate file space usagedu -h /opt/test
dfDisplay free disk spacedf -h
topList processes running on the systemtop
killStop a process from runningkill -s 9 27810
tarTape Archiver Compress: tar -zcvf test.tar.gz ./test
Unzip: tar -zxvf test.tar.gz
chownChange the user and group ownership of fileschown nginx:nginx desc.txt
chown -R nginx:nginx test
chmodChange the access permissions of files and directorieschmod u+x test.sh
chmod u+x -R test
vim / viText Editorvim desc.txt
vi hello.txt
shutdownshutdown your computershutdown -h now
shutdown -r -t 60
manHelp manualman ls
apt-get updateUpdate the list of programs your can install
apt-get installInstall the program you wantapt-get install terminator

Use --help as any Command option for help


3. Network Hacking

  • Pre-connection Attacks
  • Gaining Access
  • Post-connection Attacks
Why change the MAC adrress
  1. Increase anonymity
  2. Impersonate other devices
  3. Bypass filters
How to change the MAC adrress
  1. use ifconfigto list all the network interfaces available
  2. the MAC address is after ether
  3. use ifconfig [devicename] downto turn down the device you want to change
  4. use ifconfig [devicename] [option] [value]to turn down the option you want to change
  5. eg: ifconfig wlan hw ether 00:11:22:33:44:55

  6. use ifconfig [devicename] upto turn on
Wireless Modes(Managed & Monitor)
  1. use iwconfigto check your modes
  2. use ifconfig [devicename] downto turn down the device you want to change
  3. use airmon-ng check killto list the running process
  4. use iwconfig [devicename] mode monitorto change your mode into monitor
  5. use ifconfig [devicename] upto turn on
Packet Sniffing Basics using Airodump-ng
  • use airodump-ng [devicename] to list all networks around
  • 在这里插入图片描述

  • use airodump-ng --band -a [devicename] to only detect 5GHz bands

  • use airodump-ng --band -abg [devicename] to detect both 5GHz & 2.4GHz

  • use airodump-ng --bssid [MAC Address] --channel [CH] --write [filename] [devicename]to target

  • Deauthentication Attack (Disconnect Any Device from the Network)

    use aireplay-ng --deauth [Time] -a [MAC1] -c [MAC1] [devicename]

    • TIME: e.g. 100000000
    • MAC1: Target Router
    • MAC2: Client
    ~# airodump-ng --bssid 74:05:A5:53:3E:10 --channel 11 wlan0
    ~# aireplay-ng --deauth 1000000 -a 54:75:95:75:8A:91 -c 9C:E3:3F:76:5C:8C wlan0
    
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值