NoobsPlanet

Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics, posts and unlimited download to our resources, as well as connect with other members through your own private inbox!

Getting Started : Install Penetration Tools

noobsplanet

Well-known member
Staff member
Administrator
Moderator
Previous Guide :
Install Kali Linux Console without Virtual Machine

The Kali Linux you've install have very few built-in tools. Tools are usually installed at /usr/bin so to take a look at tools you need to type ls /usr/bin which will list the available tools installed in your Kali. This guide also works for other non penetration Linux distros like Ubuntu, Linux Mint, Arc Linux, Elementary OS, etc. There are no penetration tools installed by default, everything need to install manually, so we will install the basic required things that you must install by pasting the following code:
Bash:
sudo apt-get update
sudo apt-get install wireless-tools
sudo apt-get install zlib1g zlib1g-dev
sudo apt-get install build-essential
sudo apt-get  install nmap
And here we install needed penetration tools if you wish you can install them all like below commands:

Anonymous Tools
  • Macchanger
  • proxychains
Bash:
sudo apt-get install macchanger proxychains -y
Information Gathering
  • whatweb
  • whois
Bash:
sudo apt-get install whatweb whois
Exploitation Tools
  • Matasploit
  • Social Engineering Toolkit
  • Websploit
Installing Metasploit framework requires java and other following packages :
Bash:
sudo add-apt-repository -y ppa:webupd8team/java
sudo apt-get update
sudo apt-get -y install oracle-java8-installer
sudo apt-get upgrade
sudo apt-get install gpgv2 autoconf bison build-essential curl git-core libapr1 libaprutil1 libcurl4-openssl-dev libgmp3-dev libpcap-dev libpq-dev libreadline6-dev libsqlite3-dev libssl-dev libsvn1 libtool libxml2 libxml2-dev libxslt-dev libyaml-dev locate ncurses-dev openssl postgresql postgresql-contrib wget xsel zlib1g zlib1g-dev
sudo su postgres
createuser msfuser -S -R -P
createdb msfdb -O msfuser
exit
sudo update-rc.d postgresql enable
sudo update-rc.d postgresql enable
gpg --keyserver hkp://keys.gnupg.net --recv-keys 409B6B1796C275462A1703113804BB82D39DC0E3
\curl -sSL https://get.rvm.io | bash -s stable --ruby
source ~/.rvm/scripts/rvm
git clone https://github.com/rapid7/metasploit-framework.git
cd metasploit-framework/
rvm --install .ruby-version
gem install bundler
bundle install
./msfconsole
create a file called “database.yml” within the “~/.msf4/” directory and paste in the contents below. Make sure to edit your password appropriately.
SQL:
# Development Database
development: &pgsql
  adapter: postgresql
  database: msfdb
  username: msfuser
  password: [PASSWORD]
  host: localhost
  port: 5432
  pool: 5
  timeout: 5

# Production database -- same as dev
production: &production
  <<: *pgsql

# Test database -- not the same, since it gets dropped all the time
test:
  <<: *pgsql
  database: msfdb

Bash:
sudo apt-get --force-yes -y install git apache2 python-requests libapache2-mod-php \
  python-pymssql build-essential python-pexpect python-pefile python-crypto python-openssl
git clone https://github.com/trustedsec/social-engineer-toolkit/ set/
cd set
sudo python setup.py install
Now, we have completed installing metasploit framework, you can open metasploit with the following command:
Bash:
msfconsole

Bash:
sudo apt-get install websploit


Wireless penetration tools
  • aircrack-ng
  • pixewps
  • reaver
Bash:
sudo apt-get install aircrack-ng pixewps reaver

Password Cracking Tools
  • crunch
  • hydra
  • john - The Ripper
Bash:
sudo apt-get  install crunch hydra john
Sniffing
  • Ettercap
Bash:
sudo apt-get install ettercap
sudo apt-get install ettercap-text-only
sudo ettercap -T
 
Last edited:
Top