Lab 5 - Introduction to penetration testing using Kali Linux


The goal of this lab is to begin to explore Kali, a Linux system used to probe and test systems for vulnerabilities.


  1. Introduction to Kali
  2. Web_Penetration_Testing_with_Kali_Linux.pdf: Web Penetration Testing with Kali, Chapters 1-3

Step 1 - Install and setup Kali

For this Step read chapter 1 from Web Penetration Testing with Kali.

Kali Linux is available here or from your instructor as a ready to run VM.

  1. Copy the decompressed Kali directory into you vmware folder
  2. Start VMWare Workstation 10.
  3. Browse to the VM, and open it. You should set the network to "NAT"
  4. Start the Kati system VM.
  5. Login with user root, password toor.
  6. Kali does no seem to set networking automatically. Open a terminal in Kali, type "dhclient -v eth0"
  7. Try to ping Google DNS:

Step 2 - Basic Reconnaissance

For this Step read chapter 2 from Web Penetration Testing with Kali.

  1. View the Robots.txt at Try several others. What do you learn from this?
  2. Use the way back machine to view old versions of SHJC and MVNU web sites. Try a few others.
  3. Use ARIN.NET to look up MVNU and 2 other organizations. What did you find out?
  4. Review the EDGAR site: What use might this site be to a hacker?
  5. How can Google be used to access someone's web cam?
  6. Google Hacking Database (GHDB) . What is the point of this site? How can it be used?
  7. What is HTTrack? Use it to download at least two different websites.

Step 3 - Web Vulnerability assessment

For this Step read chapter 3 from Web Penetration Testing with Kali.


Webshag - Webshag is a multi-threaded, multi-platform tool used to audit web servers.

  1. Review "how-to-use-webshag-gui-in-kali-linux.html" to see how to set up Webshag to work (instructions on setting up conf file)
  2. Try a PSCAN on you Windows 2008 server, Metasploitable,, What is this doing? How is this information useful for possible exploiters?
  3. Try SPIDER exactly as in #2 above. Again, what is this doing? How is this information useful for possible exploiters?
  4. Now try USCAN as above. Do some research, and explain the meaning and value of what you find.
  5. Finally try the same with FUZZ. What is FUZZ testing? What weaknesses did you find on the servers?

Step 4 - Vulnerability Assessment - Choose your own

In Chapter 3 of the Kali Text, there are write-ups on the following Vulnerability Assessment Tools:

  1. Skipfish
  2. ProxyStrike
  3. Vega
  4. Owasp-Zap
  5. Websploit
Select two of the tools. Work through the steps for using the tool, and try it out on the Windows 2008 server, Metasploitable,, servers. Write up your work in each, and include screens shots to demonstrate the operation.
Topic attachments
I Attachment Action Size Date Who Comment
Pdfpdf Web_Penetration_Testing_with_Kali_Linux.pdf manage 20697.0 K 2014-03-02 - 06:16 JimSkon Web Penetration Testing with Kali
Topic revision: r7 - 2014-03-18 - JimSkon
This site is powered by the TWiki collaboration platformCopyright &© by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding TWiki? Send feedback