Lab 5 - Introduction to penetration testing using Kali Linux


The goal of this lab is to begin to explore Kali, a Linux system used to probe and test systems for vulnerabilities.


  1. Introduction to Kali
  2. Web_Penetration_Testing_with_Kali_Linux.pdf: Web Penetration Testing with Kali, Chapters 1-3

Step 1 - Install and setup Kali

For this Step read chapter 1 from Web Penetration Testing with Kali.

Kali Linux is available here or from your instructor as a ready to run VM.

  1. Copy the decompressed Kali directory into you vmware folder
  2. Start VMWare Workstation 10.
  3. Browse to the VM, and open it. You should set the network to "NAT"
  4. Start the Kati system VM.
  5. Login with user root, password toor.
  6. Kali does no seem to set networking automatically. Open a terminal in Kali, type "dhclient -v eth0"
  7. Try to ping Google DNS:

Step 2 - Basic Reconnaissance

For this Step read chapter 2 from Web Penetration Testing with Kali.

  1. View the Robots.txt at Try several others. What do you learn from this?
  2. Use the way back machine to view old versions of SHJC and MVNU web sites. Try a few others.
  3. Use ARIN.NET to look up MVNU and 2 other organizations. What did you find out?
  4. Review the EDGAR site: What use might this site be to a hacker?
  5. How can Google be used to access someone's web cam?
  6. Google Hacking Database (GHDB) . What is the point of this site? How can it be used?
  7. What is HTTrack? Use it to download at least two different websites.
  8. Fimap - Use it to look for vulnerabilities on you virtual machines (medispliotable, Windows 7, Windows 2008 Server). What did you find on each?
  9. thc-ssl-dos - use it to attack medispliotable and Windows 2008 Server. Can you get to the system while it is being attacked? ONLY TARGET your own systems.
  10. Scapy - use scapy to generate at least 6 of the packets shown. Capture the output with WireShark , and confirm it's operation.

Step 3 - Web Vulnerability assessment

For this Step read chapter 3 from Web Penetration Testing with Kali.


Webshag - Webshag is a multi-threaded, multi-platform tool used to audit web servers.

  1. Review "how-to-use-webshag-gui-in-kali-linux.html" to see how to set up Webshag to work (instructions on setting up conf file)
  2. Try a PSCAN on you Windows 2008 server, Metasploitable,, What is this doing? How is this information useful for possible exploiters?
  3. Try SPIDER exactly as in #2 above. Again, what is this doing? How is this information useful for possible exploiters?
  4. Now try USCAN as above. Do some research, and explain the meaning and value of what you find.
  5. Finally try the same with FUZZ. What is FUZZ testing? What weaknesses did you find on the servers?
Topic attachments
I Attachment ActionSorted ascending Size Date Who Comment
Pdfpdf Web_Penetration_Testing_with_Kali_Linux.pdf manage 20697.0 K 2014-03-02 - 06:16 JimSkon Web Penetration Testing with Kali
Edit | Attach | Print version | History: r7 < r6 < r5 < r4 < r3 | Backlinks | Raw View | Raw edit | More topic actions...
Topic revision: r4 - 2014-03-06 - JimSkon
This site is powered by the TWiki collaboration platformCopyright &© by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding TWiki? Send feedback