Skip to content

Commit

Permalink
0-0,1,README updated
Browse files Browse the repository at this point in the history
  • Loading branch information
Samsar4 committed Apr 20, 2021
1 parent 5534658 commit 459c0a6
Show file tree
Hide file tree
Showing 3 changed files with 76 additions and 6 deletions.
5 changes: 3 additions & 2 deletions 0-Core-Knowledge/0-Networking-101.md
Original file line number Diff line number Diff line change
@@ -1,16 +1,17 @@
# Networking 101
> ⚠ Networking 101 is a simple introduction to the most important network concepts for ethical hacking. This is a huge subject and is recommended to learn from different sources like courses, books and certifications like [Cisco CCNA](https://www.cisco.com/c/en/us/training-events/training-certifications/certifications/associate/ccna.html) or [CompTIA Network+](https://www.comptia.org/certifications/network). Also there is a ton of **free training** out there, I recommend to [check this list](https://freetraining.dfirdiva.com/free-networking-training) later.
### **This module is fully theoretical, following the order:**
### Objectives
* Understand network basic concepts

### **This module follows the order:**
1. Introduction
2. IP and MAC Addresses
3. Subnetting
4. TCP, UDP and 3-Way-Handshake
5. Ports & Protocols
6. OSI Model


# 1. Introduction

## So, what the heck is a Network?
Expand Down
75 changes: 72 additions & 3 deletions 0-Core-Knowledge/1-Lab-Building.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,74 @@
# Lab Building

1. Virtual Environment
2. VMWare
3. Dropbox
### Requirements
* Windows 10, macOS or any Linux distro
* At least 8 GB RAM (16GB recommended)

### Objectives
* Understand how virtual machines work
* Learn how to create a basic virtual environment for pentesting purpose

# What does Virtual Machine (VM) means?
For simplicity, think of a virtual machine (VM) as a "computer made of software" which you can use to run any software you'd run on a real, physical computer. Like a physical machine, a virtual machine has its own operating system (Windows, Linux, etc.), storage, networking, configuration settings, and software, and it is fully isolated from other virtual machines running on that host.

![vm](https://miro.medium.com/max/937/1*QgshMdPQ7ZzK1hRbv1ncPQ.jpeg)


**Security benefits** — Because virtual machines run in multiple operating systems, using a guest operating system on a VM allows you to run apps of questionable security and protects your host operating system. VMs also allow for better security forensics, pentesting and are often used to safely study computer viruses, isolating the viruses to avoid risking their host computer.

### Hypervisors
There are two main hypervisor types, referred to as **“Type 1” (or “bare metal”)** and **“Type 2” (or “hosted”)**.

![hypervisors](https://gist.githubusercontent.com/Samsar4/62886aac358c3d484a0ec17e8eb11266/raw/0143eb15cf424c87ae823109d73df9ebe3faebec/hyper.png)

- **Type 1** hypervisor acts like a lightweight operating system and runs directly on the host’s hardware.
- **Type 2** hypervisor runs as a software layer on an operating system, like other computer programs.

# Virtual Box Installation

- **This tutorial use [Oracle VM VirtualBox](https://www.virtualbox.org), the most popular free and open-source hosted hypervisor for x86 virtualization, developed by Oracle.**
- There are other options from different vendors to achieve the same result:
- [VMware Player for Windows (30 day trial)](https://www.vmware.com/products/workstation-player.html)
- [VMware Fusion for macOS (30 day trial)](https://www.vmware.com/products/fusion.html)
- [Windows Hyper-V](https://docs.microsoft.com/en-us/virtualization/hyper-v-on-windows/about/)
- [Linux KVM](https://help.ubuntu.com/community/KVM/Installation)

1. **Make sure your PC support hardware virtualization (Windows)**
- Reboot your computer
- Right when the computer is coming up from the black screen, press Delete, Esc, F1, F2, or F4. Each computer manufacturer uses a different key but it may show a brief message at boot telling you which one to press. If you miss it the first time, reboot and try again. It helps to tap the key about twice a second when the computer is coming up. If you are not able to enter the BIOS via this method, consult your computer’s manual.
- In the BIOS settings, find the configuration items related to the CPU. These can be in under the headings Processor, Chipset, or Northbridge.
- Enable virtualization; the setting may be called **VT-x, AMD-V, SVM, or Vanderpool**. Enable Intel VT-d or AMD IOMMU if the options are available.
- Save your changes and reboot.

> ⚠️ If you are unable to find the Virtualization settings in your BIOS it may mean that your laptop does not support it.
2. **Download the latest version of Virtual Box**
- https://www.virtualbox.org/wiki/Downloads
- Select your current OS and download the installer
- ![v](https://gist.githubusercontent.com/Samsar4/62886aac358c3d484a0ec17e8eb11266/raw/944dad38ad3bfc556600c6ca3e08ec83cabd54e5/vbox1.png)
- Also, scroll down on the same page and download the **VirtualBox Extension Pack**. This extension will allow VirtualBox functionalities like USB support, virtual disk encryption etc.
![v2](https://gist.githubusercontent.com/Samsar4/62886aac358c3d484a0ec17e8eb11266/raw/944dad38ad3bfc556600c6ca3e08ec83cabd54e5/vbox2.png)

3. **Install Virtual Box and Extension Pack**
- There is no special configuration on the **Virtual Box** installation process, just point, click and install.
- Once the installation is done, install the **Extension Pack** by double clicking it; The file extension is `.vbox-extpack`. Don't worry about the warning prompts.

4. **Next we will download the latest Kali Linux version and boot it up into Virtual box software**.

## About Kali Linux
![kali](https://www.bleepstatic.com/content/hl-images/2019/11/29/kali-header.jpg)

> ⚠️ Don't worry, Kali Linux Tutorial will be covered on the next module [Linux for Hackers].md
Kali Linux (formerly known as BackTrack Linux) is an open-source, Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. [[+]](https://www.kali.org/docs/introduction/what-is-kali-linux/)

Kali Linux contains several hundred tools targeted towards various information security tasks, such as:
- Penetration Testing
- Security Research
- Computer Forensics
- Reverse Engineering

## Download the latest Kali Linux image
1. https://www.offensive-security.com/kali-linux-vm-vmware-virtualbox-image-download/
2. Make sure to select the **Virtual Box image (OVA)**
![kali](https://gist.githubusercontent.com/Samsar4/62886aac358c3d484a0ec17e8eb11266/raw/163a5fcc5653f6c06fb7e63fbf570e3fd9b5c144/kali0.png)
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@ First things first, you really need to understand how things work before start t
**Core Knowledge provides a jumpstart to networking, systems, scripting and also information security topics. If you are familiar on these topics you can skip it straight to Ethical Hacking module.**

* [Networking 101](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/0-Core-Knowledge/0-Networking-101.md)
* [Creating virtual labs]
* [Creating virtual labs](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/0-Core-Knowledge/1-Lab-Building.md)
* [Linux for hackers]
* [Scripting]
* [Information Security 101](https://github.com/Samsar4/Ethical-Hacking-Labs/blob/master/0-Core-Knowledge/4-Infosec-101.md)
Expand Down

0 comments on commit 459c0a6

Please sign in to comment.