1 Introduction To Ethical Hacking LabManual
1 Introduction To Ethical Hacking LabManual
Ethical Hacking
Lab Manual
During installation, you will get a network interface warning, Click Yes to continue (this may
interrupt your network connectivity, make sure that you are not downloading any application
during the installation process.
Page | 1
During installation, it will prompt to install oracle universal serial bus, make sure to check Always
trust and click Install to complete VirtualBox installation.
Page | 2
Step 2: Installing Oracle VirtualBox Extension Pack
Extension pack extends the functionality of VirtualBox base packages. It allows usage of VRDP
(VirtualBox Remote Desktop Protocol), host machine web camera, Virtual USB 2.0/3.0, etc.
Download VirtualBox extension pack for All supported platforms from following link
http://www.virtualbox.org/wiki/downloads (under Oracle VM VirtualBox extension pack).
After download, run extension pack setup file.
Page | 3
Now, we are ready to install Kali Linux virtual machine.
Page | 4
Practical 2: Installing Kali Linux in VirtualBox
Step 1: Download and Install Kali Linux
Download Kali Linux VirtualBox image file from following the link (OVA file) https://www.offensive-
security.com/kali-linux-vm-vmware-virtualbox-hyperv-image-download/
Make sure to verify your system architecture 64-bit/32-bit before you download the virtual image
file for VirtualBox. As we have installed Oracle VirtualBox software, we must download VirtualBox
image file.
After download, execute .ova file (double-click on file). it starts importing kali Linux into VirtualBox.
Page | 5
Page | 6
Page | 7
Page | 8
Page | 9
Click ok to complete basic configuration. From VirtualBox main menu, select Kali Linux and click on
start to load kali Linux operating system as shown below.
Page | 10
Practical 3: Install Tor Browser in Kali Linux
Step 1: Download Tor Browser
Tor helps in browsing the internet anonymously by hiding Our IP Address. Tor can also be used to
access blocked websites. Black-hat Hackers use tor to access the dark web to perform illegal
activities by protecting their identity.
Download tor browser from the following link:
https://www.torproject.org/download/download-easy.html.en
Page | 11
Modify four lines of code in the file as shown below (add # at the starting point of each line)
after making the above-said modifications save and close the file.
To start the browser, execute Tor Browser located in the Downloads directory
In few cases, we may see the file named as start-tor-browser. Desktop, double-click on that file if
prompted click on Trust and Launch which opens tor browser.
Page | 12
Page | 13
Practical 4: Installing VPNBook in Kali Linux
Virtual Private Network (VPN) is most often used by IT companies to protect sensitive data shared
on the network. VPN establishes a virtual point-to-point connection which allows employees in the
organization to send or receive data across public networks as if the devices are connected to the
organization private network. VPNBook is one such software that enables individuals to run VPN
on their personal computer. We can use VPNBook to hide our identity (IP address). VPNBook is a
free open-source VPN software.
To download VPNBook, visit following website
https://www.vpnbook.com/freevpn
under Free OpenVPN Option, select any of the bundles to download (Euro 1 OpenVPN Certificate
Bundle or Euro 2 OpenVPN Certificate Bundle is recommended)
Page | 14
Open terminal in Kali Linux, change current location to point Downloads directory that holds
VPNBook bundle.
After executing the above command, wait until it displays Initialization Sequence Completed
message.
Now we can use any browser to surf the internet anonymously (to confirm, you can visit
www.whatismyipaddress.com).
Page | 15
Practical 5: Installing CyberGhost VPN on Windows Platform
Visit https://www.cyberghostvpn.com/en_US/ to download a free version of CyberGhost VPN.
After installation, follow the steps explained in following images to run CyberGhost VPN
Page | 16
To spoof the IP address, right-click on CyberGhost icon and select one of the country as shown
below and click on connect.
As we are running the free version of CyberGhost software, we need to wait for a specific time (as
shown in below image) to get our IP spoofed.
Page | 17
When we get our turn, CyberGhost VPN software will assign an IP address from the selected
country. Now we can use any browser to surf the internet anonymously (to confirm, visit
www.ipaddress.com).
Page | 18