The steps are pretty straight forward. The only tool that might cause some confusion is SMBexec. This requires you to interact 3 times with a different option every time. So here’s the options you need to use, in the correct order

  1. Select option 1 (When prompted for the path, write: /opt/tools)
  2. Select option 4
  3. Select option 5

Right after you have written the path to where to install SMBexec, the script will ask you the same question. Make sure that you write the same, /opt/tools, there as well. This is so the bash script knows where to find the new  install.sh script for SMBexec.

Other than this, the rest of the process is very simple.

You can either download the script from my gist  here , or copy the code from below

  1. #!/bin/bash
  2. echo ""
  3. echo "=========================================================================="
  4. echo "= Pentest Attack Machine Setup ="
  5. echo "= Based on the setup from The Hacker Playbook ="
  6. echo "=========================================================================="
  7. echo ""
  8. # Prepare tools folder
  9. echo "[+] Creating tools folder in /opt"
  10. mkdir /opt/tools/
  11. echo ""
  12. # Setting up metasploit with postgresql
  13. echo "[+] Setting up metasploit with postgresql"
  14. service postgresql start
  15. service metasploit start
  16. echo ""
  17. # Discover Scripts - Passive reconnaissance
  18. echo "[+] Installing Discover Scripts"
  19. cd /opt/tools/
  20. git clone https://github.com/leebaird/discover.git
  21. cd /opt/tools/discover/
  22. /opt/tools/discover/setup.sh
  23. echo ""
  24. # SMBexec - Grab hashes out of the Domain Controller and reverse shells
  25. # Step 1: Select option 1
  26. # Step 2: Select option 4
  27. # Step 3: Select option 5
  28. echo "[+] Installing SMBexec"
  29. cd /tmp/
  30. git clone https://github.com/brav0hax/smbexec.git
  31. cd /tmp/smbexec/
  32. echo "[+] Select option 1"
  33. /tmp/smbexec/install.sh
  34. echo "[*] Where did you install SMBexec?: "
  35. read smbexecpath
  36. $smbexecpath/smbexec/install.sh
  37. echo ""
  38. # Veil - Create Python based Meterpreter executable
  39. echo "[+] Installing Veil Framework"
  40. cd /opt/tools/
  41. git clone https://github.com/Veil-Framework/Veil-Evasion.git Veil
  42. cd /opt/tools/Veil/setup
  43. /opt/tools/Veil/setup/setup.sh
  44. echo ""
  45. # WCE (Windows Credential Editor) - Pulls passwords from memory
  46. echo "[+] Downloading and installing WCE (Windows Credential Editor)"
  47. mkdir /opt/tools/wce/
  48. cd /tmp/
  49. wget http://www.ampliasecurity.com/research/wce_v1_41beta_universal.zip
  50. unzip -d /opt/tools/wce/ wce_v1_41beta_universal.zip
  51. rm -f wce_v1_41beta_universal.zip
  52. echo ""
  53. # Mimikatz - Pulls passwords from memory
  54. echo "[+] Installing Mimikatz"
  55. mkdir /opt/tools/mimikatz/
  56. cd /tmp/
  57. wget https://github.com/gentilkiwi/mimikatz/releases/download/2.0.0-alpha-20150122/mimikatz_trunk.zip
  58. unzip -d /opt/tools/mimikatz/ mimikatz_trunk.zip
  59. rm -f mimikatz_trunk.zip
  60. echo ""
  61. # PeepingTom - Website snapshots
  62. echo "[+] Installing PeepingTom"
  63. cd /opt/tools/
  64. git clone https://bitbucket.org/LaNMaSteR53/peepingtom.git
  65. cd /opt/tools/peepingtom/
  66. wget https://gist.githubusercontent.com/nopslider/5984316/raw/423b02c53d225fe8dfb4e2df9a20bc800cc78e2c/gnmap.pl
  67. echo ""
  68. # Download appropriate PhantomJS package
  69. if $(uname -m | grep '64'); then
  70. wget http://phantomjs.googlecode.com/files/phantomjs-1.9.2-linux-x86_64.tar.bz2
  71. tar xf phantomjs-1.9.2-linux-x86_64.tar.bz2
  72. cp /opt/tools/peepingtom/phantomjs-1.9.2-linux-x86_64/bin/phantomjs .
  73. else
  74. wget http://phantomjs.googlecode.com/files/phantomjs-1.9.2-linux-i686.tar.bz2
  75. tar xf phantomjs-1.9.2-linux-i686.tar.bz2
  76. cp /opt/tools/peepingtom/phantomjs-1.9.2-linux-i686/bin/phantomjs .
  77. fi
  78. echo ""
  79. # Nmap script - Quicker scanning and smarter identification
  80. echo "[+] Installing nmap scripts"
  81. cd /usr/share/nmap/scripts/
  82. wget https://raw.githubusercontent.com/hdm/scan-tools/master/nse/banner-plus.nse
  83. echo ""
  84. # PowerSploit - Scripts for post exploitation
  85. echo "[+] Installing PowerSploit"
  86. cd /opt/tools/
  87. git clone https://github.com/mattifestation/PowerSploit.git
  88. cd /opt/tools/PowerSploit/
  89. wget https://raw.githubusercontent.com/obscuresec/random/master/StartListener.py
  90. wget https://raw.githubusercontent.com/darkoperator/powershell_scripts/master/ps_encoder.py
  91. echo ""
  92. # Responder - Used to gain NTLM challenge/response
  93. echo "[+] Installing Responder"
  94. cd /opt/tools/
  95. git clone https://github.com/SpiderLabs/Responder.git
  96. echo ""
  97. # SET (Social Engineering Toolkit) - Pre-installed on Kali Linux
  98. echo "[+] Installing SET (Social Engineering Toolkit)"
  99. cd /opt/tools/
  100. git clone https://github.com/trustedsec/social-engineer-toolkit.git set
  101. cd /opt/tools/set/
  102. /opt/tools/set/setup.py install
  103. echo ""
  104. # Bypassuac - Used to bypass UAC in post exploitation
  105. # → https://www.trustedsec.com/downloads/
  106. echo "[+] Installing Bypass UAC"
  107. cd /tmp/
  108. wget https://www.trustedsec.com/files/bypassuac.zip
  109. unzip bypassuac.zip
  110. cp bypassuac/bypassuac.rb /opt/metasploit/apps/pro/msf3/scripts/meterpreter/
  111. mv bypassuac/uac/ /opt/metasploit/apps/pro/msf3/data/exploits/
  112. rm -Rf bypassuac
  113. echo ""
  114. # BeEF - cross-site scripting framework
  115. # → http://beefproject.com/
  116. echo "[+] Installing BeEF"
  117. apt-get install beef-xss
  118. echo ""
  119. # PEDA - Python Exploit Development Assistance for GDB
  120. # → Repository: https://github.com/longld/peda
  121. echo "[+] Installing PEDA"
  122. git clone https://github.com/longld/peda.git /opt/peda
  123. echo "source /opt/peda/peda.py" >> ~/.gdbinit
  124. echo ""
  125. # The End
  126. echo "[+] All tools installed successfully!"
  127. echo "[+] ~~~ Happy Hacking! ~~~"
  128. echo ""

Kali Linux additional tools setup的更多相关文章

  1. 2018 kali linux install tools

    1.VM setup https://www.vmware.com/products/workstation-pro/workstation-pro-evaluation.html VMware-Wo ...

  2. 关于kali linux 2.0的vmware tools的安装问题

    在安装好kali linux 2.0 后,首先要做的就是添加源并更新系统,否则会出现软件定位问题. 在kali 2.0中,vmware tools已经不能使用了,官方放了一个工具下载安装就好. 添加源 ...

  3. Kali Linux安装VMWare Tools

    操作环境: 虚拟机操作系统: Kali Linux 2017.2 虚拟化软件: VMWare workstation 14 pro 加载光盘 在VMWare上依次点击"虚拟机->安装V ...

  4. Kali linux 2016.2(Rolling) 的详细安装(图文教程)附安装VMare Tools 增强工具

    写在前面的话 因读研期间,实验室团队需要,所以,接触上了Kali Linux,需去获得网络安全方面的数据,即数据和信息收集.以便为后续的数据处理和分析,准备! 用到hadoop和spark.机器学习等 ...

  5. Kali Linux下安装VMware Tools

    引言 Kali Linux是基于Debian的Linux发行版, 设计用于数字取证和渗透測试.安装Kali Linux非常easy,可是安装VMware Tools的过程就有点麻烦了,由于在安装中途会 ...

  6. kali linux与虚拟机Vmware安装vmware tools(主机与虚拟机的文件拖拽)

    一.打开虚拟机任务栏"虚拟机"-----点击安装Vmware tools 二.回到开启的kali linux系统中,找到vmware tools CD文件夹,拖拽出文件中的压缩文件 ...

  7. kali linux tools

    1.HTTrack:网站复制机制 2.Google高级搜索命令 site:domain terms to search site :dsu.edu pat engebreston 3.kali lin ...

  8. KALI LINUX系统初始化配置

    1.Kali Linux安装VirtualBox增强功能 VirtualBox增强功能介绍:物理机与虚拟机之间的文件共享.物理机与虚拟机之间的剪切板共享.虚拟机的direct3D支持,这样虚拟机窗口就 ...

  9. kali linux Python开发环境初始化

    kali linux Python 黑客编程1 开发环境初始化 为什么要选择Python? Python作为目前Linux系统下最流行的编程语言之一,对于安全工作者的作用可以和C++相提并论.Pyth ...

随机推荐

  1. 在sqlserver中做fibonacci(斐波那契)规律运算

    --利用sqlserver来运算斐波那契规律 --利用事物与存储过程 declare @number intdeclare @A intdeclare @B intdeclare @C int set ...

  2. Linux网络编程(多人在线聊天系统)

    一.首先是服务器的建立 首先是一个信号终止程序,发信号ctrl+c终止程序,而是是初始化网络通信. 创建一个描述符负责绑定服务器和监听服务器接收客户端的消息. socket()->sockadd ...

  3. 野心勃勃的React组件生命周期

    当你还在写着Angular指令,过滤器,注入,服务,提供者,视图模版的时候,是不是觉得很烦,好在这个时候,React已经神一样的出现在历史舞台. React组件    React实现了UI=Fn(St ...

  4. 排序系列 之 直接插入排序算法 —— Java实现

    直接插入排序算法 基本思想: 把n个待排序的元素看成一个有序表和一个无序表,开始时有序表中只有一个元素,无序表中有n-1个元素:排序过程即每次从无序表中取出第一个元素,将它插入到有序表中,使之成为新的 ...

  5. 未能加载文件或程序集“XXX”或它的某一个依赖项。参数错误。 (异常来自 HRESULT:0x80070057 (E_INVALIDARG))

    移除引用,并删除packagede的引用文件.重新导入引用文件和引用~ 如果是电脑异常死机后报这错误, 解决方法 是 删除 C:\WINDOWS\Microsoft.NET\Framework\v4. ...

  6. SharePoint 2013 中的 PowerPoint Automation Services

    简介                许多大型和小型企业都将其 Microsoft SharePoint Server 库用作 Microsoft PowerPoint 演示文稿的存储库.所有这些企业在 ...

  7. ajax请求!

    ajax请求: var data ='{"useName":"'+name+'",}' $.ajax({ type:"post", url: ...

  8. UVA 820 --- POJ 1273 最大流

    找了好久这两个的区别...UVA820 WA了 好多次.不过以后就做模板了,可以求任意两点之间的最大流. UVA 是无向图,因此可能有重边,POJ 1273是有向图,而且是单源点求最大流,因此改模板的 ...

  9. webstorm mac版快捷键

    WebStorm快捷键(Mac版) ⌘--Command ⌃ --Control ⌥--alt ⇧--Shift ⇪--Caps Lock fn--功能键就是fn 编辑 Command+alt+T 用 ...

  10. iOS--时间类date详解

    NSDate定义时间的类 NSDate是一个时间类,在编写程序时,我们很少遇到.今天我突然碰到,感觉很生疏. 给大家发个博客,让大家也都温习一下,哈哈! 兄弟用的时候突然发现竟然有一些bug,大家用时 ...