While I plan out how my lab practice will look, it would be good to have something to actually test the security side of the CCIE Security. There is a Linux build, called Kali, designed with all sorts of penetration testing in mind, making it ideal for the job. Because (nearly) everything runs in Qemu, it means that we can have a large library of VMs ready to drag and drop (like ZeroShell).
However, there is no ready-rolled Qemu build (edit: actually there is, see Faek’s comment below). So, I created one.
We start by creating a folder and downloading the latest ISO (which you can also get from https://www.kali.org/downloads/).
[email protected]:~# mkdir /opt/unetlab/addons/qemu/linux-kali [email protected]:~# cd /opt/unetlab/addons/qemu/linux-kali/ [email protected]:/opt/unetlab/addons/qemu/linux-kali# wget http://cdimage.kali.org/kali-2016.2/kali-linux-2016.2-amd64.iso --2017-04-05 20:39:36-- http://cdimage.kali.org/kali-2016.2/kali-linux-2016.2-amd64.iso Resolving cdimage.kali.org (cdimage.kali.org)... 220.127.116.11 Connecting to cdimage.kali.org (cdimage.kali.org)|18.104.22.168|:80... connected. HTTP request sent, awaiting response... 302 Found Location: http://ftp.hands.com/kali-images/kali-2016.2/kali-linux-2016.2-amd64.iso [following] --2017-04-05 20:39:37-- http://ftp.hands.com/kali-images/kali-2016.2/kali-linux-2016.2-amd64.iso Resolving ftp.hands.com (ftp.hands.com)... 22.214.171.124, 2001:1b40:5600:ff80:f8ee::1 Connecting to ftp.hands.com (ftp.hands.com)|126.96.36.199|:80... connected. HTTP request sent, awaiting response... 200 OK Length: 3076767744 (2.9G) [application/octet-stream] Saving to: 'kali-linux-2016.2-amd64.iso' kali-linux-2016.2-amd64.iso 100%[=====================================================>] 2.87G 1.17MB/s in 42m 21s 2017-04-05 21:21:58 (1.15 MB/s) - 'kali-linux-2016.2-amd64.iso' saved [3076767744/3076767744] [email protected]:/opt/unetlab/addons/qemu/linux-kali# mv kali-linux-2016.2-amd64.iso cdrom.iso [email protected]:/opt/unetlab/addons/qemu/linux-kali#
Now we need to create a qemu file to use:
[email protected]:/opt/unetlab/addons/qemu/linux-kali# /opt/qemu/bin/qemu-img create -f qcow2 hda.qcow2 30G Formatting 'hda.qcow2', fmt=qcow2 size=32212254720 encryption=off cluster_size=65536 lazy_refcounts=off refcount_bits=16 [email protected]:/opt/unetlab/addons/qemu/linux-kali#
Next, create a Linux node (selecting the Linux-Kali image) in EVE-NG and start it up.
It should boot up:
I chose the graphical install, which was not easy to use as the graphics were a little screwed up, but your mileage may vary. Anyway, install it as you would any other Linux distro.
It does not take long to install, and when done, we have access to a plethora of cool hacking and security tools!
Now the fun can begin. We can perform wireless attacks, VPN attacks and all sorts of
malicious security-minded activities!
or download it from here http://www.tuxfixer.com/download-kali-linux-64bit-openstack-kvm-qcow2-image/#more-1841
It worked for me at first, but after a reboot I got a black screen on Kali.
I opted for a separate Kali image on vmware and connected it to EVE. That’s a stable solution so far in my lab.
How do you do it?