Meeting Tools

A brief guide to our most used tools, what they are for, and how to get started with them.

Most of our meetings utilize the tools found in Kali Linux. Listed below are methods to install Kali onto your machine.

Kali Installation

WSL2

Windows Subsystem for Linux (WSL) has improved by leaps and bounds over the years and has exploded in popularity.

WSL2 is capable of providing networking fundamentals. Contrary to its WSL1 predecessor, tools such as Nmap and Wireshark can be used with it.

  • To install WSL2, open a Powershell terminal as Administrator and enter wsl --install.
  • If the installation fails, you may need to enable WSL manually.

  • Once the install concludes, restart your machine for Windows to apply the updates.
  • Then, open Microsoft Store, search for Kali Linux, and install the app.
  • Run the Kali app to finish the setup.

This should install a bare-bones, headless Kali VM on your computer. That isn't all, however. Below are optional packages that can be pre-installed.

  • sudo apt install kali-linux-everything
  • Every Kali package and metapackage available if you give no regard to storage space.

  • sudo apt install kali-linux-large
  • Default tools from Kali AMD64/i386 packages.

  • sudo apt install kali-tools-top10
  • Most commonly used tools.

  • sudo apt install kali-tools-headless
  • Headless tools that can be run without a GUI.

  • sudo apt install kali-win-kex
  • Win-KeX, a Kali GUI that fits directly over the top of your Windows GUI.
    Note that this is only advised if you have at least 8GB ram.

WSL may not perform the same as a Kali VM or dual-boot. You can choose another installation option if necessary.


VirtualBox Installation.


Dual-Booting Kali.


Other Tools

Nmap

Nmap (short for network map) is a tool to analyze devices attached to a network. It is commonly used to scan for open ports and detect operating system. It is one of the most popular recon tools in cyber security.

To find out more about nmap, check out the website at www.nmap.org.

Wireshark

Wire shark is a tool used to analyze network traffic. It is used to monitor for malicious activity as well as to spy on other users on the network. As far as network monitors go, it is an industry standard for system administrators, security analysts, and penetration testers.

To find out more about Wireshark, check out the website at www.wireshark.org.

Metasploit and Armitage

Metaspoit is a popular exploit framework that uses known exploits to gain access to computers. Armitage is a popular graphical user interface (GUI) that overlays the Metasploit framework.

To find out more about Metasploit, check out the website at www.metasploit.com.

To find out more about Armitage, check out the website at www.fastandeasyhacking.com.

Contact Us: acecoes@latech.edu

Website for The Association of Cyber Engineers -- Louisiana Tech University -- 2021