Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



 1196

Creating a Virtual Lab Intrusion Testing Kali Linux

by MeSvAk - 08 February, 2020 - 12:56 PM
This post is by a banned member (MeSvAk) - Unhide
MeSvAk  
Registered
4.014
Posts
3.395
Threads
6 Years of service
#1
[align=start]
Nowadays most people are turning to new technologies such as smartphones and can be said to have devoted a part of their lives to using it for messaging, chatting, shopping online and photography and more. . To date, 5.8 billion smartphones are used worldwide and it is projected to reach 6.1 billion smartphones by 2020. This large volume of users has caused most programmers and hackers to find bugs. To this end, we decided to create an intrusion testing environment for Android so that we could implement our own tests. We will also run a security test against MITM attacks on Android phones.[/align]
Step One: Android Virtual Environment (VirtualBox Lab)
[align=start]The OSBoxes site offers pre-configured operating systems for use on Linux. Using virtual machines we can have an Android virtual operating system with just a few clicks.[/align]
Step Two: Download Android File
[align=start]To install Android virtualization on the Kali Linux operating system, we need a few libraries that fortunately have these libraries in the Kali Linux repository and you can install them on your system through the following commands.[/align]
 
Code:
apt-get update && apt-get upgrade

apt-get install lib32stdc++6 lib32ncurses6 lib32z1
[align=start]After installing the libraries, you can download the 64-bit Android for Virtualbox via this link .[/align]
[align=start] [/align]
[align=start][Image: 0.png][/align]
Step Three: Extract Android Virtual File
[align=start]After the download of the Android file is completed we extract the compressed file with the command 7z .[/align]
 
Code:
cd Download
7z x (name file)
[align=start] [/align]
[Image: Screenshot-from-2019-12-23-23-30-26.png]Lab Environment Intrusion Testing for Android
[align=start]This may take a few minutes. When you're done, a new 64bit file will be listed in your Download list.[/align]
[align=start][Image: 2.png][/align]
Step Four: Configure Android Settings
[align=start]Well then  run VirtualBox on your system and create a new virtual machine. If you don't have a VirtualBox on your system , you can download it for free here . Or download it from the Kali Linux repository below.[/align]
 
 
 
Code:
apt-get install virtualbox
 
[align=start]To run the virtual machine, enter the virtualbox command at the command prompt and click NEW after the virtual machine runs in the top bar.[/align]
[align=start][Image: Screenshot-from-2019-12-24-00-11-55.png][/align]
[align=start]Call the new virtual machine Android , type Linux, and version 2.6 64-bit Linux , and then click Next .[/align]
[align=start][Image: Screenshot-from-2019-12-24-00-12-48.png][/align]
[align=start]We specify the amount of RAM depending on the type and power of our system and click Next .[/align]
[align=start][Image: Screenshot-from-2019-12-24-00-12-58.png][/align]
[align=start]In this section, select " Use an existing virtual hard disk file " in the Hard Disk Settings section, then select the Android file we extracted and click Next .[/align]
[Image: Screenshot-from-2019-12-24-00-23-20.png]Lab Environment Intrusion Testing for Android
[align=start]In the Network Settings tab, we configure Adapter 1 as (Adapter Bridged) . And set the Adapter Type in Advanced List to PCnet-FAST III . This setting allows Android to connect to your wi-fi router and obtain its own IP address .[/align]
[Image: Screenshot-from-2019-12-24-17-14-25.png]Lab Environment Intrusion Testing for Android
[align=start]Click OK when you're done and run Android. After about 60 seconds, the operating system will boot and we will have access to Android for testing penetration.[/align]
[Image: Screenshot-from-2019-12-24-00-24-57.png]Lab Environment Intrusion Testing for Android
[align=start]In Bridged mode, all devices connected to the wi-fi network can connect to an Android device. We can do a man-in-the-middle attack on real devices that are on the wi-fi network .[/align]
[align=start]For example, we use the MITMF script for a man-in-the-middle attack .[/align]
[align=start]Click here to download the script and download the file. Then open the downloaded file and enter the following command with the command prompt.[/align]
 
Code:
python mitmf.py -i wlan0 --arp --spoof --gateway 192.168.1.1 --target 192.168.1.100
 
[align=start]This section includes our Android device ip (192.168.1.100) and ip modem input (192.168.1.1).[/align]
[align=start][Image: Screenshot-from-2019-12-24-18-47-14.png][/align]
[align=start]You can see that the Android device (192.168.1.100) is submitting a request to kaliboys.com using Chrome version 76 .[/align]
[align=start]Please share your comments below this post and if you have any questions or problems write it in the comments section.[/align]
 
This post is by a banned member (Has0AB) - Unhide
Has0AB  
Registered
24
Posts
0
Threads
4 Years of service
#2
Testing

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 1 Guest(s)