Week 1: Setup
Introduction, Notekeeping, and Introductory Linux
Setting Up A Penetration Testing Environment - This will focus on setting up a lab environment, specifically VMWare, Kali Linux, and our lab VMs. The lesson will briefly introduce important aspects of each set up (e.g. Snapshots in VMWare, the Kali Linux toolset, etc.) with the intention to build upon those aspects in later lessons. How to Keep Notes Effectively - This lesson will cover the importance of note taking from a pentester standpoint. The lesson will introduce the Kali Linux built-in note-taking application, KeepNote, and discuss how to take notes effectively. Taking notes during a penetration test is incredibly important as it allows a pentester reference points when writing their final report, discussing timelines with their team or manager, or even discussing specifics of a pentest with a client. Introductory Linux - This lesson will briefly cover the important Linux terminal commands needed to use Kali Linux. Some of the topics that will be covered are: navigating the file system, users and privileges, common network commands, bash scripting, and much more.
Setup
Useful Locations
/etc/passwd
contains the user list
most users will have permission to read the file
/etc/shadow
contains the hashed passwords
only root can read the file
/var/log/auth.log
stores all security related messages including authentication failures
/var/log/syslog
everything, except auth related messages
/var/log/messages
storing valuable, non-debug and non-critical messages
"general system activity"
Last updated