

I am not going to explain how to actually use docker in the general cases. Then execute that in a terminal by first “chmod +x getdocker.sh” and then “./getdocker.sh”. Save this script to a file on your desktop called “getdocker.sh”. The following script was made by some genius called “apolloclark” on Github: This is not the case and a major reason for me writing this post is to make sure you can get Docker into Kali as easily as possible. As Kali is Debian based you may assume that it is simply “apt-get install docker”. This will allow you to copy/paste between your host and guest machine as well as smooth out lots of bumps.įortunately there is an easy to follow and official guide here:īy the end of this you should have a more useful virtual machine. Setup VMWare Toolsīefore you go too far you are going to want to setup “VMWare Tools”. If all is going well you have a new OS with a fresh desktop environment. Boot and log into Kali with the credentials you created.Download Kali ISO and build a virtual machine.I prefer vmware Player and so the rest of this guide assumes you are using this. The simplest way to interact with Kali Linux for most readers will be to use virtualisation. By the end you will have access to Damn Vulnerable Web App (DVWA) which you can start targeting immediately! Pre-Amble In this post I will cover setting things up by providing links to the appropriate guides. Really it is a “container” which can include an entire ecosystem.We can use this to clone down vulnerable targets to play with quickly which will run inside our Kali. I think of this as a lightweight virtual machine. Docker – I risk offending people with my simplistic definition here.A Debian base with repositories that contain all of the most common “hacking” tools. Kali Linux – the goto distribution of choice for penetration testers at all parts of their careers.You are going to need access to toolsand access to targetsso you can explore legally and for free. This post is about getting you to setup two things which will simply provide you with first the tools and then the targets easily: I hope it means that you are considering a career in Cyber Security, and that this post will save you a few hours of frustration, and get you to the fun bits quicker. I am excited for you as you have so much to learn. If you have landed here I hope you are looking at starting your training with Damn Vulnerable Web App.
