As human beings, we don’t like the same flavor every day. If we talk about Ethical Hacking, a maximum of tools work on command lines. It’s a fun thing but sometimes it becomes boring when we have to repeat the same command lines over and over again.
Most of the kids interested in Ethical Hacking deal with Windows OS at the first and then they shift themselves to the Linux environment and now the biggest problems they face.
Memorizing command lines!
They even(beginners) can’t remember the basic command lines. They face a lot of difficulties to run their machine smoothly without errors.
Linux environment doesn’t offer so many GUI options as Windows does but we can do something ourselves to enjoy GUI in Linux environment.
For example, we have Armitage as a GUI version of Metasploit but it also deals with command lines.
Here we are going to talk about configuring a GUI version of Metasploit called Kage. Because Metasploit is the first tool beginners get to know. And as Metasploit deals with lots of command lines, they can’t remember them.
Let’s get into the tutorial and see how can we configure it in Kali Linux.
Setting Up Kage in Kali Linux
Fire up your Kali Linux Machine, go to Github and download the Kage beta app image(Kage.0.1.1-beta_linux.AppImage).Now open up the terminal and go to the Directory where you’ve downloaded the tool and run it by the commands-
chmod +x Kage.0.1.1-beta_linux.AppImage
It will start the GUI. In the login screen, you will see a power button. Click on that and it will connect it to the Metasploit Database. After reaching the progress bar to the ‘Done’ click on cancel and login to the Dashboard.
In the Dashboard select the payload type, put the Lhost and Lport, payload name and click on create. The session is started successfully.
In the next “Payload Generator“ option set the payload name, host and port. If you want to work it over WAN set the static IP address and any unused forwarded port. Now choose the extension of the payload. Here we want to work it on Windows, that is why we are selecting the .exe format. And now click on ‘Generate‘.
This will take some time. Stay with patience. The payload will be created at the Path- /root/desktop/Kage.
Send it to the victim. When the victim clicks it, a session will start. Check out the session on the ‘Sessions‘ option.
Congrats! you have successfully compromised the victim’s system. Now you can remotely control his/her machine.
Now you can access the folders, Network Drives, access camera, record mic, processes, etc.
Most of the people on the Internet love GUI except hackers or those who interested in this stuff. Loving GUI is not a bad thing. It saves us time.
But loving GUI in the field of Hacking is not so preferable because when you get into advanced things you will find all the things running on consoles. And if you used GUI for the whole life then it will be very difficult to do something in this field.
It is recommended that if you are a beginner use the GUI versions of tools but shift to command lines as soon as you learn how the console works.
What do you think about this tool? Tell us in the comment box.