Skip to content

Kill Chain Setup

Rupert Edwards edited this page Apr 26, 2021 · 64 revisions

Setting up your “Kill Chain” environment


Expand for installation commands
  1. sudo apt-get update
  2. sudo apt-get install websploit openvas veil-evasion tor
  3. sudo git clone https://github.com/ruped24/killchain.git
  4. cd killchain
  5. sudo ./killchain.py

🔻 killchain.py one-liner installation

sudo apt-get update && sudo apt-get -y install websploit openvas veil-evasion tor && sudo git clone https://github.com/ruped24/killchain.git && cd killchain && sudo ./killchain.py

Post installation setup:

Go through the options on the menu

Expand for killchain menu setup options
  • killchain Option 4
    OpenVas takes a while on first run. Go get a coffee or two. You can launch multi Kill
    Chain sessions. No need to watch paint dry. Once OpenVas setup has completed;
    Reset openvas web interface admin password then sync the NVT database and 
    finally start the web interface by running the commands below in an
    external terminal.

sudo gvmd --user=admin --new-password=<Your_new_reset_admin_password>

ospd-openvas

sudo gvm-start

Other gvm commands:

Expand for other gvm commands
  • sudo gvm-feed-update

  • sudo gvm-stop

    Point your browser to https://localhost:9392

    Login Username = admin

    Login Password = Your_new_reset_admin_password
  • killchain Option 5
    Note on Veil-Evasion: Veil will complete the setup upon launch. Accept all
    the defaults. This takes a while. Don't leave the screen tho, there’re dialog you will
    have to click through. Once it’s complete, it will auto launch.
  • killchain Option 6

    Websploit: To exit websploit, type exit.

  • killchain Option 7

    Metasploit: To exit metasploit, type exit.

  • killchain Option 8

WiFite: It's for site survey within the framework of this console.

Run wifite in an external terminal to do wireless attacks against target.

Courses of Action Matrix & Troubleshooting


Now you should be cooking with gas 😎