Skip to main content

Installing and Configuring Arch Linux

We are going to Install Arch Linux from Scratch

Download Arch ISO from official website

Use it via VirutalBox or VMware - give around 2GB of ram & 16gb of disk space

Start the VM
#Check Internet Access
ping archlinux.org

#Set Time & Date
timedatectl set-ntp true
Creating a Partition 

#Check the partitions
fdisk -l

#Create partition using cfdisk
cfdisk

#Create a partition, allocate space & select it as bootable --> Create --> exit
#you can choose to create a swap space if required to hibernate. 

#Creating File System, i choose /dev/sda2 as that's where i am looking to install the file system
mkfs.ext4 /dev/sda2

#Creating Swap Memory
mkswap /dev/sda1

#Mount the drives
mount /dev/sda2 /mnt
swapon /dev/sda1
Installing Required Tools

pacman -Sy pacman -S archlinux-keyring
pacstrap -i /mnt base base-devel linux-lts linux-firmware dhcpcd vim nano iputils netctl networkmanager grub
Adding drive UUID to fstab

genfstab -U /mnt >> /mnt/etc/fstab
cat /mnt/etc/fstab

arch-chroot /mnt
Setting up Location & Hostname

ln -sf /usr/share/zoneinfo/Asia/Kolkota /etc/localtime
hwclock --systohc

nano /etc/locale.gen
#uncommnet en_US

locale-gen

nano /etc/hostname
Elric

nano /etc/hosts
127.0.0.1 localhost
::1 localhost
127.0.1.1 Elric.localdomain Elric

#Create symlink for dhcp service
systemctl enable dhcpcd

#Update password
passwd
Setting up Grub 

grub-install /dev/sda

grub-mkconfig -o /boot/grub/grub.cfg

#Incase of any error or warning:
Ex: Os-prober will not be executed to detect other bootable partitions
Solution:
nano/etc/default/grub
at the end of the file uncomment/add GRUB_DISABLE_OS_PROBER=false

#save the file & run below command again; you should not see any erros now
grub-mkconfig -o /boot/grub/grub.cfg
Reboot

#Exit from the current session
exit
umount -R /mnt
reboot 
Login to Arch as Root/User 

#Check Internet Access
ping google.com

#incase of issues
nano /etc/resolv.conf
nameserver Gateway_IPAddress

#create a normal user
useradd -m -G wheel -s /bin/bash Username

EDITOR=vim visudo
uncomment wheel
Setting up VM Tools

#VMWARE
pacman -S open-vm-tools

#Virtual Box
pacman -S virtualbox-guest-utils
Installing Required Tools - GUI, audio 

#here i choose xorg,xfce4 and lightdm - you can choose whatever you want- you can get the list from ArchWiki Page

lihgtdm - Display Manager - Graphical
xfce4 - Desktop Environment

pacman -S pulseaudio pulseaudio-alsa xorg lightdm lightdm-gtk-greeter xfce4

#when you are using a display login manager, it should be started on system start
sudo systemctl enable lightdm
Reboot and you can login to Arch via GUI 
Setting up VMWare Tools

#Login to the VM --> click on VM --> Install VMware Tools
#usually it wont mount automatically
#mount using following commands
mkdir /mnt/cdrom
mount /dev/cdrom /mnt/cdrom
cd /mnt/cdrom

copy vmware.tar file to /tmp
tar -xvf vmware.tar

cd vmware-tools-distirb

#Create init directory
sudo bash
for x in {0..6}; do mkdir -p /etc/init.d/rc${x}.d; done

#Run below command and Accept all defaults
vmware-install.pl

nano /etc/systemd/system/vmwaretools.service
--------

[Unit]
Description=VMWare Tools Daemon

[Service]
ExecStart=/etc/init.d/vmware-tools start
ExecStop=/etc/init.d/vmware-tools stop
PIDFile=/var/lock/subsys/vmware
TimeoutSec=0
RemainAfterExit=yes

[Install]
WantedBy=multi-user.target

------

#Add Vmware Tools to systemctl
systemctl start vmwaretools.service
systemctl enable vmwaretools.service

 

 

 

Comments

Popular posts from this blog

SQL DB & SQL Injection Pentest Cheat Sheet

1) MSSQL Injection Cheat Sheet | pentestmonkey 2) xp_cmdshell | Red Team tales 3) PentesterMonkey SQL Injection Cheatsheet Use dbeaver for GUI Access 4) SQL Injection Explanation | Graceful Security Common Ports Microsoft SQL: 1433/TCP (default listener) 1434/UDP (browser service) 4022/TCP (service broker) 5022/TCP (AlwaysOn High Availability default) 135/TCP (Transaction SQL Debugger) 2383/TCP (Analysis Services) 2382/TCP (SQL Server Browser Service) 500,4500/UDP (IPSec) 137-138/UDP (NetBios / CIFS) 139/TCP (NetBios CIFS) 445/TCP (CIFS) Oracle SQL: 1521/TCP 1630/TCP 3938/HTTP MongoDB : 27017,27018,27019/TCP PostgreSQL: 8432/TCP MySQL: 3306/TCP SQL DB Enum with nmap: nmap -p 1433 —script ms-sql-info —script-args mssql.instance-port=1433 IP_ADDRESS nmap -Pn -n -sS —script=ms-sql-xp-cmdshell.nse IP_ADDRESS -p1433 —script-args mssql.username=sa,mssql.password=password,ms-sql-xp-cmdshell.cmd="net user bhanu bhanu123 /add" nmap -Pn -n -sS —script=ms-sql-xp-cmds...

Host and Application locally and access it over the internet via ngrock

 ngrock creates a tunnel from your local machine to ngrock server and host it on the internet via their HTTPS url  Resister an account on ngrock and login #Download the client curl -sSL https://ngrok-agent.s3.amazonaws.com/ngrok.asc \ | sudo tee /etc/apt/trusted.gpg.d/ngrok.asc >/dev/null \ && echo "deb https://ngrok-agent.s3.amazonaws.com buster main" \ | sudo tee /etc/apt/sources.list.d/ngrok.list \ && sudo apt update \ && sudo apt install ngrok #add the authToken ngrok config add-authtoken 2p7Oc #start a python server on your application python -m http.server 3000 #start the server - use the same port as the python server (3000 in below example) ngrok http http://localhost:3000 --request-header-add "ngrok-skip-browser-warning: true" Setting up a Request Header - Login to the application --> Univeral Gateway --> Edges - Create an Edge --> Request Headers --> `ngrok-skip-browser-warning :12 - go back to overv...

Cloud Pentest Cheatsheet - Azure

Azure Cloud offers a comprehensive ecosystem of tools and services. Among its core components are: Azure Active Directory (AAD) Azure Resource Manager (ARM) Office 365 (O365) Initial Access Try to get a user credential via OSINT/Social engineering or try to comprise a web application hosted on Azure VM. Enumerate the roles attached to the VM and try to escalate your privileges.  Entra ID Directory Role Entra ID directory roles are predefined roles that grant permissions to perform specific tasks within an Azure AD tenant. These roles are essential for managing administrative tasks in Entra ID. Types of Roles: Built-in Directory Roles Global Administrator Application Administrator User Administrator Custom Directory Roles Accessing APIs in Azure Entra ID - Access via Microsoft Graph API Endpoint {HTTP method} https://graph.microsoft.com/{version}/{resource}?{query-parameters} Azure Resource Manager API Endpoint (ARM-specific) {HTTP method} https://management.azure.com/{...