[How to] Enabling ssh connectivity in Backtrack/Kali Linux

Sep 28, 2014 • Kali-Linux

Backtrack/Kali  is the most advanced Linux based penetration testing distribution till date. It contains pre-installed tools from Information gathering to advanced wireless attacks and Forensics. We are launching a series of tutorials that will start from the basics and will cover the most advanced attacks with Backtrack/Kali.

Let us first enable ssh connectivity on Backtrack/Kali. By default, ssh connectivity will not be enabled. We have to enable it manually. Now lets us see how can we do that. Before making our system able to receive ssh, we should first create/Generate ssh private and public key. Generating these keys are very simple. Just use the command

sshd -generate

And the Backtrack/Kali will automatically create it for you. After creating the keys, we have to tell the backtrack/Kali to accept ssh connections. To do that, use either one of the following command:

/etc/init.d/ssh start or start ssh

(It is always better to use the first command as I have heard people complaining that the second command is simply not working.) Now you have successfully taught Backtrack/Kali to accept ssh connection. But still there is a problem. Once you reboot the system, it will forget these settings. In other words, you are enabling ssh temporarily and once system reboots, it will forget all the settings.

So what should we do so that it will remember these settings forever ? Use the following command to update and permanently store the ssh settings :

update-rc.d -f ssh defaults

So you will be wondering what this command will do? Basically what it does is, it will over write the default ssh settings to the new one you just did. So this will ensure that your the changes will be permanent and will not perish if system reboots.

Note:

While enabling ssh, you should make sure that your system users has really strong alpha - numeric passwords especially root user. It is because an attacker can do a brute force attack over ssh and if your password is not strong enough, he can break it and can cause system damage or theft of your precious data.

Anirudh Anand

Head of Product Security & DevSecOps at @CRED_club | Application Security ♥ | CTF lover - @teambi0s | Security Trainer - @7asecurity | certs - eWDP, OSCP, OSWE