Posts

Showing posts from June, 2021

What is vpn

Image
 Virtual private network(VPN): A   virtual private network   ( VPN ) extends a   private network   across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. Applications running across a VPN may therefore benefit from the functionality, security, and management of the private network. It provides access to resources that may be inaccessible on the public network, and is typically used for   telecommuting   workers.   Encryption   is a common, although not an inherent, part of a VPN connection. [1] A VPN is created by establishing a virtual  point-to-point  connection through the use of dedicated circuits or with tunneling protocols over existing networks. A VPN available from the public Internet can provide some of the benefits of a  wide area network  (WAN). From a user perspective, the resources available within the private network can be accessed remotely . Types:

Kali Nethunter

  The   Kali NetHunter   project is the first Open-source Android penetration testing platform for Android devices, allowing for access to the Kali toolset from various supported Android devices. There are multiple unique features not possible on other hardware platforms. The Kali NetHunter interface allows you to easily work with complex configuration files through a local web interface. This feature, together with a custom kernel that  supports 802.11 wireless injection  and preconfigured connect back VPN services, make the Kali NetHunter a formidable network security tool or discrete drop box - with Kali Linux at the tip of your fingers wherever you are! Statistics: Want to see Kali NetHunter progress? Look at the  stats page , to see if your device is supported yet.

Installing Kali

Image
Installing Kali linux: Installing Kali Linux (single boot) on your computer is an easy process. This guide will cover the basic install (which can be done on bare metal or  guest VM ), with the option of encrypting the partition. At times, you may have sensitive data you would prefer to encrypt using Full Disk Encryption (FDE). During the setup process you can initiate an LVM encrypted install on either Hard Disk or USB drives. First, you’ll need compatible computer hardware. Kali Linux is supported on amd64 (x86_64/64-Bit) and i386 (x86/32-Bit) platforms. Where possible, we would  recommend using the amd64 images . The hardware requirements are minimal as listed in the section below, although better hardware will naturally provide better performance. You should be able to use Kali Linux on newer hardware with UEFI and older systems with BIOS. Our i386 images, by default use a  PAE   kernel , so you can run them on systems with over 4 GB of RAM. In our example, we will be installing Ka

Kali's Default Credentials

 Kali's Default Credentials: Kali changed to a non-root user policy by default since the release of 2020.1. This means: During the installation of amd64 and i386 images, it will prompt you for a standard user account to be created. Any default operating system credentials used during Live Boot, or pre-created image (like Virtual Machines & ARM) will be: User: kali Password: kali Vagrant image (based on their policy): Username: vagrant Password: vagrant Amazon EC2: User: kali Password: <ssh key> Default Tool Credentials Some tools shipped with Kali, will use their own default hardcoded credentials (others will generate a new password the first time its used). The following tools have the default values: BeEF-XSS Username: beef Password: beef Configuration File: /etc/beef-xss/config.yaml MySQL User: root Password: (blank) Setup Program: mysql_secure_installation OpenVAS Username: admin Password: <Generated during setup> Setup Program: openvas-setup Metasploit-Framewor

Kali downloading

 Where to get official Kali Linux images ISO Files for Intel-based PCs: In order to run Kali “Live” from a  USB drive  on standard Windows and Apple PCs, you’ll need a Kali Linux  bootable ISO image , in either 32-bit or 64-bit format. If you’re not sure of the architecture of the system you want to run Kali on, on Linux or macOS, you can run the command  uname -m  at the command line. If you get the response, “x86_64”, use the 64-bit ISO image (the one containing “amd64” in the file name); if you get “i386”, use the 32-bit image (the one containing “i386” in the file name). If you’re on a Windows system, the procedure for determining whether your architecture is  detailed on Microsoft’s website . The Kali Linux images are available both as directly downloadable “.iso/.img” files or via “.torrent” files. 👉 Official Kali ISOs for Intel-based PCs Building your own Kali Linux ISO, standard or customized, is  a very simple process . Virtual Machines Images: If you want to run Kali Linux a

Which Image Should I Download?

Image
Which Image Should I Download? In this section, we will describe the process of installing Kali Linux on 32-bit and 64-bit hardware using the images published on the   Kali Linux download page . Content: ✒ Which image to choose    ✒ Which Desktop Environment and (Meta)Packages to Choose During Installation : Which Image to Choose? The  Kali Linux download page  offers three different image types ( Installer ,  NetInstaller  and  Live ) for download, each available for both 32-bit and 64-bit architectures. If in doubt, use the “Installer” image . You will need to check your system architecture to know whether to get 32-bit or 64-bit. If you don’t know it, you’re best to research how to find out  (As a rule of thumb, if your machine’s newer than 2005 you should be okay with amd64/x64/64-bit)

Kali Linux (Should I use Kali Linux )

  SHOULD I USE KALI LINUX ? What’s Different About Kali Linux? Kali Linux is specifically geared to meet the requirements of professional penetration testing and security auditing. To achieve this, several core changes have been implemented in Kali Linux which reflect these needs: Network services disabled by default:   Kali Linux contains systemd hooks that  disable network services  by default. These hooks allow us to install various services on Kali Linux, while ensuring that our distribution remains secure by default, no matter what packages are installed. Additional services such as Bluetooth are also blacklisted by default . Custom Linux kernel:   Kali Linux uses an upstream kernel, patched for wireless injection . A  minimal  and  trusted  set of repositories :  given the aims and goals of Kali Linux, maintaining the integrity of the system as a whole is absolutely key. With that goal in mind, the set of upstream software sources which Kali uses is  kept to an absolute minimum

Kali Linux

  What is Kali Linux : Kali Linux (formerly known as BackTrack Linux) is an open-source, Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali Linux contains several hundred tools targeted towards various information security tasks, such as Penetration Testing, Security Research, Computer Forensics and Reverse Engineering. Kali Linux is a multi platform solution, accessible and freely available to information security professionals and hobbyists. Kali Linux was released on the 13th March 2013 as a complete, top-to-bottom rebuild of BackTrack Linux, adhering completely to Debian development standards. Kali Linux features:  More than 600 penetration testing tools included:   After reviewing every tool that was included in BackTrack, we eliminated a great number of tools that either simply did not work or which duplicated other tools that provided the same or similar fu