Kali Linux Web Penetration Testing Video Tutorial- Eighth Lesson Nessus Wen / Xuan SoulVideo Course Address:http://edu.51cto.com/course/course_id-1887.htmlDirectoryNessusNessusinstallationNessusInitializeNessusApplication-Basic ConfigurationNessusApplication-Basic ConceptsNessusApplication-Basic StepsNessusApplication-ApplicationVideo Course Address:http://edu.51cto.com/course/course_id-1887.htmlPS: Readers interested in this article can addQQGroup:ha
Pre-preparation work
Start the Kali Linux 2.0 operating system, enter the operating system interface, and in the collection, open the interface shown in the following image:
Click OpenVAS Initial Setup This function button, used to initialize OpenVAS configuration, will set user name and login password, login name is admin, user password in initialization configuration will give, remember to save. If you forget or don't get it, the following figure
HTTrack
To start a terminal in a Kali Linux system
Input: HTTrack, if display welcome
Indicates that the HTTrack has been installed, you can do the following operation, if not installed, please enter the content "Apt-get install HTTrack" Installation HTTrack, the default has been installed
Next: Create a folder mkdir websites
CD Websites
Input HTTrack
Enter project name: such as My_first_httrack
Base path/root/websites/
Enter URLs: Enter the
Tags: BSP processing root star ATI Plugin set user sizeKali Linux 2018.2mysql password modified after invalid,external Unable to connect problem Kali Linux 2018.2 default MySQL database is mariadb, May and MySQL some minor changes, only need to do the following processing. Solution:Mysql-u root-p
UPDATE mysql.user SET plugin= ' WHERE user= ' root ';
UPDATE mysql.user SET password=password (' newpassword ') WHERE user= ' root '; # This time the passw
for output data" --parse-errors: Analysis and real-world database built-in error information to identify vulnerabilities Sqlmap.py-u "Http:// --save: Save command as configuration file, specify save location "" Miscellaneous "Miscellaneous" -Z: Parameter mnemonic "can be abbreviated, parameter is written as parameter set" such as: Sqlmap--batch--random-agent--ignore-proxy--technique=beu-u "1.1.1.1/a.asp?id=1" Sqlmap-z "Bat,random,ign,tec=beu"-U "1.1.1.1/a.asp?id=1" --answer: Set parameters f
1, attack and defense simulation, install DVWA to their host, in Kali Linux through Sqlmap and other tools to start sniffing attacks, need to configure the network. The virtual machine is bridged and replicates the MAC address status.2. View the IP address under the respective system. The Windows System command is ipconfig, and the Linux system command is ifconfig. Determines that the IP address of the two systems is on the same network segment.The fo
have any questions or suggestions, please enlighten me!Copyright notice: The copyright of this article is owned by the author, welcome reprint, but without the consent of the author must retain this paragraph, and in the article page obvious location to give the original link.It is hereby stated that all comments and private messages will be answered at the first time. Also welcome you to correct mistakes, common progress. or direct private messages I, your encouragement is my insistence on ori
Click File, create a new virtual machine, create a new virtual machineClick to see this, select the typicalClick Next, then select the Setup CD image file (ISO) and browse to find the image you downloadedClick Next, select Linux, select the highest Debian version, 64-bit select 64-bitClick Next, modify the name, select where you want to install itClick Next, select the disk size you want, not less than 20GB, choose to store the virtual disk as a single fileClick Next and click on custom Hardware
CEWL Create a password dictionary by crawling Web sites for critical information.Target drone OWSAHost Kali Linux 32-bitOfficial website: http://digi.ninja/projects/cewl.phpYou can use--help to view HelpThe host commands are as follows:CEWL 192.168.191.139-m 3-e-c-v-W a.txt (1.1.1.1 can be the IP address of the destination website, or it can be a URL)-M: Minimum word length-D: Crawl Depth-e: Collect contains Emali address information-C: Number of occu
Use of the "Dig" command:Dig is the domain name resolution tool in Linux, the function is much stronger than Nslookup, and it is very convenient to use. The use of dig under Windows system must be downloaded and installed.How to use:[Email protected]:~# dig www.cnblog.comFor a description of the various logging resources in DNS, please refer to: http://bbs.51cto.com/thread-909189-1.htmlFind a record of the blog park:Find a list of MX records for the blog Park:"Nslookup":
After the Kali Linux installation is complete, its network needs to be configured. Using a DHCP service is one of the easiest ways to configure a NIC, but it is not usually done when penetration testing because the system is logged in the DHCP server's database.1 Dynamic DHCP modeConfiguration file Address:/etc/network/interface# Start System activation device# Loop loopback AddressAuto LoIface Lo inet Loopback# Start System activation device# NIC Eth
1. Install the kernel before you install VMware Tools1 Install linux-headers-$ (uname -R)2. Load Vmware-tools image3. Open the directory where the disc is located and copy the Vmware-tools installation file (vmware-tools.***.tar.gz this file) to the home directory.4. Unzip (TAR) the installation file and install Vmware-tools.tar zxvf vmwaretools-9.9. 0-2304977. tar. gzCD vmware-tools-distrib/./vmware-install. plThe installation process of the screen, all use the default value, always press Enter
Idle can be said to be the first integrated development environment (IDE) for Python under the UNIX platformName line input idle to see if idle is installed, no then install firstInstalling Idle:apt-get Install IdleWhen the installation is complete, the name line input is idle to open the Idle interfaceRight-click to add the idle open mode:1. Execute sudo gedit/usr/share/applications/idle-python2.7.desktopAdded in the following: Mimetype=text/x-python;2. Execute sudo gedit/usr/share/applications
From Linux to the Windows copy files or from Windows to Linux copy files, sometimes the Chinese file name garbled, the cause of this problem is because the Windows file name Chinese encoding defaults to GBK, and the default file name in Linux is encoded as UTF8, Because the encoding is inconsistent, so the file name garbled problem, to solve this problem need to transcode the file name.A tool convmv for file name encoding is provided specifically in Linux, which converts the file name from GBK t
That's what happened.Want to install a software that generates a password by personal information this morningFound unable to installAfter the problem is discoveredI first checked the Kali there was no access to the IPAnd then there's no IP access.How to solve the problem is as follows:Principle Process:1. Writing to the DHCP service1. Make DNS settingsEnter the command first: Gedit/etc/network/interfaces #用gedit进行编辑Under Iface Lo inet loopbackWhat to
Kali Linux v2.0 under install SECURECRT 7.31. Software PreparationUbuntu14.10 x64Version of SecureCRT7.3: Scrt-7.3.0-657.ubuntu13-64.x86_64.deb: http://www.vandyke.com/download/securecrt/download.htmlOr to the Linux commune 1th server download------------------------------------------Split Line------------------------------------------FTP Address: ftp://ftp1.linuxidc.comUser name: ftp1.linuxidc.comPassword: www.linuxidc.comIn 2014 linuxidc.com\10 mont
Dpkg-reconfigure localesSelect character encoding: en_US. UTF-8, ZH_CN. GBK, ZH_CN. UTF-8Select character: Zh_cn. UTF-8 (remember to use a space)Modify/etc/default/localeLang= "ZH_CN. UTF-8 "Language= "Zh_cn:zh"Lang= "ZH_CN. UTF-8 "Language= "Zh_cn:zh"Reboot after SetupFrom for notes (Wiz)Kali root user is English interface how to change into Chinese interface _linux Bar _ Baidu Paste
captured . -I interface Select the interface to listen to ( default : allinterface ) . -F file instead of listener interface, read capture packets from the Pcap dump file ; the file can be a named pipeused with Kismet , or similar use. -P does not set the listener interface to chaotic mode. Auxiliary mode : do not display the image on the screen, but savePut them in a temporary directory and advertise their names on them.Standard output.Maximum number of images saved in the temp directoryIn par
or-V displays detailed progress messages.Use multiple times to achieve greater results:1-show when each pass is completedYou receive a packet that contains an invalid cookie.2-Shows each packet sent and received and whenThe host is removed from the list.3-display host, Vendor ID and return listBefore the scan begins.--quiet or-Q does not decode the returned packets.This prints out less protocol information.The output line is shorter.-Multiline or-m decodes the excess line decomposition payload.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.