cipher suiteForced downgrade of cryptographic strength during negotiationModern processor computing power can break outdated encryption algorithms in an acceptable time periodHack by buying cloud computing resourcesOpenssl "Kali system Command"Call the OpenSSL library directly to identify the SSL/TLS cipher suite supported by the target serverView the certificate used by the Web siteOpenSSL s_client-connect www.baidu.com:443 "S_client: As a client-co
application requestAn instruction that convinces a user to trigger an attack (social worker)Burpsuite CSRF PoC GeneratorPost/get methodCSRF Vulnerability Demonstration process "Win7 for victim, Change Password page, Kali for attack"Low level, no need to enter the original password "forge pages and links to entice victims to click"Note: Get method : will be visible on the page,Post method : will be hidden operationGETPOSTView the source code of the We
Scan Tool-nikto#WEB渗透
Target drone: metasploitable
Shooting range: DVWA "default account/Password: Admin/password"
#新手先将DVWA的安全性, to the lowest, can be easily detected vulnerability
Reconnaissance "reduce interaction with target systems"
HTTrack: Download a Web-downloadable page to your computer and check for local "Kali installation"
# #可到此网站获取代理: hidemyass.com "free agent should be careful"
Manual vulnerability MiningVulnerability type
#Directory Traversal directory Traversal "read files on this machine's operating system"
Users can read the Web root directory "default:/var/www/" Other operating system files (such as:/etc/passwd/) through the browser/url address or parameter variable contents. Root cause: Directory permissions are not strictly restricted
#File include file contains "1, include local file contains lfi;2, remote system file contains R
Scan Tool-qwasp_zapOne of the top ten security tools, integrated tools, fully functional, and Powerful. Both active scanning and truncation agent can be done. Open source free cross-platform, easy to use, experience relative confusion, but in the active scanning aspect, relatively dominant. "kali integration"# # #建议选择第二项# # #注意检查更新Updates and plug-in installation
Install Plug-ins release and beta "release: mature beta: beta al
. Reconnaissance: HTTrackCreate a directory: mkdir DVWAIn Kali: HTTrackProject NAME:DVWAStorage path:/ROOT/DVWAUrl:http://192.168.x.x/dvwa: 2 (or 1)Agent:: * (All):7. Scanning(1) NiktoScan: Server software version, security hidden files (backup files), server default configuration vulnerability, WebApplication level of security.Some of the commonly used commands: When authentication is required, modify the configuration file and then scanThis note is
How to modify the Nic file in Kali-linux to start the SSH and Apache service1. Su root//Get root permission2. shift+ letters//uppercase and lowercase letters switching3. Modify the NIC configurationuse DHCP to surf the internetIn the desktop right---in the terminal, enter the command "vim/etc/network/interfaces", keyboard input I enter the Insert edit mode, press ESC + ": Wq" Save exit--in Terminal input command " Reboot "Restart your computer to get
email addresses, blogs, friends on Facebook, hobbies, locations, job descriptions, and can be presented in a more useful and comprehensive form.But this might be a little better for foreign countries.Non-disclosure of data by third parties"Social Work Pool" is a structured database of all aspects of data accumulated during attacks using social engineering. There's a lot of information in this database, and you can even find a record of each person's behavior, such as hotel room records, persona
Kali Linux Installation Sogou Input method is more troublesome, because there are many dependencies, but the installation is good to use, feel the general installation of Trouble IBUs, classic, also often updated. Let's talk about how to install Sogou Input method: First go to http://http.kali.org/pool/main/f/fcitx/this URL to download some related packages, the required packages are as follows: (the latest 4.9 has two packages not, so use the 4.8 ver
The Linux system crosses the FireWire-buffer overflowPrinciple: Crossfire 1.9. Version 0 There is a buffer overflow vulnerability when an inbound socket connection is accepted.Tools:
Debugging Tools: EDB;
# # #python在漏洞溢出方面的渗透测试和漏洞攻击中, with a great advantage
Experimental object: Crossfire "multiplayer online RPG game"
Operating platform: Kali i686 Virtual Machine "32-bit, the number of computer CPUs refers to
Kali has a big problem: it can't automatically connect to the Web.Also, modifying/etc/network-manager/network*.conf and/etc/network/interfaces on an online basis has no effect.If sudo ifconfig wlan0 up, you will be prompted with the following error:There are two solutions:1. Top right: System----"SET-----" network-------"on2. Order Resolution: Because I have been connected, do not want to do anything, so do not map.sudo rfkill list allsudo rfkill unbl
Bored to play, do not do some bad things yo ~ ~ Online There are some articles about Kali Linux, on the actual combat. Kali is used by Debian.If you are in the same wifi as the goddess.IP ScannerKali virtual machine under the link external USB wireless card, virtual machine step support built-in wireless network cardTerminal input echo 1 >/proc/sys/net/ipv4/ip_forward IP forwarding to ensure the Goddess's n
Introduction: Nessus is a well-known information security services company tenable launched a vulnerability scanning and analysis software, Known as "the world's most popular vulnerability scanner, more than 75,000 organizations around the world are using it." Although this scanner can be downloaded for free, but to update from tenable to all the latest threat information, the annual direct subscription fee is $1,200, which is 100 U.S. knives per month. Nessus can be used in Linux, FreeBSD, Sola
Restart Kali suddenly found that the terminal is not open.Recall the previous action. This operation was used by dpkg-reconfigure locales. Causes the locale to be modified.Search the answers on the Internet.Some sayGo to command Line window: ctrl+alt+f1root Login execution: dpkg-Reconfigure locales space selection: en_US. UTF-8 utf-8 , remove other reboot restart to openMy personal adoption of this operation did not succeed.However, after changing th
After installing the system, I want to change the system default language (Chinese change to English).Dpkg-reconfigure localesSelect en_US (UTF8)
Menus are not easy to edit without a menu editor.Apt-get Install Alacarte
Replace the default GNOME desktop with a small, fast Xfce desktopStep 1:apt-get Install kali-defaults kali-root-login desktop-base xfce4 xfce4-places-plugin xfce4-goodiesStep 2:updat
0x01 Preparation Tool1.Kali Linux 2.02. Wireless Card (compatible with Kali or installed drivers)3. Dictionary-Http://www.qqtn.com/down/80787.html#szdz0x02 Method One: aircrack dictionary brute force hack1. Enter terminal input: Airmon-ng View network card information2. Enter in Terminal: Airmon-ng start Wlan0 (NIC name) to turn on NIC promiscuous modeThen enter Iwconfig to see if the network card name beco
In the early stages of penetration testing, security personnel often need to get some information from the Internet quickly to identify the goals of the test. To meet this requirement, Kali Linux provides theharvester tools. The tool can search engines, social networking sites to obtain target-related information, such as email address, sub-domain name, host, employee name, open port and so on.The tool collects as much information as possible by defau
The various tools described earlier are connected to a wireless network by cracking the password directly. Because in all devices in a wireless network environment, routers are one of the most important devices. Usually the user sets a more complex password to secure the router. Even some users may use the router's default user name and password. However, there are some vulnerabilities in the router itself. It may not be easy for a user to start working on a complex password. At this point, you
Create a Python file first: Touch pythonView Python version Model: PYTHON-VFor example:[email protected]:~# python-vPython 2.7.13Exit Python at Kali Terminal: Input Quit ()Example:nameerror:name ' version ' is not defined>>> quit ()[Email protected]:~#Bin (): converts an integer to a binary string. The result is a valid Python expression. if x is not a Python int object, it must define a __index__ () method that returns an integer. Len (): Returns the
As the old saying goes, see the latest version of python3.6.1.
So I want to update the
Uninstall the original python3.5.x apt-get remove Python3
Then you need to unload a bunch of stuff and unload it.
The result is a big problem. The Kali interface is not visible.
Although the final solution of the harvest is not small, but there is a snack tired said to frighten the baby
Went to search a pile of things, summed up under:
1. Linux differs from windows
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.