-get install synaptic # install xinlide
Apt-get install file-roller # install the decompression software
Apt-get install clementine # clementine music player
Apt-get install smplayer # install smplayer
Apt-get install terminator # install multi-window Terminal
For more details, please continue to read the highlights on the next page:
A list of new features of Kali Linux 2.0 official version, transformed in
1.4.1 mounting to the hard driveInstalling to a hard disk is one of the most basic operations. The implementation of this work allows users to run Kali Linux without using DVDs. Before you install this new operating system, you need to do some preparatory work. For example, where to get Linux? What are the requirements for computer configuration? ...... These req
fully use the sandbox mechanism and do not have any interfaces between them.
Because the docker runtime environment requires more than 3.8 kernels, this method is not particularly applicable and can be used.uname -aTo check the kernel version of the VPS. For example, a small version of the VPS vendor provides an image with a kernel version of more than 2.6. If your kernel version is earlier than 3.8, skip this method.Install docker
Install docker In debian 8Http://www.docker.org.cn/
Python Black Hat programming 1.1 virtual machine installation and configuration Kali Linux 2016PythonBlack Hat Programming 1.1 virtual machine installation and configuration Kali Linux 20160.1 Tutorial instructions in this seriesThis series of tutorials, the use of the outline of the parent for the "Understanding Netwo
the installation:
2. Install VirtualBox in kali-linux
Download the deb package from the official website, and then install dpkg-I xxx. deb;: Https://www.virtualbox.org/wiki/Linux_DownloadsOr apt-get install virtualbox
A list of new features of Kali Linux 2.0 official version, transformed into a rolling release vers
forbidden.In this cheats, we will use different methods and cooperate with Kali Linux tools, Ali for detecting and recognizing the existence of the target and the Web application firewall between us.Operation Steps
Nmap contains scripts to test the existence of a WAF. Let's try them on VULNERABLE-VM: nmap -p 80 , 443 -- Script= http-waf -detect 192.168 .56 .102 OK, no WAF detected. So t
Install Kali Linux and workstationkali on VMware WorkstationInstall Kali Linux on VMware Workstation
VMware Workstation is a powerful desktop virtual computer software. This software allows you to run different operating systems simultaneously on a single desktop. You can also develop, test, and deploy new applications
Text in a Windows systemb.2.4 running a Python program in Sublime Textb.2.5 Configuration Sublime Textb.2.6 Customizing the settings of the Sublime TextB.3 IDLEb.3.1 installing IDLE on Linux systemsb.3.2 installing IDLE in OS X systemsb.3.3 installing IDLE on Windows systemsb.3.4 Custom IDLE SettingsB.4 Emacs and VimAppendix C seeking HelpC.1 First Stepc.1.1, try again.c.1.2 Rest for a whilec.1.3 Online resources for reference bookC.2 Online Searchc.
Kali Linux Infiltration Basics finishing Series article reviewVulnerability scanning
Network traffic
Nmap
Hping3
Nessus
Whatweb
Dirbuster
Joomscan
Wpscan
Network trafficNetwork traffic is the amount of data transmitted over the network.TCP protocolTCP is the Transport layer protocol in the Internet, using three-time handshake protocols to establish
LinkedInThe user names collected from LinkedIn will be of great use in subsequent tests. For example: social engineering attacks.MetagoofilMetagoofil is a tool that uses Google to gather information and currently supports the following types:1. Word2.Ppt3.Excel4. PdfCommands to use Metagoofil:#MetagoofilDemonstrate by an example:#metagoofil-D baidu.com-l 20-t doc,pdf-n 5-f Test.html-o testThrough this tool we can see very much information collected,
,tcpdump, or tshark–-you can also use for sniffing. We use Wireshark in most cases in this book, but we recommend that you explore other tools. The first step is to create a monitoring mode interface. This will create an interface for your adapter so that we can read all the wireless frames in the airspace, regardless of whether they target us or not. In a wired world, this is often called mixed mode.Actual combat time – the interface for creating a m
rules of double Lukie related, to tell the truth, I have not played the relevant game, but I swear I can play this game, the follow-up will be a deeper introduction, the main or the rules of the explanation, anyway, is the western game, it is necessary to understand.Well, the introduction of the game here temporarily, the back of the time will be, Kali Linux an adventure game on the blog to share, is said
IntroductionKali Linux is a Debian-based Linux distribution that is designed for digital forensics and penetration testing. Installing Kali Linux is simple, but the process of installing VMware Tools is a bit of a hassle, because in the middle of the installation you will be asked the kernel header file you need to com
email addresses, blogs, friends on Facebook, hobbies, locations, job descriptions, and can be presented in a more useful and comprehensive form.But this might be a little better for foreign countries.Non-disclosure of data by third parties"Social Work Pool" is a structured database of all aspects of data accumulated during attacks using social engineering. There's a lot of information in this database, and you can even find a record of each person's behavior, such as hotel room records, persona
Kali Linux is a comprehensive penetration testing platform with advanced tools that can be used to identify, detect, and exploit undetected vulnerabilities in the target network. With Kali Linux, you can apply the appropriate test methodology based on defined business objectives and scheduled test plans to achieve the
The other day, Neo recommended a website containing more than 100 free linux books. Here, I also recommend 20 of the best free Linux books. Of course, they are also in the English version.
1. Ubuntu pocket guide and reference
An Introduction to Ubuntu 8.04 and 8.10.
Website
Www.ubuntupocketguide.com
Author
Keir Thomas
Format
PDF
latest version of Fedora 7 Linux (not yet released the official version, is a beta version).
Fedora 7 uses a kernel based on 2.6.20 Linux kernel.
Suggest a look for the friend who installs this version. provides two different formats for the book.
CHM format Download: Ftp://ftp_hllinux:123456@211.95.73.26/wz/fedora7linux text mode installation whole diagr
: Network Disk DownloadContent Introduction······This book is a comprehensive tutorial on Linux command-line and shell script programming. The book is divided into four parts: the first part introduces the Linuxshell command line, the second part introduces the Shell Script Programming Foundation, the third part delves into the advanced content of shell script pr
kneeling, you can enter in the browser: the http://pan.baidu.com/s/1sj9CLXz to download.
These two books are also my kind of interest. I hope they can help you to avoid detours. If they can help you, I am naturally very happy, if you feel that there is something wrong with it, you may wish to point it out to me so that you can make common progress.
How can I view PDF files in linux?
For Debian series, use
Menledey is a book management software
Realize the function of the personal library
Of course, I just use it as a PDF reader, and it's really a bit
He's overqualified, but his library function is very useful.
It's like a free 2GB personal space for every user.
Menledey not only can read pdf
You can also read Word documents, and so on
The user's data will
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.