SMOLNET PORTAL home about changes
kalilinux.in.atom.xml - sfeed_tests - sfeed tests and RSS and Atom files
(URL) git clone git://git.codemadness.org/sfeed_tests (git://git.codemadness.org)
(DIR) Log
(DIR) Files
(DIR) Refs
(DIR) README
(DIR) LICENSE
---
kalilinux.in.atom.xml (497833B)
---
1 <?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-6091241131056531264</id><updated>2021-10-18T12:24:21.332+05:30</updated><category term="Attack Strategies"/><category term="Configure"/><category term="Custom Tools For Kali Linux"/><category term="Information Gathering Tools"/><category term="Scanning"/><category term="Forensic"/><category term="Password Attacks"/><category term="Writing Reports"/><title type='text'>Best Kali Linux Tutorials</title><subtitle type='html'>Kali Linux.in offers large number of Kali Linux tutorials and We cover all the tools are in Kali Linux and custom tools, So this is the Best place for penetration testers. </subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='https://www.kalilinux.in/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default'/><link rel='alternate' type='text/html' href='https://www.kalilinux.in/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default?start-index=26&amp;max-results=25'/><author><name>Kali Linux</name><uri>http://www.blogger.com/profile/07345541575706459646</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//3.bp.blogspot.com/-Mb3EvSYi1Yg/YOL_LNs2xhI/AAAAAAAAFk4/aghHydKfmagtjPYLvn-SVVNEIJW10TdLACK4BGAYYCw/s113/kali%2Bdragon.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>259</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-6091241131056531264.post-3597049142396867972</id><published>2021-10-17T01:30:00.000+05:30</published><updated>2021-10-17T01:30:00.170+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Custom Tools For Kali Linux"/><category scheme="http://www.blogger.com/atom/ns#" term="Forensic"/><title type='text'>Detect It Easy -- Easily Determine Any File Type</title><content type='html'>&lt;p&gt;During the digital forensics works we had faced with various type of files. From our personal experience we can say it&#39;s not easy. There are numerous file types. If we got a file from suspected devices &lt;u&gt;&lt;b&gt;without any file extension&lt;/b&gt;&lt;/u&gt; then it is very hard to make an idea about the file type. There are some utilities on Linux like &lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;file&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt; can done the job, but that may not be the perfect and less information.&lt;/p&gt;&lt;p&gt;In this detailed guide we are going to discuss about &quot;&lt;b&gt;&lt;a href=&quot;https://github.com/horsicq/Detect-It-Easy&quot; target=&quot;_blank&quot;&gt;Detect It Easy&lt;/a&gt;&lt;/b&gt;&quot; aka &quot;&lt;b&gt;DIE&lt;/b&gt;&quot;. &lt;a href=&quot;https://github.com/horsicq/Detect-It-Easy&quot; target=&quot;_blank&quot;&gt;Detect It Easy&lt;/a&gt; or DIE is a cross-platform &lt;b&gt;file type detection program&lt;/b&gt;. Apart from Linux (read &lt;b&gt;Kali Linux&lt;/b&gt; in our case), it is also available for Windows and Mac OS.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-TxMR6XGXqb0/YVlN7kL4sOI/AAAAAAAAF_I/HC9k2zo89awUgK5HRunPUmjzZSHb48PIgCLcBGAsYHQ/s1000/die%2Bthumbnail.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Detect Suspicious files using Detect It easy&quot; border=&quot;0&quot; data-original-height=&quot;606&quot; data-original-width=&quot;1000&quot; height=&quot;194&quot; src=&quot;https://1.bp.blogspot.com/-TxMR6XGXqb0/YVlN7kL4sOI/AAAAAAAAF_I/HC9k2zo89awUgK5HRunPUmjzZSHb48PIgCLcBGAsYHQ/w320-h194/die%2Bthumbnail.png&quot; title=&quot;Detect Suspicious files using Detect It easy&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;b&gt;DIE&lt;/b&gt; exists in three versions. Basic version (“DIE”), Lite version (“DIEL”) and terminal version (“DIEC”). All the three use the same signatures, which are located in the folder &quot;db&quot;. If you open this folder, nested sub-folders will be found (“Binary”, “PE” and others). The names of sub-folders correspond to the types of files. First, DIE determines the type of file, and then sequentially loads all the signatures, which lie in the corresponding folder. Currently the program defines the following types:&lt;/p&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li&gt;MSDOS executable files MS-DOS.&lt;/li&gt;&lt;li&gt;PE executable files Windows.&lt;/li&gt;&lt;li&gt;ELF executable files Linux.&lt;/li&gt;&lt;li&gt;MACH executable files Mac OS.&lt;/li&gt;&lt;li&gt;Binary all other files. &lt;/li&gt;&lt;/ol&gt;&lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Install Detect It Easy on Kali Linux&lt;/span&gt;&lt;/h1&gt;&lt;p&gt;Installing &quot;Detect It Easy&quot; on Kali Linux is also very easy. First of all we need to install some dependencies to run this by using following command:&lt;br /&gt;&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;sudo apt install qtbase5-dev qtscript5-dev qttools5-dev-tools git build-essential qtchooser&lt;/pre&gt;&lt;p&gt;The dependencies will be installed shortly, as we can see in the following screenshot:&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-3c2nixFbPvo/YVgBb4Hl1UI/AAAAAAAAF-A/-cR-P3KcriIFghB0ZzqBbzhzKwqRy0mNwCLcBGAsYHQ/s841/detect%2Bit%2Beasy%2Bdependencies.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;installing dependencies for detect it easy&quot; border=&quot;0&quot; data-original-height=&quot;393&quot; data-original-width=&quot;841&quot; height=&quot;300&quot; src=&quot;https://1.bp.blogspot.com/-3c2nixFbPvo/YVgBb4Hl1UI/AAAAAAAAF-A/-cR-P3KcriIFghB0ZzqBbzhzKwqRy0mNwCLcBGAsYHQ/w640-h300/detect%2Bit%2Beasy%2Bdependencies.png&quot; title=&quot;installing dependencies for detect it easy&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Now we need to download &quot;&lt;a href=&quot;https://github.com/horsicq/DIE-engine&quot; target=&quot;_blank&quot;&gt;Detect It Easy&lt;/a&gt;&quot; from GitHub by using following command:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;git clone --recursive https://github.com/horsicq/DIE-engine&lt;/pre&gt;&lt;p&gt;This will take some time depending on our internet speed and system performance. As we can see in the following screenshot:&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-yk11YKCG2AQ/YVgEuKSYatI/AAAAAAAAF-I/GR4Me8H8ibILqkLyIFFPLx9qiPgm4dIeACLcBGAsYHQ/s860/clonning%2Bdetect%2Bit%2Beasy.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;detect it easy cloning from GitHub&quot; border=&quot;0&quot; data-original-height=&quot;402&quot; data-original-width=&quot;860&quot; height=&quot;300&quot; src=&quot;https://1.bp.blogspot.com/-yk11YKCG2AQ/YVgEuKSYatI/AAAAAAAAF-I/GR4Me8H8ibILqkLyIFFPLx9qiPgm4dIeACLcBGAsYHQ/w640-h300/clonning%2Bdetect%2Bit%2Beasy.png&quot; title=&quot;detect it easy cloning from GitHub&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Now we need to navigate to our recently downloaded/cloned directory by simply using following command:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;cd DIE-engine&lt;/pre&gt;&lt;p&gt;Now we need to run build script by using following command:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;bash -x build_dpkg.sh&lt;/pre&gt;&lt;p&gt;We can see that the build script is running in the following screenshot:&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-m6O3GNkTaPI/YVhRgMjwVoI/AAAAAAAAF-Q/Z8C_ZUT5nEceKMPcTPojMPJJaIz7PDfTACLcBGAsYHQ/s1002/detect%2Bit%2Beasy%2Bbuilding%2Bscript%2Brunning.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;detect it easy building script running&quot; border=&quot;0&quot; data-original-height=&quot;486&quot; data-original-width=&quot;1002&quot; height=&quot;310&quot; src=&quot;https://1.bp.blogspot.com/-m6O3GNkTaPI/YVhRgMjwVoI/AAAAAAAAF-Q/Z8C_ZUT5nEceKMPcTPojMPJJaIz7PDfTACLcBGAsYHQ/w640-h310/detect%2Bit%2Beasy%2Bbuilding%2Bscript%2Brunning.png&quot; title=&quot;detect it easy building script running&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;It might take some time depending on our system performance. We need a coffee break 🍵, let it finish.&lt;/p&gt;&lt;p&gt;After it finishes we need to install the deb package on our Kali Linux system. To do that we need to run the following command:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;sudo dpkg -i release/die_*.deb&lt;/pre&gt;&lt;p&gt;In the following screenshot we can see that the installation process is done. It will not take longer time like building script.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-w9WZtpwEblY/YVhXUVctXmI/AAAAAAAAF-Y/9Ksaz0y0hjUv4DnyMqdzXjJ6i0OJ9GBCQCLcBGAsYHQ/s1112/die%2Binstallation%2Bon%2BKali%2BLinux.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;die installation on Kali Linux&quot; border=&quot;0&quot; data-original-height=&quot;540&quot; data-original-width=&quot;1112&quot; height=&quot;310&quot; src=&quot;https://1.bp.blogspot.com/-w9WZtpwEblY/YVhXUVctXmI/AAAAAAAAF-Y/9Ksaz0y0hjUv4DnyMqdzXjJ6i0OJ9GBCQCLcBGAsYHQ/w640-h310/die%2Binstallation%2Bon%2BKali%2BLinux.png&quot; title=&quot;die installation on Kali Linux&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Now our installation is finished. Now we move forward to using &quot;Detect It Easy&quot; on our system and try to identify some file types.&lt;/p&gt;&lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Using Detect It Easy on Kali Linux&lt;/span&gt;&lt;/h1&gt;&lt;p&gt;First we need some files, specially no extension named files that will help us to know the file types. Otherwise, we know that .exe is a Windows application and .py is a python program. Here we have file a file named &quot;Video&quot; on our Desktop, which didn&#39;t have any file extension.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-niN_iyYpCXo/YVhgixsNYeI/AAAAAAAAF-o/jOU3i7srPQ4g3T9tl2UonI_psC2pc_FkgCLcBGAsYHQ/s433/unknown%2Bfile%2Btype.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;unknown file type on our desktop&quot; border=&quot;0&quot; data-original-height=&quot;108&quot; data-original-width=&quot;433&quot; height=&quot;100&quot; src=&quot;https://1.bp.blogspot.com/-niN_iyYpCXo/YVhgixsNYeI/AAAAAAAAF-o/jOU3i7srPQ4g3T9tl2UonI_psC2pc_FkgCLcBGAsYHQ/w400-h100/unknown%2Bfile%2Btype.png&quot; title=&quot;unknown file type on our desktop&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Some of us can assume that it might be a video file, Lets see what &quot;Detect It Easy&quot; detects.&lt;p&gt;&lt;/p&gt;&lt;p&gt;We can use command line or graphical user interface both, that doesn&#39;t matter our work should be done. We use following command to know the file type of &#39;Video&#39; named file on our Desktop.&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;diec Video&lt;/pre&gt;&lt;p&gt;Because we are already in Desktop directory we don&#39;t need to set our file path, we just use name. But in the case our working directory is different from file location we need to use path of file. In the following screenshot we can see the output, by the way the &lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;diec&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt; command used for DIE command line utility.&lt;br /&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-wBQlCuEyKvw/YVhhjC01v3I/AAAAAAAAF-w/FvhakFBwz7km_-Hnxcxywzc-pMxsha7uACLcBGAsYHQ/s711/file%2Btype%2Bdetected%2Bby%2BDetect%2BIt%2BEasy.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;file type detected by detect it easy&quot; border=&quot;0&quot; data-original-height=&quot;313&quot; data-original-width=&quot;711&quot; height=&quot;282&quot; src=&quot;https://1.bp.blogspot.com/-wBQlCuEyKvw/YVhhjC01v3I/AAAAAAAAF-w/FvhakFBwz7km_-Hnxcxywzc-pMxsha7uACLcBGAsYHQ/w640-h282/file%2Btype%2Bdetected%2Bby%2BDetect%2BIt%2BEasy.png&quot; title=&quot;file type detected by detect it easy&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Form the above screenshot we can easily understand that this &#39;Video&#39; is not a video file, it is a Microsoft installer file (exe file for Windows).&lt;/p&gt;&lt;p&gt;In other hand, we can use GUI version of &quot;Detect It Easy&quot; by simply using following command on our terminal:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;die&lt;/pre&gt;&lt;p&gt;Now the &lt;b&gt;G&lt;/b&gt;raphical &lt;b&gt;U&lt;/b&gt;ser &lt;b&gt;I&lt;/b&gt;nterface of &quot;Detect It Easy&quot; will open in our front as we can see in the following screenshot:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-n4K2sH-wVYA/YVlDPcyvqzI/AAAAAAAAF-4/52PXplCla2wtyD0dDLJu6_OYFWaixBIeACLcBGAsYHQ/s900/die%2Bgui.png&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;detect it easy graphical user interface&quot; border=&quot;0&quot; data-original-height=&quot;469&quot; data-original-width=&quot;900&quot; height=&quot;334&quot; src=&quot;https://1.bp.blogspot.com/-n4K2sH-wVYA/YVlDPcyvqzI/AAAAAAAAF-4/52PXplCla2wtyD0dDLJu6_OYFWaixBIeACLcBGAsYHQ/w640-h334/die%2Bgui.png&quot; title=&quot;detect it easy graphical user interface&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;DIE Graphical Interface&lt;/span&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;Here we can select a file from our computer and select &quot;Scan&quot; to Scan it.&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-N8TdWYjjDH4/YVlEbXGxpvI/AAAAAAAAF_A/r8pgVnlXI90ye5k9jD_6xZuVKj07h1mPgCLcBGAsYHQ/s755/die%2Bgui%2Bexplained.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;DIE GUI explained&quot; border=&quot;0&quot; data-original-height=&quot;462&quot; data-original-width=&quot;755&quot; height=&quot;392&quot; src=&quot;https://1.bp.blogspot.com/-N8TdWYjjDH4/YVlEbXGxpvI/AAAAAAAAF_A/r8pgVnlXI90ye5k9jD_6xZuVKj07h1mPgCLcBGAsYHQ/w640-h392/die%2Bgui%2Bexplained.png&quot; title=&quot;DIE GUI explained&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;It is very fast and easy to use. We can see various things here. MIME, Hash, Strings etc for detailed analysis.&lt;/p&gt;&lt;p&gt;&lt;u&gt;&lt;b&gt;Note:&lt;/b&gt;&lt;/u&gt; &lt;b&gt;Detect It Easy&lt;/b&gt; is mainly created for analyzing executable files, so its functions are more related to program files, for example, determining the architecture. But there is also support for other binaries.&lt;/p&gt;&lt;p&gt;This is how we can install &quot;&lt;b&gt;Detect It Easy&lt;/b&gt;&quot; on our system, and know any kind of &lt;b&gt;file types&lt;/b&gt; (specially program files) using our &lt;b&gt;Kali Linux&lt;/b&gt; system.&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Love our articles?&lt;/b&gt; Make sure to &lt;b&gt;follow us&lt;/b&gt; on &lt;a class=&quot;d-link&quot; href=&quot;https://twitter.com/KaliLinux_in&quot; target=&quot;_blank&quot;&gt;Twitter&lt;/a&gt; and &lt;a class=&quot;d-link&quot; href=&quot;https://github.com/jaykali&quot; target=&quot;_blank&quot;&gt;GitHub&lt;/a&gt;, we post article updates there. To join our &lt;b&gt;KaliLinuxIn&lt;/b&gt; family, join our &lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;a class=&quot;d-link&quot; href=&quot;https://t.me/kalilinuxin&quot; target=&quot;_blank&quot;&gt;Telegram Group&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;. We are trying to build a community for Linux and Cybersecurity. For anything we always happy to help everyone on the &lt;span style=&quot;color: red;&quot;&gt;comment section&lt;/span&gt;. As we know our comment section is always open to everyone. We read each and every comment and &lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;we always reply&lt;/span&gt;&lt;/b&gt;.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='https://www.kalilinux.in/feeds/3597049142396867972/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.kalilinux.in/2021/10/detect-it-easy-file-type.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/3597049142396867972'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/3597049142396867972'/><link rel='alternate' type='text/html' href='https://www.kalilinux.in/2021/10/detect-it-easy-file-type.html' title='Detect It Easy -- Easily Determine Any File Type'/><author><name>Kali Linux</name><uri>http://www.blogger.com/profile/07345541575706459646</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//3.bp.blogspot.com/-Mb3EvSYi1Yg/YOL_LNs2xhI/AAAAAAAAFk4/aghHydKfmagtjPYLvn-SVVNEIJW10TdLACK4BGAYYCw/s113/kali%2Bdragon.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-TxMR6XGXqb0/YVlN7kL4sOI/AAAAAAAAF_I/HC9k2zo89awUgK5HRunPUmjzZSHb48PIgCLcBGAsYHQ/s72-w320-h194-c/die%2Bthumbnail.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6091241131056531264.post-6137352356060027208</id><published>2021-10-13T01:30:00.001+05:30</published><updated>2021-10-13T01:30:00.170+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Configure"/><title type='text'>Regular Updates and Cleaning Kali Linux System</title><content type='html'>&lt;p&gt;Kali Linux is a rolling distribution, that means it continuously updates in all areas of the operating system, including the Linux kernel, the desktop environment, all utilities and all applications. So we need to update it frequently to stay updated always.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-BVNubeMtr5I/YVVUK4Lgs9I/AAAAAAAAF9w/4GzFZwwpQgsQfj0YJpCZBDnAuUytE-T8gCLcBGAsYHQ/s1000/update%2Bthumbnail%2BKali%2BLinux.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;How to update and clean Kali Linux&quot; border=&quot;0&quot; data-original-height=&quot;606&quot; data-original-width=&quot;1000&quot; height=&quot;194&quot; src=&quot;https://1.bp.blogspot.com/-BVNubeMtr5I/YVVUK4Lgs9I/AAAAAAAAF9w/4GzFZwwpQgsQfj0YJpCZBDnAuUytE-T8gCLcBGAsYHQ/w320-h194/update%2Bthumbnail%2BKali%2BLinux.png&quot; title=&quot;How to update and clean Kali Linux&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Not only that, due to update regularly some old packages of applications are kept on our system as a junk. These older files are not so much harmful but they might slow down our system. So we need to clean them on regular basis.&lt;/p&gt;&lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Updating &amp;amp; Upgrading Kali Linux&lt;/span&gt;&lt;/h1&gt;&lt;p&gt;There are various types of updates we can do like normal update, full upgrade, distribution upgrade.&lt;/p&gt;&lt;h2 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Updating Kali Linux &lt;/span&gt;&lt;/h2&gt;&lt;p&gt;Update can be simply done by following command:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code class=&quot;ns&quot; style=&quot;outline: currentcolor none 0px; transition: all 0.3s ease 0s;&quot;&gt;sudo apt update -y&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;The above command will update the package lists for upgrades for packages that need upgrading, as well as new packages that have just come to the Kali Linux repositories. As we can see in the following screenshot:&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-rfEhKrLufLc/YVQJM2_zqxI/AAAAAAAAF9Q/OBoPd9aFhr0lTOB8IDI-PSuSyp9jTunaACLcBGAsYHQ/s632/update.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;update kali linux&quot; border=&quot;0&quot; data-original-height=&quot;239&quot; data-original-width=&quot;632&quot; height=&quot;242&quot; src=&quot;https://1.bp.blogspot.com/-rfEhKrLufLc/YVQJM2_zqxI/AAAAAAAAF9Q/OBoPd9aFhr0lTOB8IDI-PSuSyp9jTunaACLcBGAsYHQ/w640-h242/update.png&quot; title=&quot;update kali linux&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;In the above screenshot we can see that we have already updated our system. One thing to remember that this updates the list of available packages and their versions, but it does not install or upgrade any packages. We can actually install them by using upgrade.&lt;br /&gt;&lt;/p&gt;&lt;h2 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Upgrading Kali Linux&lt;/span&gt;&lt;/h2&gt;&lt;p&gt;Where update updates the list of available packages but didn&#39;t install them, upgrade actually installs newer versions of the packages we have. After updating the lists, the package manager knows about available updates for the software you have installed. That&#39;s why we need to run update before upgrading.&lt;br /&gt;&lt;/p&gt;&lt;p&gt;To upgrading Kali Linux we need to run following command on our Kali Linux system:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code class=&quot;ns&quot; style=&quot;outline: currentcolor none 0px; transition: all 0.3s ease 0s;&quot;&gt;sudo apt upgrade -y&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;As we can see in the following screenshot:&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-qVBHEESXLv0/YVQLTk_XRKI/AAAAAAAAF9Y/ds2S0Lxhr-Y9goHWWAE8mSb8dqorHI-pwCLcBGAsYHQ/s797/upgrade.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;upgrading Kali Linux&quot; border=&quot;0&quot; data-original-height=&quot;370&quot; data-original-width=&quot;797&quot; height=&quot;298&quot; src=&quot;https://1.bp.blogspot.com/-qVBHEESXLv0/YVQLTk_XRKI/AAAAAAAAF9Y/ds2S0Lxhr-Y9goHWWAE8mSb8dqorHI-pwCLcBGAsYHQ/w640-h298/upgrade.png&quot; title=&quot;upgrading Kali Linux&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;In the above screenshot we can see that the upgrade is running. It will take some time depending our internet connection and system performance. Unlike Windows we can cancel it anytime and resume it by applying the same command.&lt;/p&gt;&lt;p&gt;Where &lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;span style=&quot;background-color: black;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;sudo apt upgrade -y&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt; command installs all and doesn&#39;t remove any packages and skips upgrading old packages if removal is needed, &lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;sudo apt full-upgrade -y&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt; command removes old packages if needed to perform the upgrade of packages to their latest versions.&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code class=&quot;ns&quot; style=&quot;outline: currentcolor none 0px; transition: all 0.3s ease 0s;&quot;&gt;sudo apt full-upgrade -y&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;The output of the above command shown in the following screenshot:&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-eCU76VdxqMg/YVQPeRGWjJI/AAAAAAAAF9g/7PtWdt1vxMID3-83m2BzzGExEPm2CAKrgCLcBGAsYHQ/s820/full-upgrade.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;full-upgrade kali linux&quot; border=&quot;0&quot; data-original-height=&quot;228&quot; data-original-width=&quot;820&quot; height=&quot;178&quot; src=&quot;https://1.bp.blogspot.com/-eCU76VdxqMg/YVQPeRGWjJI/AAAAAAAAF9g/7PtWdt1vxMID3-83m2BzzGExEPm2CAKrgCLcBGAsYHQ/w640-h178/full-upgrade.png&quot; title=&quot;full-upgrade kali linux&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;sudo apt full-upgrade can be run after sudo apt update -y command but sudo apt update -y is considered more safe then sudo apt full-upgrade -y command. But anyways don&#39;t panic it doesn&#39;t harm our system badly. To know the very detailed difference in these commands please read &lt;a href=&quot;https://embeddedinventor.com/apt-upgrade-vs-full-upgrade-differences-explained-for-beginners/&quot; target=&quot;_blank&quot;&gt;this article&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;Similar to &lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;sudo apt-get upgrade&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt; command, the &lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;sudo apt-get dist-upgrade&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt; also upgrades the packages. In addition to this, it also handles changing dependencies with the latest versions of the package. It intelligently resolves the conflict among package dependencies and tries to upgrade the most significant packages at the expense of less significant ones, if required. Unlike &lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;sudo apt-get upgrade&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt; command, the &lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;sudo apt-get dist-upgrade&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt; is proactive and it installs new packages or removes existing ones on its own in order to complete the upgrade.&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code class=&quot;ns&quot; style=&quot;outline: currentcolor none 0px; transition: all 0.3s ease 0s;&quot;&gt;sudo apt dist-upgrade -y&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;The above command will upgrade our distribution totally.&lt;/p&gt;&lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Cleaning Kali Linux&lt;/span&gt;&lt;/h1&gt;&lt;p&gt;We can clean our no-longer needed packages by using following command on our Kali Linux terminal:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;sudo apt autoremove -y&lt;/pre&gt;&lt;p&gt;In the following screenshot we can see the output of this command.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-CE9jetNyvpI/YVRnuKx_G1I/AAAAAAAAF9o/Fx3duQAetz8fhSyfDl156EMaQqRjyvJ1gCLcBGAsYHQ/s896/autoclean.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;autoclean&quot; border=&quot;0&quot; data-original-height=&quot;414&quot; data-original-width=&quot;896&quot; height=&quot;296&quot; src=&quot;https://1.bp.blogspot.com/-CE9jetNyvpI/YVRnuKx_G1I/AAAAAAAAF9o/Fx3duQAetz8fhSyfDl156EMaQqRjyvJ1gCLcBGAsYHQ/w640-h296/autoclean.png&quot; title=&quot;autoclean&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;In the above screenshot we can see that 19 MB of our disk space is cleared and some packages are removed. Use of this command is safe and should not cause problems.&lt;/p&gt;&lt;p&gt;Each program update, package files are downloaded to the package cache. After the update, downloaded files (you can call them installation files) are not deleted, and gradually the package cache grows to large sizes. This was done intentionally with the idea that if after the next update you find that the new package has problems and the old version is no longer available in the online repository, then you can roll back to the old version by installing it from a file saved in the package cache.&lt;/p&gt;&lt;p&gt;For rolling distributions, the cache grows very quickly, and if we are not qualified enough to roll back to the old version using the installation package which is stored in the cache, then for you these hundreds of megabytes or even several gigabytes are a waste of space on our hard drive. Therefore, from time to time we can execute following commands:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;sudo apt autoclean -y&lt;/pre&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;sudo apt clean -y&lt;/pre&gt;&lt;p&gt;The &lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;sudo apt clean -y&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt; command cleans the local repository from received package files. It removes everything except the lock file from &lt;i&gt;&lt;b&gt;/var/cache/apt/archives/&lt;/b&gt;&lt;/i&gt; and &lt;i&gt;&lt;b&gt;/var/cache/apt/archives/partial/&lt;/b&gt;&lt;/i&gt;.&lt;/p&gt;&lt;p&gt;Like &lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;sudo apt clean -y&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt; command, &lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;sudo apt autoclean -y&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt; cleans downloaded package files from the local repository. The only difference is that it only removes package files that can no longer be downloaded and are largely useless.&lt;/p&gt;&lt;p&gt;This allows us to maintain the cache for a long period without growing too much.&lt;/p&gt;&lt;p&gt;The following command is not directly related to cleaning, but helps maintain our Kali Linux system health.&lt;br /&gt;&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;sudo apt install -f -y&lt;/pre&gt;&lt;p&gt;The &lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;-f&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt; or &lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;--fix-broken&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt; flag tries to make normal a system by repairing broken dependencies. This option, when used with install/remove, may skip any packages to allow APT to find a likely solution. If packages are listed, this should completely fix the problem.&lt;/p&gt;&lt;p&gt;This is everything to this article, hope now we got a clear idea about &quot;How to update Kali Linux&quot; and &quot;How to clean Kali Linux&quot;.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Love our articles?&lt;/b&gt; Make sure to &lt;b&gt;follow us&lt;/b&gt; on &lt;a class=&quot;d-link&quot; href=&quot;https://twitter.com/KaliLinux_in&quot; target=&quot;_blank&quot;&gt;Twitter&lt;/a&gt; and &lt;a class=&quot;d-link&quot; href=&quot;https://github.com/jaykali&quot; target=&quot;_blank&quot;&gt;GitHub&lt;/a&gt;, we post article updates there. To join our &lt;b&gt;KaliLinuxIn&lt;/b&gt; family, join our &lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;a class=&quot;d-link&quot; href=&quot;https://t.me/kalilinuxin&quot; target=&quot;_blank&quot;&gt;Telegram Group&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;. We are trying to build a community for Linux and Cybersecurity. For anything we always happy to help everyone on the &lt;span style=&quot;color: red;&quot;&gt;comment section&lt;/span&gt;. As we know our comment section is always open to everyone. We read each and every comment and &lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;we always reply&lt;/span&gt;&lt;/b&gt;.&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='https://www.kalilinux.in/feeds/6137352356060027208/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.kalilinux.in/2021/09/how-to-update-and-clean-Kali-Linux.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/6137352356060027208'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/6137352356060027208'/><link rel='alternate' type='text/html' href='https://www.kalilinux.in/2021/09/how-to-update-and-clean-Kali-Linux.html' title='Regular Updates and Cleaning Kali Linux System'/><author><name>Kali Linux</name><uri>http://www.blogger.com/profile/07345541575706459646</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//3.bp.blogspot.com/-Mb3EvSYi1Yg/YOL_LNs2xhI/AAAAAAAAFk4/aghHydKfmagtjPYLvn-SVVNEIJW10TdLACK4BGAYYCw/s113/kali%2Bdragon.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-BVNubeMtr5I/YVVUK4Lgs9I/AAAAAAAAF9w/4GzFZwwpQgsQfj0YJpCZBDnAuUytE-T8gCLcBGAsYHQ/s72-w320-h194-c/update%2Bthumbnail%2BKali%2BLinux.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6091241131056531264.post-2192859702900028242</id><published>2021-10-09T15:30:00.000+05:30</published><updated>2021-10-10T18:06:48.026+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Attack Strategies"/><title type='text'>Best USB WiFi Adapter For Kali Linux 2021 [Updated October]</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div&gt;&lt;div style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Best WiFi Adapter for Kali Linux&lt;/span&gt;&lt;/h1&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;The all new Kali Linux 2021.1 was rolling out and we can simply use it as our primary operating system because of the non-root user. The main benefit of using Kali Linux as primary OS is we got the hardware support. Yes, we can do our all penetration testing jobs with this &lt;b&gt;&lt;u&gt;Kali Linux 2021&lt;/u&gt;&lt;/b&gt;, but to play with wireless networks or WiFi we need some special &lt;b&gt;&lt;u&gt;USB WiFi adapters in Kali&lt;/u&gt;&lt;/b&gt;.&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-9PANS7pDTMU/XxBSZ1ZNEJI/AAAAAAAADEA/jIB7v4LG_yU8XwBts7Wp1tZ_fOd-rS67wCLcBGAsYHQ/s1600/PicsArt_07-16-06.21.19.webp&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Best WiFi Adapter for Kali Linux&quot; border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1431&quot; height=&quot;241&quot; src=&quot;https://1.bp.blogspot.com/-9PANS7pDTMU/XxBSZ1ZNEJI/AAAAAAAADEA/jIB7v4LG_yU8XwBts7Wp1tZ_fOd-rS67wCLcBGAsYHQ/s320/PicsArt_07-16-06.21.19.webp&quot; title=&quot;Best WiFi Adapter for Kali Linux&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Here we have listed some &lt;b&gt;best USB Wireless adapters Kali Linux in 2021&lt;/b&gt;. &lt;b&gt;These WiFi adapters are 100% compatible with Kali Linux and supports monitor mode and packet injection&lt;/b&gt;, which will help a lot in WiFi penetration testing.&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt; &lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Best WiFi Adapter for Kali Linux&lt;/span&gt;&lt;/h1&gt;&lt;/div&gt;&lt;center&gt;&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; style=&quot;break-after: auto; break-before: auto; break-inside: auto;&quot;&gt; &lt;colgroup&gt;&lt;col width=&quot;43&quot;&gt;&lt;/col&gt; &lt;col width=&quot;179&quot;&gt;&lt;/col&gt; &lt;col width=&quot;102&quot;&gt;&lt;/col&gt; &lt;col width=&quot;228&quot;&gt;&lt;/col&gt; &lt;col width=&quot;144&quot;&gt;&lt;/col&gt; &lt;/colgroup&gt;&lt;tbody&gt;&lt;tr&gt; &lt;td bgcolor=&quot;&quot; style=&quot;border: medium none; padding: 0in;&quot; width=&quot;43&quot;&gt;&lt;div align=&quot;center&quot; style=&quot;font-style: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; font-variant: normal; text-decoration: none;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;u&gt;&lt;b&gt;Sl No.&lt;/b&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt; &lt;td bgcolor=&quot;&quot; style=&quot;border: medium none; padding: 0in;&quot; width=&quot;179&quot;&gt;&lt;div align=&quot;center&quot; style=&quot;font-style: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; font-variant: normal; text-decoration: none;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;u&gt;&lt;b&gt;WiFi Adapter&lt;/b&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt; &lt;td bgcolor=&quot;&quot; style=&quot;border: medium none; padding: 0in;&quot; width=&quot;102&quot;&gt;&lt;div align=&quot;center&quot; style=&quot;font-style: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; font-variant: normal; text-decoration: none;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;u&gt;&lt;b&gt;Chipset&lt;/b&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt; &lt;td bgcolor=&quot;&quot; style=&quot;border: medium none; padding: 0in;&quot; width=&quot;228&quot;&gt;&lt;div align=&quot;center&quot; style=&quot;font-style: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; font-variant: normal; text-decoration: none;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;u&gt;&lt;b&gt;Best for&lt;/b&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt; &lt;td bgcolor=&quot;&quot; style=&quot;border: medium none; padding: 0in;&quot; width=&quot;144&quot;&gt;&lt;div align=&quot;center&quot; style=&quot;font-style: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; font-variant: normal; text-decoration: none;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;u&gt;&lt;b&gt;Buy&lt;/b&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt; &lt;/tr&gt;&lt;tr&gt; &lt;td style=&quot;border: medium none; padding: 0in;&quot; width=&quot;43&quot;&gt;&lt;div align=&quot;center&quot; style=&quot;font-style: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; font-variant: normal; font-weight: normal; text-decoration: none;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;1&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt; &lt;td style=&quot;border: medium none; padding: 0in;&quot; width=&quot;179&quot;&gt;&lt;div align=&quot;center&quot; style=&quot;font-style: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; font-variant: normal; font-weight: normal; text-decoration: none;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;https://amzn.to/31SCCf1&quot; target=&quot;_blank&quot;&gt;Alfa AWUS036NH&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt; &lt;td style=&quot;border: medium none; padding: 0in;&quot; width=&quot;102&quot;&gt;&lt;div align=&quot;center&quot; style=&quot;font-style: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; font-variant: normal; font-weight: normal; text-decoration: none;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;AR9271&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt; &lt;td bgcolor=&quot;&quot; style=&quot;border: medium none; padding: 0in;&quot; width=&quot;228&quot;&gt;&lt;div align=&quot;center&quot; style=&quot;font-style: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; font-variant: normal; font-weight: normal; text-decoration: none;&quot;&gt;&lt;div align=&quot;center&quot; style=&quot;font-style: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; font-variant: normal; font-weight: normal; text-decoration: none;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Good Old Friend&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/td&gt; &lt;td style=&quot;border: medium none; padding: 0in;&quot; width=&quot;144&quot;&gt;&lt;div align=&quot;center&quot; style=&quot;font-style: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; font-variant: normal; font-weight: normal; text-decoration: none;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;https://amzn.to/31SCCf1&quot; target=&quot;_blank&quot;&gt;Buy on Amazon&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt; &lt;/tr&gt;&lt;tr&gt; &lt;td bgcolor=&quot;&quot; style=&quot;border: medium none; padding: 0in;&quot; width=&quot;43&quot;&gt;&lt;div align=&quot;center&quot; style=&quot;font-style: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; font-variant: normal; font-weight: normal; text-decoration: none;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;2&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt; &lt;td bgcolor=&quot;&quot; style=&quot;border: medium none; padding: 0in;&quot; width=&quot;179&quot;&gt;&lt;div align=&quot;center&quot; style=&quot;font-style: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; font-variant: normal; font-weight: normal; text-decoration: none;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;https://amzn.to/3hSZ8tX&quot; target=&quot;_blank&quot;&gt;Alfa AWUS036NHA&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt; &lt;td bgcolor=&quot;&quot; style=&quot;border: medium none; padding: 0in;&quot; width=&quot;102&quot;&gt;&lt;div align=&quot;center&quot; style=&quot;font-style: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; font-variant: normal; font-weight: normal; text-decoration: none;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;RT 3070&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt; &lt;td bgcolor=&quot;&quot; style=&quot;border: medium none; padding: 0in;&quot; width=&quot;228&quot;&gt;&lt;div align=&quot;center&quot; style=&quot;font-style: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; font-variant: normal; font-weight: normal; text-decoration: none;&quot;&gt;&lt;div align=&quot;center&quot; style=&quot;font-style: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; font-variant: normal; font-weight: normal; text-decoration: none;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Best in it’s Price Range&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/td&gt; &lt;td bgcolor=&quot;&quot; style=&quot;border: medium none; padding: 0in;&quot; width=&quot;144&quot;&gt;&lt;div align=&quot;center&quot; style=&quot;font-style: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; font-variant: normal; font-weight: normal; text-decoration: none;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;https://amzn.to/3hSZ8tX&quot; target=&quot;_blank&quot;&gt;Buy on Amazon&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt; &lt;/tr&gt;&lt;tr&gt; &lt;td height=&quot;43&quot; style=&quot;border: medium none; padding: 0in;&quot; width=&quot;43&quot;&gt;&lt;div align=&quot;center&quot; style=&quot;font-style: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; font-variant: normal; font-weight: normal; text-decoration: none;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;3&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt; &lt;td style=&quot;border: medium none; padding: 0in;&quot; width=&quot;179&quot;&gt;&lt;div align=&quot;center&quot; style=&quot;font-style: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; font-variant: normal; font-weight: normal; text-decoration: none;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;https://amzn.to/3lN5tJu&quot; target=&quot;_blank&quot;&gt;Alfa AWUS036NEH&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt; &lt;td style=&quot;border: medium none; padding: 0in;&quot; width=&quot;102&quot;&gt;&lt;div align=&quot;center&quot; style=&quot;font-style: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; font-variant: normal; font-weight: normal; text-decoration: none;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;RT 3070&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt; &lt;td style=&quot;border: medium none; padding: 0in;&quot; width=&quot;228&quot;&gt;&lt;div align=&quot;center&quot; style=&quot;font-style: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; font-variant: normal; font-weight: normal; text-decoration: none;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Compact and Portable&lt;/span&gt;&lt;/div&gt;&lt;/td&gt; &lt;td style=&quot;border: medium none; padding: 0in;&quot; width=&quot;144&quot;&gt;&lt;div align=&quot;center&quot; style=&quot;font-style: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; font-variant: normal; font-weight: normal; text-decoration: none;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;https://amzn.to/3lN5tJu&quot; target=&quot;_blank&quot;&gt;Buy on Amazon&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt; &lt;/tr&gt;&lt;tr&gt; &lt;td bgcolor=&quot;&quot; style=&quot;border: medium none; padding: 0in;&quot; width=&quot;43&quot;&gt;&lt;div align=&quot;center&quot; style=&quot;font-style: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; font-variant: normal; font-weight: normal; text-decoration: none;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;4&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt; &lt;td bgcolor=&quot;&quot; style=&quot;border: medium none; padding: 0in;&quot; width=&quot;179&quot;&gt;&lt;div align=&quot;center&quot; style=&quot;font-style: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; font-variant: normal; font-weight: normal; text-decoration: none;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;https://amzn.to/3bkwW0m&quot; target=&quot;_blank&quot;&gt;Panda PAU09 N600&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt; &lt;td bgcolor=&quot;&quot; style=&quot;border: medium none; padding: 0in;&quot; width=&quot;102&quot;&gt;&lt;div align=&quot;center&quot; style=&quot;font-style: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; font-variant: normal; font-weight: normal; text-decoration: none;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;RT 5572&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt; &lt;td bgcolor=&quot;&quot; style=&quot;border: medium none; padding: 0in;&quot; width=&quot;228&quot;&gt;&lt;div align=&quot;center&quot; style=&quot;font-style: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; font-variant: normal; font-weight: normal; text-decoration: none;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Stylish for the Beginners&lt;/span&gt;&lt;/div&gt;&lt;/td&gt; &lt;td bgcolor=&quot;&quot; style=&quot;border: medium none; padding: 0in;&quot; width=&quot;144&quot;&gt;&lt;div align=&quot;center&quot; style=&quot;font-style: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; font-variant: normal; font-weight: normal; text-decoration: none;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;https://amzn.to/3bkwW0m&quot; target=&quot;_blank&quot;&gt;Buy on Amazon&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt; &lt;/tr&gt;&lt;tr&gt; &lt;td style=&quot;border: medium none; padding: 0in;&quot; width=&quot;43&quot;&gt;&lt;div align=&quot;center&quot; style=&quot;font-style: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; font-variant: normal; font-weight: normal; text-decoration: none;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;5&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt; &lt;td style=&quot;border: medium none; padding: 0in;&quot; width=&quot;179&quot;&gt;&lt;div align=&quot;center&quot; style=&quot;font-style: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; font-variant: normal; font-weight: normal; text-decoration: none;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;https://amzn.to/31QzxMt&quot; target=&quot;_blank&quot;&gt;Alfa AWUS036ACH&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt; &lt;td style=&quot;border: medium none; padding: 0in;&quot; width=&quot;102&quot;&gt;&lt;div align=&quot;center&quot; style=&quot;font-style: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; font-variant: normal; font-weight: normal; text-decoration: none;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;RTL8812AU&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt; &lt;td style=&quot;border: medium none; padding: 0in;&quot; width=&quot;228&quot;&gt;&lt;div align=&quot;center&quot; style=&quot;font-style: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; font-variant: normal; font-weight: normal; text-decoration: none;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Smart Look &amp;amp; Advanced&lt;/span&gt;&lt;/div&gt;&lt;/td&gt; &lt;td style=&quot;border: medium none; padding: 0in;&quot; width=&quot;144&quot;&gt;&lt;div align=&quot;center&quot; style=&quot;font-style: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; font-variant: normal; font-weight: normal; text-decoration: none;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;https://amzn.to/31QzxMt&quot; target=&quot;_blank&quot;&gt;Buy on Amazon&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt; &lt;/tr&gt;&lt;tr&gt; &lt;td bgcolor=&quot;&quot; height=&quot;23&quot; style=&quot;border: medium none; padding: 0in;&quot; width=&quot;43&quot;&gt;&lt;div align=&quot;center&quot; style=&quot;font-style: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; font-variant: normal; font-weight: normal; text-decoration: none;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;6&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt; &lt;td bgcolor=&quot;&quot; style=&quot;border: medium none; padding: 0in;&quot; width=&quot;179&quot;&gt;&lt;div align=&quot;center&quot; style=&quot;font-style: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; font-variant: normal; font-weight: normal; text-decoration: none;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;https://amzn.to/2QNqCoC&quot; target=&quot;_blank&quot;&gt;Alfa AC1900&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt; &lt;td bgcolor=&quot;&quot; style=&quot;border: medium none; padding: 0in;&quot; width=&quot;102&quot;&gt;&lt;div align=&quot;center&quot; style=&quot;font-style: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; font-variant: normal; font-weight: normal; text-decoration: none;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;RTL8814AU&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt; &lt;td bgcolor=&quot;&quot; style=&quot;border: medium none; padding: 0in;&quot; width=&quot;228&quot;&gt;&lt;div align=&quot;center&quot; style=&quot;font-style: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; font-variant: normal; font-weight: normal; text-decoration: none;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Powerful &amp;amp; Premium&lt;/span&gt;&lt;/div&gt;&lt;/td&gt; &lt;td bgcolor=&quot;&quot; style=&quot;border: medium none; padding: 0in;&quot; width=&quot;144&quot;&gt;&lt;div align=&quot;center&quot; style=&quot;font-style: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; font-variant: normal; font-weight: normal; text-decoration: none;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;https://amzn.to/2QNqCoC&quot; target=&quot;_blank&quot;&gt;Buy on Amazon&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt; &lt;/tr&gt;&lt;tr&gt; &lt;td style=&quot;border: medium none; padding: 0in;&quot; width=&quot;43&quot;&gt;&lt;div align=&quot;center&quot; style=&quot;font-style: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; font-variant: normal; font-weight: normal; text-decoration: none;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;7&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt; &lt;td style=&quot;border: medium none; padding: 0in;&quot; width=&quot;179&quot;&gt;&lt;div align=&quot;center&quot; style=&quot;font-style: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; font-variant: normal; font-weight: normal; text-decoration: none;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;https://amzn.to/3wLI0Om&quot; target=&quot;_blank&quot;&gt;Panda PAU 06&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt; &lt;td style=&quot;border: medium none; padding: 0in;&quot; width=&quot;102&quot;&gt;&lt;div align=&quot;center&quot; style=&quot;font-style: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; font-variant: normal; font-weight: normal; text-decoration: none;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;RT5372&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt; &lt;td bgcolor=&quot;&quot; style=&quot;border: medium none; padding: 0in;&quot; width=&quot;228&quot;&gt;&lt;div align=&quot;center&quot; style=&quot;font-style: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; font-variant: normal; font-weight: normal; text-decoration: none;&quot;&gt;&lt;div align=&quot;center&quot; style=&quot;font-style: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; font-variant: normal; font-weight: normal; text-decoration: none;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Chip, Single Band&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/td&gt; &lt;td style=&quot;border: medium none; padding: 0in;&quot; width=&quot;144&quot;&gt;&lt;div align=&quot;center&quot; style=&quot;font-style: normal; font-variant-caps: normal; font-variant-east-asian: normal; font-variant-ligatures: normal; font-variant-position: normal; font-variant: normal; font-weight: normal; text-decoration: none;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;a href=&quot;https://amzn.to/3wLI0Om&quot; target=&quot;_blank&quot;&gt;Buy on Amazon&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/td&gt; &lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;/center&gt;&lt;br /&gt;&lt;div style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;h2 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Alfa AWUS036NH&lt;/span&gt;&lt;/h2&gt;We are using this USB WiFi adapter from the &lt;a href=&quot;https://www.backtrack-linux.org/&quot; target=&quot;_blank&quot;&gt;BackTrack&lt;/a&gt; days (before releasing Kali Linux) and still we consider it as one of the best. For it’s long range signals we can do our penetration testing jobs from a long distance.&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://www.amazon.com/Alfa-AWUS036NH-802-11g-Wireless-Long-Range/dp/B003YIFHJY/ref=as_li_ss_tl?dchild=1&amp;amp;keywords=Alfa+AWUS036NHA&amp;amp;qid=1594882122&amp;amp;sr=8-6&amp;amp;linkCode=ll1&amp;amp;tag=adaptercart-20&amp;amp;linkId=2f09cf7cc9b84fcd2be61c590af1d25c&amp;amp;language=en_US&quot; target=&quot;_blank&quot;&gt;&lt;span id=&quot;goog_529399830&quot;&gt;&lt;/span&gt;&lt;img alt=&quot;Alfa AWUS036NHA Kali Linux WiFi Adapter 2020&quot; border=&quot;0&quot; data-original-height=&quot;1193&quot; data-original-width=&quot;946&quot; height=&quot;320&quot; src=&quot;https://1.bp.blogspot.com/-lKYbQubgvfU/Xw_3_taZZ-I/AAAAAAAADCk/4x9aB_LBgdspr8uvNF6tTbpPVCB3ncS4gCLcBGAsYHQ/s320/Alfa%2BAWUS036NHA.jpg&quot; title=&quot;Alfa AWUS036NHA Kali Linux WiFi Adapter 2020&quot; width=&quot;253&quot; /&gt;&lt;/a&gt;&lt;span id=&quot;goog_529399831&quot;&gt;&lt;/span&gt;&lt;/div&gt;Alfa AWUS036NH is plug and play and compatible with any brand 802.11g or 802.11n router using 2.4 GHz wavelength and supports multi-stream &amp;amp; MIMO (multiple input multiple output) with high speed transfer TX data rate up to 150 MBPS. It also comes with a clip which can be used to attach this adapter on a laptop lid.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;/ul&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Chipset: Atheros AR 9271.&lt;/li&gt;&lt;li&gt;Compatible with any brand 802.11b, 802.11g or 802.11n router using 2.4 Ghz wave-length.&lt;/li&gt;&lt;li&gt;Includes a 5 dBi omni directional antenna as well as a 7 dbi panel antenna.&lt;/li&gt;&lt;li&gt;Supports security protocols: 64/128-bit WEP, WPA, WPA2, TKIP, AES.&lt;/li&gt;&lt;li&gt;Compatible with Kali Linux RPi with monitor mode and packet injection.&lt;/li&gt;&lt;li&gt;High transmitter power of 28 dBm - for long-rang and high gain WiFi.&lt;/li&gt;&lt;/ol&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;/ul&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://amzn.to/31SCCf1&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;https://www.amazon.com/Alfa-AWUS036NH-802-11g-Wireless-Long-Range/dp/B003YIFHJY/ref=as_li_ss_tl?dchild=1&amp;amp;keywords=Alfa+AWUS036NHA&amp;amp;qid=1594882122&amp;amp;sr=8-6&amp;amp;linkCode=ll1&amp;amp;tag=adaptercart-20&amp;amp;linkId=2f09cf7cc9b84fcd2be61c590af1d25c&amp;amp;language=en_US&quot; border=&quot;0&quot; data-original-height=&quot;326&quot; data-original-width=&quot;820&quot; height=&quot;79&quot; src=&quot;https://1.bp.blogspot.com/-hQuSkq1R5LQ/XxBAuCZT0fI/AAAAAAAADDs/99rYqXaWca4LJiBrOOV6st1o74C8gdTJgCPcBGAYYCw/s200/1594900524777.webp&quot; width=&quot;200&quot; /&gt;&lt;span id=&quot;goog_1516118831&quot;&gt;&lt;/span&gt;&lt;/a&gt;&lt;span id=&quot;goog_1516118832&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;h2 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Alfa AWUS036NHA&lt;/span&gt;&lt;/h2&gt;Alfa again. Alfa provides the best WiFi adapters for Kali Linux. This adapter is the older version of Alfa AWUS036NH with Ralink RT3070 chipset. AWUS036NHA is the IEEE 802.11b/g/n Wireless USB adapter with 150 Mbps speed This is also compatible with IEEE 802.11b/g wireless devices at 54 Mbps.&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://www.amazon.com/Alfa-AWUS036NHA-High-Wireless-Adaptor/dp/B004YD7UBQ/ref=as_li_ss_tl?dchild=1&amp;amp;keywords=Alfa+AWUS036NHa&amp;amp;qid=1594905721&amp;amp;sr=8-4&amp;amp;linkCode=ll1&amp;amp;tag=adaptercart-20&amp;amp;linkId=14757bfa0204052265ec565a6a1fbb71&amp;amp;language=en_US&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;Alfa AWUS036NH Kali Linux WiFi Adapter 2020&quot; border=&quot;0&quot; data-original-height=&quot;466&quot; data-original-width=&quot;466&quot; height=&quot;320&quot; src=&quot;https://1.bp.blogspot.com/-U3mL4L3qG7k/Xw_48NCFbeI/AAAAAAAADCs/HhOzR6Pwsk8wc5M4kC3X0ntTspT44Ch6QCLcBGAsYHQ/s320/Alfa%2BAWUS036NH.jpg&quot; title=&quot;Alfa AWUS036NH Kali Linux WiFi Adapter 2020&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;This plug and play WiFi adapter supports monitor mode and packet injection in any Linux distribution and Kali Linux. Alfa AWUS036NHA comes with a 4 inch 5 dBi screw-on swivel rubber antenna that can be removed and upgrade up to 9 dBi.&lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;/ul&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Chipset: Ralink RT 3070.&lt;/li&gt;&lt;li&gt;Comes with a 5 dBi omni directional antenna as well as a 7 dBi panel antenna.&lt;/li&gt;&lt;li&gt;Supports security protocols: 64/128-bit wep, wpa, wpa2, tkip, aes&lt;/li&gt;&lt;li&gt;Compatible with Kali Linux (Also in Raspberry Pi) with monitor mode and packet injection.&lt;/li&gt;&lt;/ol&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;/ul&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://amzn.to/3hSZ8tX&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;https://www.amazon.com/Alfa-AWUS036NH-802-11g-Wireless-Long-Range/dp/B003YIFHJY/ref=as_li_ss_tl?dchild=1&amp;amp;keywords=Alfa+AWUS036NH&amp;amp;qid=1594870855&amp;amp;s=amazon-devices&amp;amp;sr=8-1&amp;amp;linkCode=ll1&amp;amp;tag=adaptercart-20&amp;amp;linkId=4c49c0097d6157190cf04122e27714ed&amp;amp;language=en_US&quot; border=&quot;0&quot; data-original-height=&quot;326&quot; data-original-width=&quot;820&quot; height=&quot;79&quot; src=&quot;https://1.bp.blogspot.com/-hQuSkq1R5LQ/XxBAuCZT0fI/AAAAAAAADDw/erd1yJPsgf0g9qUSYvhBhHLcYuNYbCyZACPcBGAYYCw/s200/1594900524777.webp&quot; width=&quot;200&quot; /&gt;&lt;span id=&quot;goog_1516118885&quot;&gt;&lt;/span&gt;&lt;/a&gt;&lt;span id=&quot;goog_1516118886&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;h2 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Alfa AWUS036NEH&lt;/span&gt;&lt;/h2&gt;This Alfa WiFi Adapter is compact and tiny, but it has a good range. It supports plug and play so connect it with Kali Linux machine and start playing with WiFi security. The antenna is detachable and makes it very portable. We have used this to build our portable hacking machine with Raspberry Pi and Kali Linux.&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://www.amazon.com/AWUS036NEH-Range-WIRELESS-802-11b-USBAdapter/dp/B0035OCVO6/ref=as_li_ss_tl?dchild=1&amp;amp;keywords=Alfa+AWUS036NEH&amp;amp;qid=1594870918&amp;amp;sr=8-3&amp;amp;linkCode=ll1&amp;amp;tag=adaptercart-20&amp;amp;linkId=c6578f6fb090f86f9ee8917afba3199a&amp;amp;language=en_US&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;Alfa AWUS036NEH Kali Linux WiFi Adpater 2020&quot; border=&quot;0&quot; data-original-height=&quot;1482&quot; data-original-width=&quot;811&quot; height=&quot;320&quot; src=&quot;https://1.bp.blogspot.com/-C99qW5id8Nc/Xw_5VwkGjRI/AAAAAAAADC0/G9A5PvFOTLkkMbeL2_h8fiBm5rwl6Vc2QCLcBGAsYHQ/s320/Alfa%2BAWUS036NEH.jpg&quot; title=&quot;Alfa AWUS036NEH Kali Linux WiFi Adpater 2020&quot; width=&quot;175&quot; /&gt;&lt;span id=&quot;goog_1516118899&quot;&gt;&lt;/span&gt;&lt;/a&gt;&lt;span id=&quot;goog_1516118900&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;Alfa AWUS036NEH is the ultimate solution for going out and red teaming attacks. The long high gain WiFi antenna will give us enough range to capture even low signal wireless networks. This adapter is slim and doesn&#39;t require a USB cable to use.&lt;span&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;/ul&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Chipset: Ralink RT 3070.&lt;/li&gt;&lt;li&gt;Supports monitor mode and packet injection on Kali Linux and Parrot Security on RPi.&lt;/li&gt;&lt;li&gt;Compact and portable.&lt;/li&gt;&lt;/ol&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;/ul&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://amzn.to/3lN5tJu&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;https://www.amazon.com/AWUS036NEH-Range-WIRELESS-802-11b-USBAdapter/dp/B0035OCVO6/ref=as_li_ss_tl?dchild=1&amp;amp;keywords=Alfa+AWUS036NEH&amp;amp;qid=1594870918&amp;amp;sr=8-3&amp;amp;linkCode=ll1&amp;amp;tag=adaptercart-20&amp;amp;linkId=c6578f6fb090f86f9ee8917afba3199a&amp;amp;language=en_US&quot; border=&quot;0&quot; data-original-height=&quot;326&quot; data-original-width=&quot;820&quot; height=&quot;79&quot; src=&quot;https://1.bp.blogspot.com/-hQuSkq1R5LQ/XxBAuCZT0fI/AAAAAAAADDw/erd1yJPsgf0g9qUSYvhBhHLcYuNYbCyZACPcBGAYYCw/s200/1594900524777.webp&quot; width=&quot;200&quot; /&gt;&lt;span id=&quot;goog_1516118908&quot;&gt;&lt;/span&gt;&lt;/a&gt;&lt;span id=&quot;goog_1516118909&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;h2 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Panda PAU09 N600&lt;/span&gt;&lt;/h2&gt;Besides Alfa, Panda is also a good brand for WiFi adapters with monitor mode. Panda PAU09 is a good WiFi adapter to buy in 2020. This dual-band plug &amp;amp; play adapter is able to attack both 2.4 GHz as well as 5 GHz 802.11 ac/b/g/n WiFi networks.&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://www.amazon.com/Panda-Wireless-PAU09-Adapter-Antennas/dp/B01LY35HGO/ref=as_li_ss_tl?dchild=1&amp;amp;keywords=Panda+PAU09&amp;amp;qid=1594870963&amp;amp;sr=8-1-spons&amp;amp;psc=1&amp;amp;spLa=ZW5jcnlwdGVkUXVhbGlmaWVyPUEzRUUwQjNVSkNGMEFIJmVuY3J5cHRlZElkPUEwODkwNzI3MkZHWUFNUTBRMlRTQSZlbmNyeXB0ZWRBZElkPUEwNzkxNzgzMTBaUEdDS05IUzdDTSZ3aWRnZXROYW1lPXNwX2F0ZiZhY3Rpb249Y2xpY2tSZWRpcmVjdCZkb05vdExvZ0NsaWNrPXRydWU=&amp;amp;linkCode=ll1&amp;amp;tag=adaptercart-20&amp;amp;linkId=d9d43db491c7cf14863cc99c1b8b7797&amp;amp;language=en_US&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;Panda PAU09 WiFi adapter for monitor mode&quot; border=&quot;0&quot; data-original-height=&quot;1500&quot; data-original-width=&quot;1370&quot; height=&quot;320&quot; src=&quot;https://1.bp.blogspot.com/-cW7eApSeLrc/Xw_6TbK6D3I/AAAAAAAADDA/NpOdOkEB6CcJoYybHsfGZ15iKVfSTddEgCLcBGAsYHQ/s320/Panda%2BPau09.webp&quot; title=&quot;Panda PAU09 WiFi adapter for monitor mode&quot; width=&quot;292&quot; /&gt;&lt;/a&gt;&lt;/div&gt;This adapter comes with a USB docker and dual antennas, which looks really cool. It is also detachable into smaller parts. This adapter is reliable even on USB 3 and works great and fully supports both monitor mode and injection which is rare on a dual band wireless card out of the box.&lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;/ul&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Chipset: Ralink RT5572.&lt;/li&gt;&lt;li&gt;Supports monitor mode and packet injection on Kali Linux, Parrot Security even in RPi.&lt;/li&gt;&lt;li&gt;2 x 5dBi antenna.&lt;/li&gt;&lt;li&gt;It comes with a USB stand with a 5 feet cable.&lt;/li&gt;&lt;li&gt;Little bit of heating issue (not so much).&lt;/li&gt;&lt;/ol&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;/ul&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://amzn.to/3bkwW0m&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;https://www.amazon.com/Panda-Wireless-PAU09-Adapter-Antennas/dp/B01LY35HGO/ref=as_li_ss_tl?dchild=1&amp;amp;keywords=Panda+PAU09&amp;amp;qid=1594870963&amp;amp;sr=8-1-spons&amp;amp;psc=1&amp;amp;spLa=ZW5jcnlwdGVkUXVhbGlmaWVyPUEzRUUwQjNVSkNGMEFIJmVuY3J5cHRlZElkPUEwODkwNzI3MkZHWUFNUTBRMlRTQSZlbmNyeXB0ZWRBZElkPUEwNzkxNzgzMTBaUEdDS05IUzdDTSZ3aWRnZXROYW1lPXNwX2F0ZiZhY3Rpb249Y2xpY2tSZWRpcmVjdCZkb05vdExvZ0NsaWNrPXRydWU=&amp;amp;linkCode=ll1&amp;amp;tag=adaptercart-20&amp;amp;linkId=d9d43db491c7cf14863cc99c1b8b7797&amp;amp;language=en_US&quot; border=&quot;0&quot; data-original-height=&quot;326&quot; data-original-width=&quot;820&quot; height=&quot;79&quot; src=&quot;https://1.bp.blogspot.com/-hQuSkq1R5LQ/XxBAuCZT0fI/AAAAAAAADDw/erd1yJPsgf0g9qUSYvhBhHLcYuNYbCyZACPcBGAYYCw/s200/1594900524777.webp&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;h2 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Alfa AWUS036ACH / AC1200&lt;/span&gt;&lt;/h2&gt;In &lt;a href=&quot;https://www.kali.org/news/kali-linux-20171-release/&quot; target=&quot;_blank&quot;&gt;Kali Linux 2017.1&lt;/a&gt; update Kali Linux was released a significant update – support for RTL8812AU wireless chipset. Now Alfa AWUS036ACH is a BEAST. This is a premium WiFi adapter used by hackers and penetration testers. It comes with dual antennas and dual band technology (2.4 GHz 300 Mbps/5 GHz 867 Mbps) supports 802.11ac and a, b, g, n.&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://www.amazon.com/Alfa-Long-Range-Dual-Band-Wireless-External/dp/B00VEEBOPG/ref=as_li_ss_tl?dchild=1&amp;amp;keywords=Alfa+AWUS036ACH&amp;amp;qid=1594871102&amp;amp;sr=8-3&amp;amp;linkCode=ll1&amp;amp;tag=adaptercart-20&amp;amp;linkId=928256b6b245a63277f865d406f44c02&amp;amp;language=en_US&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;Alfa AWUS036ACH WiFi adapter for Kali Linux&quot; border=&quot;0&quot; data-original-height=&quot;1500&quot; data-original-width=&quot;869&quot; height=&quot;320&quot; src=&quot;https://1.bp.blogspot.com/-ABj-fkEVSAA/Xw_6zg5TUSI/AAAAAAAADDI/dwz3IsZkXX8mPUI9NTTxXPJ9LeYpBuZsgCLcBGAsYHQ/s320/Alfa%2BAWUS036ACH.webp&quot; title=&quot;Alfa AWUS036ACH WiFi adapter for Kali Linux&quot; width=&quot;185&quot; /&gt;&lt;span id=&quot;goog_1516118937&quot;&gt;&lt;/span&gt;&lt;/a&gt;&lt;span id=&quot;goog_1516118938&quot;&gt;&lt;/span&gt;&lt;/div&gt;These antennas are removable and if we require higher range, then we can connect an antenna with greater dbi value and use it as a long range WiFi link which makes this one of the best WiFi adapters. Also this adapter has an awesome look.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;If budget is not an issue&lt;/b&gt; then this adapter is highly recommended.&lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;/ul&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Chipset: RealTek RTL8812AU.&lt;/li&gt;&lt;li&gt;Dual-band: 2.4 GHz and 5 GHz.&lt;/li&gt;&lt;li&gt;Supports both monitor mode &amp;amp; packet injection on dual band.&lt;/li&gt;&lt;li&gt;Premium quality with high price tag.&lt;/li&gt;&lt;/ol&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;/ul&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://amzn.to/31QzxMt&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;https://www.amazon.com/Alfa-Long-Range-Dual-Band-Wireless-External/dp/B00VEEBOPG/ref=as_li_ss_tl?dchild=1&amp;amp;keywords=Alfa+AWUS036ACH&amp;amp;qid=1594871102&amp;amp;sr=8-3&amp;amp;linkCode=ll1&amp;amp;tag=adaptercart-20&amp;amp;linkId=928256b6b245a63277f865d406f44c02&amp;amp;language=en_US&quot; border=&quot;0&quot; data-original-height=&quot;326&quot; data-original-width=&quot;820&quot; height=&quot;79&quot; src=&quot;https://1.bp.blogspot.com/-hQuSkq1R5LQ/XxBAuCZT0fI/AAAAAAAADDw/erd1yJPsgf0g9qUSYvhBhHLcYuNYbCyZACPcBGAYYCw/s200/1594900524777.webp&quot; width=&quot;200&quot; /&gt;&lt;span id=&quot;goog_1516118946&quot;&gt;&lt;/span&gt;&lt;/a&gt;&lt;span id=&quot;goog_1516118947&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;h2 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Alfa AWUS1900 / AC1900&lt;/span&gt;&lt;/h2&gt;Now this is the beast, then why is it at last? It is last because of its high price range. But the price is totally worth it for this USB WiFi adapter. If the previous adapter was a beast then it is a monster. Alfa AWUS1900 has high-gain quad antenna that covers a really long range (500 ft in an open area). &lt;br /&gt;&lt;br /&gt;This is a dual band WiFi adapter with high speed capability 2.4GHz [up to 600Mbps] &amp;amp; 5GHz [up to 1300Mbps]. It also has a USB 3.0 interface.&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://www.amazon.com/Alfa-AC1900-WiFi-Adapter-Long-Range/dp/B01MZD7Z76/ref=as_li_ss_tl?dchild=1&amp;amp;keywords=Alfa+AWUS036ACH&amp;amp;qid=1594871169&amp;amp;sr=8-4&amp;amp;linkCode=ll1&amp;amp;tag=adaptercart-20&amp;amp;linkId=d62c81825eace1b0f09d0762e84881c4&amp;amp;language=en_US&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;Alfa AWUS036ACH The best wifi adapter for hacking in Kali Linux&quot; border=&quot;0&quot; data-original-height=&quot;1500&quot; data-original-width=&quot;950&quot; height=&quot;320&quot; src=&quot;https://1.bp.blogspot.com/-0tDzSpHhBRk/Xw_7cWoLoJI/AAAAAAAADDQ/TW07YK6Xv8ADWuSh3Zxroy1KFLpCs42MwCLcBGAsYHQ/s320/Alfa%2BAC1900.webp&quot; title=&quot;Alfa AWUS036ACH The best wifi adapter for hacking in Kali Linux&quot; width=&quot;202&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Monitor mode and packet injection supported with both bands and it will be very useful for serious penetration testers. We also can attach this on our laptop display with it’s screen clip provided with the box.&lt;br /&gt;&lt;h4&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;&lt;b&gt;What we got in the box?&lt;/b&gt;&lt;/span&gt;&lt;/h4&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;1 x AWUS1900 Wi-Fi Adapter&lt;/li&gt;&lt;li&gt;4 x Dual-band antennas&lt;/li&gt;&lt;li&gt;1 x USB 3.0 cable&lt;/li&gt;&lt;li&gt;1 x Screen clip&lt;/li&gt;&lt;li&gt;1 x Installation DVD-Rom (doesn’t require on Kali Linux. Plug&amp;amp;Play)&lt;/li&gt;&lt;li&gt;A consistent solution for network congestion!&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;/ul&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Chipset: RealTek RTL8814AU.&lt;/li&gt;&lt;li&gt;Dual-band: 2.4 GHz and 5 GHz.&lt;/li&gt;&lt;li&gt;Supports both monitor mode &amp;amp; packet injection on dual band.&lt;/li&gt;&lt;li&gt;Premium quality with high price tag.&lt;/li&gt;&lt;li&gt;Very long range.&lt;span&gt;&lt;!--more--&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ol&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;/ul&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://amzn.to/2QNqCoC&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;https://www.amazon.com/Alfa-AC1900-WiFi-Adapter-Long-Range/dp/B01MZD7Z76/ref=as_li_ss_tl?dchild=1&amp;amp;keywords=Alfa+AWUS036ACH&amp;amp;qid=1594871169&amp;amp;sr=8-4&amp;amp;linkCode=ll1&amp;amp;tag=adaptercart-20&amp;amp;linkId=d62c81825eace1b0f09d0762e84881c4&amp;amp;language=en_US&quot; border=&quot;0&quot; data-original-height=&quot;326&quot; data-original-width=&quot;820&quot; height=&quot;79&quot; src=&quot;https://1.bp.blogspot.com/-hQuSkq1R5LQ/XxBAuCZT0fI/AAAAAAAADDw/erd1yJPsgf0g9qUSYvhBhHLcYuNYbCyZACPcBGAYYCw/s200/1594900524777.webp&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;h2 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Panda PAU 06&lt;/span&gt;&lt;/h2&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;Yes, This low cost Panda PAU 06 WiFi adapter supports Monitor Mode and Packet Injections. But we really &lt;b&gt;don&#39;t suggest&lt;/b&gt; to buy this adapter if budget is not an issue.&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-vJfxUajNDXE/YHL5m1gISvI/AAAAAAAAFGA/C0jj6IRMAG4qV-QNdQDlOq5Xbihexm4HwCLcBGAsYHQ/s1500/pandapau06.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;panda pau 06 wifi adapter for Kali Linux&quot; border=&quot;0&quot; data-original-height=&quot;974&quot; data-original-width=&quot;1500&quot; height=&quot;208&quot; src=&quot;https://1.bp.blogspot.com/-vJfxUajNDXE/YHL5m1gISvI/AAAAAAAAFGA/C0jj6IRMAG4qV-QNdQDlOq5Xbihexm4HwCLcBGAsYHQ/w320-h208/pandapau06.jpg&quot; title=&quot;panda pau 06 wifi adapter for Kali Linux&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;The main reason is this WiFi adapter doesn&#39;t supports dual-band frequency (&lt;b&gt;only supports 2.4GHz&lt;/b&gt;), it doesn&#39;t supports 5GHz frequency.&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;This WiFi adapter comes with Ralink RT5372 chipset inside it. 802.11n standards supports 300MB per second maximum speed.&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;This adapter takes less power from computer, but other adapters doesn&#39;t took too much power from system (this point is negligible).&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://amzn.to/3wLI0Om&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;panda pau 06 order on amazon&quot; border=&quot;0&quot; data-original-height=&quot;326&quot; data-original-width=&quot;820&quot; height=&quot;80&quot; src=&quot;https://1.bp.blogspot.com/-hQuSkq1R5LQ/XxBAuCZT0fI/AAAAAAAADDw/erd1yJPsgf0g9qUSYvhBhHLcYuNYbCyZACPcBGAYYCw/w200-h80/1594900524777.webp&quot; title=&quot;panda pau 06 order on amazon&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;h2 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Extras&lt;/span&gt;&lt;/h2&gt;There are some more WiFi adapters that we did not cover because we didn&#39;t test them on our hands. These WiFi adapters were owned by us and some of our friends so we got a chance to test these products. We didn’t listed some WiFi adapters like following:&lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt; &lt;li&gt;&lt;a href=&quot;https://www.amazon.in/Leoxsys-150Mbps-Wireless-external-LEO-HG150N/dp/B00IWT1JA6&quot; target=&quot;_blank&quot;&gt;Leoxsys LEO-HG150N&lt;/a&gt;.&lt;/li&gt;&lt;li&gt;TP Link N150 TL-WN722N Version 1 (&lt;span style=&quot;background-color: black;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;Not available in Market Now&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;).&lt;/li&gt;&lt;/ul&gt;Be Careful to choose from these, because we don&#39;t know that they surely support monitor mode &amp;amp; packet injection or not. As per our own experience &lt;b&gt;Alfa cards are the best in the case of WiFi Hacking&lt;/b&gt;.&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;h2 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;How to Choose Best Wireless Adapter for Kali Linux 2020&lt;/span&gt;&lt;/h2&gt;Before going through WiFi adapter brands let’s talk something about what kind of WiFi adapter is best for Kali Linux. There are some requirements to be a WiFi penetration testing wireless adapter.&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Should support Monitor mode.&lt;/b&gt;&lt;/li&gt;&lt;b&gt;&lt;/b&gt;&lt;li&gt;&lt;b&gt;The ability to inject packets and capture packets simultaneously.&lt;/b&gt;&lt;/li&gt;&lt;/ul&gt;Here are the list of WiFi motherboards supports Monitor mode and Packet injection.&lt;br /&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Atheros AR9271 (only supports 2.4 GHz).&lt;/li&gt;&lt;li&gt;Ralink RT3070.&lt;/li&gt;&lt;li&gt;Ralink RT3572.&lt;/li&gt;&lt;li&gt;Ralink RT5370N&lt;/li&gt;&lt;li&gt;Ralink RT5372.&lt;/li&gt;&lt;li&gt;Ralink RT5572.&lt;/li&gt;&lt;li&gt;RealTek 8187L.&lt;/li&gt;&lt;li&gt;RealTek RTL8812AU (RTL8812BU &amp;amp; &lt;span&gt;Realtek8811AU&lt;/span&gt; doesn’t support monitor mode).&lt;/li&gt;&lt;li&gt;RealTek RTL8814AU&lt;/li&gt;&lt;/ul&gt;So we need to choose WiFi Adapter for Kali Linux carefully. For an Example, on the Internet lots of old and misleading articles that describe &lt;b&gt;TP Link N150 TL-WN722N is good for WiFi security testing. But it is not true&lt;/b&gt;. Actually it was.&lt;br /&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-Bowe_Wz5sTw/XxBR1w7DxZI/AAAAAAAADD4/CTUIpz8LRd4DkzQioLYYSeF2LX5ksc7xQCLcBGAsYHQ/s1600/PicsArt_07-16-06.01.46.webp&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;TP Link N150 TL-WN722N newer models don&#39;t support Monitor Mode&quot; border=&quot;0&quot; data-original-height=&quot;1080&quot; data-original-width=&quot;1080&quot; height=&quot;200&quot; src=&quot;https://1.bp.blogspot.com/-Bowe_Wz5sTw/XxBR1w7DxZI/AAAAAAAADD4/CTUIpz8LRd4DkzQioLYYSeF2LX5ksc7xQCLcBGAsYHQ/s200/PicsArt_07-16-06.01.46.webp&quot; title=&quot;TP Link N150 TL-WN722N newer models don&#39;t support Monitor Mode&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;TP Link N150 TL-WN722N newer models doesn&#39;t work&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;The TP Link N150 TL-WN722N’s previous versions support monitor mode. The version 1 comes with Atheros AR9002U chipset and supports monitor mode. Version 2 has the Realtek RTL8188EUS chipset and doesn’t support monitor mode or packet injection. TP Link N150 TL-WN722N version 1 is not available in the market right now. So clear these things and don’t get trapped.&lt;br /&gt;&lt;center&gt; &lt;form action=&quot;https://poll.pollcode.com/98861937&quot; method=&quot;post&quot;&gt;&lt;div style=&quot;background-color: #eeeeee; color: black; font-family: Arial; font-size: small; padding: 2px; width: 175px;&quot;&gt;&lt;div style=&quot;padding: 2px 0px 4px 2px;&quot;&gt;&lt;b&gt;Which WiFi adapter is the best? Vote Please&lt;/b&gt;&lt;/div&gt;&lt;input id=&quot;answer988619371&quot; name=&quot;answer&quot; style=&quot;float: left;&quot; type=&quot;radio&quot; value=&quot;1&quot; /&gt;&lt;label style=&quot;float: left; width: 150px;&quot;&gt;Alfa AWUS036NH&lt;/label&gt;&lt;div style=&quot;clear: both; height: 2px;&quot;&gt;&lt;/div&gt;&lt;input id=&quot;answer988619372&quot; name=&quot;answer&quot; style=&quot;float: left;&quot; type=&quot;radio&quot; value=&quot;2&quot; /&gt;&lt;label style=&quot;float: left; width: 150px;&quot;&gt;Alfa AWUS036NHA&lt;/label&gt;&lt;div style=&quot;clear: both; height: 2px;&quot;&gt;&lt;/div&gt;&lt;input id=&quot;answer988619373&quot; name=&quot;answer&quot; style=&quot;float: left;&quot; type=&quot;radio&quot; value=&quot;3&quot; /&gt;&lt;label style=&quot;float: left; width: 150px;&quot;&gt;Alfa AWUS036NEH&lt;/label&gt;&lt;div style=&quot;clear: both; height: 2px;&quot;&gt;&lt;/div&gt;&lt;input id=&quot;answer988619374&quot; name=&quot;answer&quot; style=&quot;float: left;&quot; type=&quot;radio&quot; value=&quot;4&quot; /&gt;&lt;label style=&quot;float: left; width: 150px;&quot;&gt;Panda PAU09 N600&lt;/label&gt;&lt;div style=&quot;clear: both; height: 2px;&quot;&gt;&lt;/div&gt;&lt;input id=&quot;answer988619375&quot; name=&quot;answer&quot; style=&quot;float: left;&quot; type=&quot;radio&quot; value=&quot;5&quot; /&gt;&lt;label style=&quot;float: left; width: 150px;&quot;&gt;Alfa AWUS036ACH&lt;/label&gt;&lt;div style=&quot;clear: both; height: 2px;&quot;&gt;&lt;/div&gt;&lt;input id=&quot;answer988619376&quot; name=&quot;answer&quot; style=&quot;float: left;&quot; type=&quot;radio&quot; value=&quot;6&quot; /&gt;&lt;label style=&quot;float: left; width: 150px;&quot;&gt;Alfa AC1900&lt;/label&gt;&lt;div style=&quot;clear: both; height: 2px;&quot;&gt;&lt;/div&gt;&lt;div align=&quot;center&quot; style=&quot;padding: 3px;&quot;&gt;&lt;input type=&quot;submit&quot; value=&quot;Vote&quot; /&gt;&amp;nbsp;&lt;input name=&quot;view&quot; type=&quot;submit&quot; value=&quot;View&quot; /&gt;&lt;/div&gt;&lt;div align=&quot;right&quot; style=&quot;font-size: 10px;&quot;&gt;pollcode.com &lt;a href=&quot;https://pollcode.com/&quot;&gt;free polls&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/form&gt;&lt;/center&gt; &lt;h2 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;WiFi Hacking in Kali Linux&lt;/span&gt;&lt;/h2&gt;&lt;b&gt;Kali Linux&lt;/b&gt; is the most widely used penetration testing operating system of all time. It comes with lots of tools pre-installed for cyber security experts and ethical hackers. We can perform web application penetration testing, network attack as well as &lt;b&gt;wireless auditing&lt;/b&gt; or WiFi hacking. We have already posted some lots of tutorials on our website and some good &lt;a href=&quot;https://www.kalilinux.in/2019/05/wifite.html&quot; target=&quot;_blank&quot;&gt;WiFi auditing tutorials&lt;/a&gt; like &lt;a href=&quot;https://www.kalilinux.in/2019/05/aircrack-crack-wifi.html&quot; target=&quot;_blank&quot;&gt;AirCrack-Ng&lt;/a&gt;.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt; &lt;h2 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Why Do We Use External USB WiFi Adapters in Kali Linux?&lt;/span&gt;&lt;/h2&gt; A WiFi adapter is a device that can be connected to our system and allows us to communicate with other devices over a wireless network. It is the WiFi chipset that allows our mobile phone laptop or other devices which allows us to connect to our WiFi network and access the internet or nearby devices.&lt;br /&gt;&lt;br /&gt;But most of the Laptops and mobile phones come with inbuilt WiFi chipset so &lt;b&gt;why do we need to connect an external WiFi adapter&lt;/b&gt; on our system ? Well the simple &lt;b&gt;answer is our in-built WiFi hardware is not much capable to perform security testing in WiFi networks&lt;/b&gt;.Usually &lt;a href=&quot;https://www.kalilinux.in/2020/03/how-to-install-wi-fi-driver-in-kali-linux.html&quot; target=&quot;_blank&quot;&gt;inbuilt WiFi adapters&lt;/a&gt; are low budget and not made for WiFi hacking, they don’t support monitor mode or packet injection. &lt;br /&gt;&lt;br /&gt;If we are running Kali Linux on Virtual Machine then also the inbuilt WiFi Adapter doesn’t work for us. Not even in bridge mode. In that case we also need an external WiFi adapter to play with WiFi networks. A good external WiFi adapter is a must have tool for everyone who has interest in the cyber security field.&lt;/div&gt;&lt;div&gt;&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;b&gt;WSL2 installation of Kali Linux will not support any kind (Inbuilt or External) of Wi-Fi adapters&lt;/b&gt;.&lt;span&gt;&lt;!--more--&gt;&lt;/span&gt;&lt;br /&gt;&lt;h2 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Kali Linux Supported WiFi Adapters&lt;/span&gt;&lt;/h2&gt;&lt;div style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;Technically &lt;b&gt;almost every WiFi adapter supports Kali Linux&lt;/b&gt;, but those are useless on WiFi hacking &lt;b&gt;if they don&#39;t support monitor mode and packet injection&lt;/b&gt;. Suppose, we buy a cheap WiFi adapter under $15 and use it to connect WiFi on Kali Linux. That will work for connecting to wireless networks but we can’t play with networks.&lt;br /&gt;&lt;br /&gt;It doesn’t make sense, when we are using &lt;b&gt;Kali Linux then we are penetration testers so a basic WiFi adapter can’t fulfill our requirements&lt;/b&gt;. That&#39;s why we should have a special WiFi adapter that supports monitor mode and packet injection. So in this tutorial Kali Linux supported means not only supported it means the chipset has ability to support monitor mode and packet injection.&lt;br /&gt;&lt;br /&gt;&lt;h2 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;What is Monitor Mode&lt;/span&gt;&lt;/h2&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;Network adapters, whether it is wired or wireless, are designed to only capture and process packets that are sent to them. When we want to sniff a wired connection and pick up all packets going over the wire, we put our wired network card in &quot;promiscuous&quot; mode.&lt;br /&gt;&lt;br /&gt;In wireless technology, the equivalent is monitor mode. This enables us to see and manipulate all wireless traffic passing through the air around us. Without this ability, we are limited to using our WiFi adapter to only connect to wireless Access Points (APs) that accept and authenticate us. That is not what we are willing to settle for.&lt;br /&gt;In the Aircrack-ng suite, we need to be able to use airodump-ng to collect or sniff data packets.&lt;br /&gt;&lt;h2 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;What is Packet Injection&lt;/span&gt;&lt;/h2&gt;Most WiFi attacks require that we are able to inject packets into the AP while, at the same time, capturing packets going over the air. Only a few WiFi adapters are capable of doing this.&lt;br /&gt;&lt;br /&gt;WiFi adapter manufacturers are not looking to add extra features to their standard wireless adapters to suit penetration testers needs. Most wireless adapters built into your laptop are designed so that people can connect to WiFi and browse the web and send mails. We need something much more powerful and versatile than that.&lt;br /&gt;&lt;br /&gt;If we can&#39;t inject packets into the Access Point (in &lt;a href=&quot;https://www.kalilinux.in/2019/05/aircrack-crack-wifi.html&quot; target=&quot;_blank&quot;&gt;Aircrack-ng&lt;/a&gt;, this is the function of Aireplay-ng), then it really limits what we do.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;If we are using Kali Linux and want to be a security tester or ethical hacker then a special WiFi adapter is a must have tool in &lt;a href=&quot;https://hackernoon.com/inside-a-hackers-backpack-gadgets-tips-and-tricks-for-hackers-5i6b31ie&quot; target=&quot;_blank&quot;&gt;our backpack&lt;/a&gt;.&lt;/b&gt; As per our own experience listed &lt;b&gt;Alfa cards in this list are best&lt;/b&gt; &lt;b&gt;USB wireless adapter for Kali Linux&lt;/b&gt;, going with them may be costly but they are really worth it. For more assistance comment below we reply each and every comment.&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;We are also in &lt;b&gt;&lt;a href=&quot;https://twitter.com/KaliLinux_in&quot; target=&quot;_blank&quot;&gt;Twitter&lt;/a&gt;&lt;/b&gt; join us there. Our &lt;b&gt;&lt;a href=&quot;https://t.me/kalilinuxin&quot; target=&quot;_blank&quot;&gt;Telegram group&lt;/a&gt;&lt;/b&gt; also can help to choose the best WiFi adapter for hacking and Kali Linux.&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='https://www.kalilinux.in/feeds/2192859702900028242/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.kalilinux.in/2020/07/wifi-adapter-kali-linux-2020.html#comment-form' title='27 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/2192859702900028242'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/2192859702900028242'/><link rel='alternate' type='text/html' href='https://www.kalilinux.in/2020/07/wifi-adapter-kali-linux-2020.html' title='Best USB WiFi Adapter For Kali Linux 2021 [Updated October]'/><author><name>Kali Linux</name><uri>http://www.blogger.com/profile/07345541575706459646</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//3.bp.blogspot.com/-Mb3EvSYi1Yg/YOL_LNs2xhI/AAAAAAAAFk4/aghHydKfmagtjPYLvn-SVVNEIJW10TdLACK4BGAYYCw/s113/kali%2Bdragon.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-9PANS7pDTMU/XxBSZ1ZNEJI/AAAAAAAADEA/jIB7v4LG_yU8XwBts7Wp1tZ_fOd-rS67wCLcBGAsYHQ/s72-c/PicsArt_07-16-06.21.19.webp" height="72" width="72"/><thr:total>27</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6091241131056531264.post-7963573296502758409</id><published>2021-10-09T01:30:00.001+05:30</published><updated>2021-10-09T01:30:00.186+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Forensic"/><title type='text'>How to Remove Metadata of Files on Kali Linux</title><content type='html'>&lt;p&gt;In cybersecurity and digital forensics field metadata of files is very important. We can get various information from &lt;a href=&quot;https://en.wikipedia.org/wiki/Metadata&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;metadata&lt;/a&gt; in files. This metadata may help us to get much more insider information while we are doing forensics testing. Also if we think about our privacy then metadata can harm our privacy in that case we can remove our metadata also.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/--Bc5M5PJc-0/YVK6JpqNPKI/AAAAAAAAF9A/3AcPqjpMQsktQNJyDxITQ1lRG44WQfDRACLcBGAsYHQ/s1000/remove%2Bmetadata%2Bfrom%2Bfiles%2Bon%2BKali%2BLinux.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;remove metadata from files on Kali Linux&quot; border=&quot;0&quot; data-original-height=&quot;606&quot; data-original-width=&quot;1000&quot; height=&quot;194&quot; src=&quot;https://1.bp.blogspot.com/--Bc5M5PJc-0/YVK6JpqNPKI/AAAAAAAAF9A/3AcPqjpMQsktQNJyDxITQ1lRG44WQfDRACLcBGAsYHQ/w320-h194/remove%2Bmetadata%2Bfrom%2Bfiles%2Bon%2BKali%2BLinux.png&quot; title=&quot;remove metadata from files on Kali Linux&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;In this detailed guide we are going to discuss about how we can read and &lt;i&gt;&lt;b&gt;remove metadata of any files using Kali Linux&lt;/b&gt;&lt;/i&gt;.&lt;p&gt;&lt;/p&gt;&lt;p&gt;To view and remove metadata on Kali Linux (or any other Linux), we need to install mat2 program. Mat2 (&lt;b&gt;M&lt;/b&gt;etadata &lt;b&gt;A&lt;/b&gt;nonymisation &lt;b&gt;T&lt;/b&gt;oolkit &lt;b&gt;2&lt;/b&gt;) is a command-line metadata removal tool, supporting a wide range of commonly used file formats, written in python3. To install it on our system we need to apply following command on our Terminal:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code class=&quot;ns&quot; style=&quot;outline: currentcolor none 0px; transition: all 0.3s ease 0s;&quot;&gt;sudo apt install mat2&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;In the following screenshot we can see that mat2 is installing on our system. It is not so large (under 25MB) package and the installation time will depends on our internet connection speed and system performance.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-CZGoEhwdTMM/YVKjqnaT0mI/AAAAAAAAF8Q/IhxxSdZLTPAbzXchHfoheouPvtbBziZMwCLcBGAsYHQ/s810/installing%2Bmat2.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;installing mat2 on kali linux&quot; border=&quot;0&quot; data-original-height=&quot;360&quot; data-original-width=&quot;810&quot; height=&quot;284&quot; src=&quot;https://1.bp.blogspot.com/-CZGoEhwdTMM/YVKjqnaT0mI/AAAAAAAAF8Q/IhxxSdZLTPAbzXchHfoheouPvtbBziZMwCLcBGAsYHQ/w640-h284/installing%2Bmat2.png&quot; title=&quot;installing mat2 on kali linux&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;After the installation is finished we can check the help of mat2 by using following command:&lt;p&gt;&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code class=&quot;ns&quot; style=&quot;outline: currentcolor none 0px; transition: all 0.3s ease 0s;&quot;&gt;mat2 -h&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;In the following screenshot we can see the help of mat2.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-6XYjLcmIZ-g/YVKlsDT4y2I/AAAAAAAAF8Y/z0H1EZ5YaTAo-J4pOjN_1Npd2DY_uTergCLcBGAsYHQ/s993/mat2%2Bhelp.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;mat2 help options&quot; border=&quot;0&quot; data-original-height=&quot;446&quot; data-original-width=&quot;993&quot; height=&quot;288&quot; src=&quot;https://1.bp.blogspot.com/-6XYjLcmIZ-g/YVKlsDT4y2I/AAAAAAAAF8Y/z0H1EZ5YaTAo-J4pOjN_1Npd2DY_uTergCLcBGAsYHQ/w640-h288/mat2%2Bhelp.png&quot; title=&quot;mat2 help options&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Now we can read the help options to know all the works of this tool. As we can see there is a &lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;-s&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt; flag, which can show us harmful metadata detectable by mat2 without removing them. Lets use it.&lt;/p&gt;&lt;p&gt;Mat2 can view and remove metadata from files so we need files to perform it. Here we have an downloaded image which contains metadata. We had saved the image on our Desktop (home/kali/Desktop/IMG_20201007_102037.jpg ).&lt;/p&gt;&lt;p&gt;To view it&#39;s metadata we can use following command:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code class=&quot;ns&quot; style=&quot;outline: currentcolor none 0px; transition: all 0.3s ease 0s;&quot;&gt;mat2 -s /&lt;/code&gt;home/kali/Desktop/IMG_20201007_102037.jpg&lt;br /&gt;&lt;/pre&gt;&lt;p&gt;In the following screenshot we can see the metadata of this image with various useful information:&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-OzI2_zYMgKg/YVKpg3QJbJI/AAAAAAAAF8g/9whOGGXUOx0xLLq5MjIopKs1Qa7y49YeQCLcBGAsYHQ/s985/mat2%2Bview%2Bmetadata.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;mat2 view metadata&quot; border=&quot;0&quot; data-original-height=&quot;547&quot; data-original-width=&quot;985&quot; height=&quot;356&quot; src=&quot;https://1.bp.blogspot.com/-OzI2_zYMgKg/YVKpg3QJbJI/AAAAAAAAF8g/9whOGGXUOx0xLLq5MjIopKs1Qa7y49YeQCLcBGAsYHQ/w640-h356/mat2%2Bview%2Bmetadata.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Now if we want to remove these metadata this file we need to enter following command on our terminal:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code class=&quot;ns&quot; style=&quot;outline: currentcolor none 0px; transition: all 0.3s ease 0s;&quot;&gt;mat2 &amp;lt;location/of/file&amp;gt;&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;In the following screenshot we can see that it is done.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-eFv_jv7PX7Q/YVKxXcq3tII/AAAAAAAAF8o/BtwyNGdKFX8VMiOeMUtWte-gW0iPMuJ6wCLcBGAsYHQ/s444/metadata%2Bis%2Bremoved%2Bmat2.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;metadata is removed&quot; border=&quot;0&quot; data-original-height=&quot;67&quot; data-original-width=&quot;444&quot; height=&quot;60&quot; src=&quot;https://1.bp.blogspot.com/-eFv_jv7PX7Q/YVKxXcq3tII/AAAAAAAAF8o/BtwyNGdKFX8VMiOeMUtWte-gW0iPMuJ6wCLcBGAsYHQ/w400-h60/metadata%2Bis%2Bremoved%2Bmat2.png&quot; title=&quot;metadata is removed&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Here the old files will remain unchanged, but new files will be created with the string &lt;u&gt;&lt;b&gt;.cleaned&lt;/b&gt;&lt;/u&gt; in the name and completely cleared metadata. As we can see in the following screenshot.&lt;br /&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/--fVLDGt15wY/YVKzAnifKVI/AAAAAAAAF8w/HnlozlAmoegGwW7vWGtew6JuLaiBuRO5ACLcBGAsYHQ/s920/meta%2Bdata%2Bcleaned%2Bfiles.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Metadata cleaned files&quot; border=&quot;0&quot; data-original-height=&quot;342&quot; data-original-width=&quot;920&quot; height=&quot;149&quot; src=&quot;https://1.bp.blogspot.com/--fVLDGt15wY/YVKzAnifKVI/AAAAAAAAF8w/HnlozlAmoegGwW7vWGtew6JuLaiBuRO5ACLcBGAsYHQ/w400-h149/meta%2Bdata%2Bcleaned%2Bfiles.png&quot; title=&quot;Metadata cleaned files&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Now we can check if the there any metadata in the new cleaned file by using following command:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code class=&quot;ns&quot; style=&quot;outline: currentcolor none 0px; transition: all 0.3s ease 0s;&quot;&gt;mat2 -s /&lt;/code&gt;home/kali/Desktop/IMG_20201007_102037.cleaned.jpg&lt;/pre&gt;&lt;p&gt;In the following screenshot we can see that the new file (&lt;u&gt;&lt;b&gt;.cleaned&lt;/b&gt;&lt;/u&gt;) did not contain any kind of metadata.&lt;/p&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-SI4X1WuXnR8/YVK0JiAbkcI/AAAAAAAAF84/o8WnnMiHj-04jIa4qSMq9_Lernh30-RjgCLcBGAsYHQ/s1352/metadata%2Bremoved%2Bmat2.png&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;all metadata is removed&quot; border=&quot;0&quot; data-original-height=&quot;721&quot; data-original-width=&quot;1352&quot; height=&quot;342&quot; src=&quot;https://1.bp.blogspot.com/-SI4X1WuXnR8/YVK0JiAbkcI/AAAAAAAAF84/o8WnnMiHj-04jIa4qSMq9_Lernh30-RjgCLcBGAsYHQ/w640-h342/metadata%2Bremoved%2Bmat2.png&quot; title=&quot;all metadata is removed&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Total process of removing metadata&lt;/span&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;p&gt;This is how we can remove metadata of any file (not only images), if we need to clear metadata of all files in any particular folder then we can simply enter following command:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code class=&quot;ns&quot; style=&quot;outline: currentcolor none 0px; transition: all 0.3s ease 0s;&quot;&gt;mat2 /home/kali/Desktop/*&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;The above command will remove metadata from all files on our Desktop. If we want to clear metadata of files in other folders then we need put that directory with &lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;*&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt; . And it will create new &lt;u&gt;&lt;b&gt;.cleaned&lt;/b&gt;&lt;/u&gt; file for every old files, the &lt;u&gt;&lt;b&gt;.cleaned&lt;/b&gt;&lt;/u&gt; files will not contain any metadata.&lt;/p&gt;&lt;p&gt;This is all bout how we can &lt;i&gt;&lt;b&gt;clear or remove metadata from any files on our Kali Linux&lt;/b&gt;&lt;/i&gt; system.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Love our articles?&lt;/b&gt; Make sure to &lt;b&gt;follow us&lt;/b&gt; on &lt;a class=&quot;d-link&quot; href=&quot;https://twitter.com/KaliLinux_in&quot; target=&quot;_blank&quot;&gt;Twitter&lt;/a&gt; and &lt;a class=&quot;d-link&quot; href=&quot;https://github.com/jaykali&quot; target=&quot;_blank&quot;&gt;GitHub&lt;/a&gt;, we post article updates there. To join our &lt;b&gt;KaliLinuxIn&lt;/b&gt; family, join our &lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;a class=&quot;d-link&quot; href=&quot;https://t.me/kalilinuxin&quot; target=&quot;_blank&quot;&gt;Telegram Group&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;. We are trying to build a community for Linux and Cybersecurity. For anything we always happy to help everyone on the &lt;span style=&quot;color: red;&quot;&gt;comment section&lt;/span&gt;. As we know our comment section is always open to everyone. We read each and every comment and &lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;we always reply&lt;/span&gt;&lt;/b&gt;.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='https://www.kalilinux.in/feeds/7963573296502758409/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.kalilinux.in/2021/09/remove-metadata-of-files.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/7963573296502758409'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/7963573296502758409'/><link rel='alternate' type='text/html' href='https://www.kalilinux.in/2021/09/remove-metadata-of-files.html' title='How to Remove Metadata of Files on Kali Linux'/><author><name>Kali Linux</name><uri>http://www.blogger.com/profile/07345541575706459646</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//3.bp.blogspot.com/-Mb3EvSYi1Yg/YOL_LNs2xhI/AAAAAAAAFk4/aghHydKfmagtjPYLvn-SVVNEIJW10TdLACK4BGAYYCw/s113/kali%2Bdragon.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/--Bc5M5PJc-0/YVK6JpqNPKI/AAAAAAAAF9A/3AcPqjpMQsktQNJyDxITQ1lRG44WQfDRACLcBGAsYHQ/s72-w320-h194-c/remove%2Bmetadata%2Bfrom%2Bfiles%2Bon%2BKali%2BLinux.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6091241131056531264.post-8739446751544522080</id><published>2021-10-07T08:22:00.001+05:30</published><updated>2021-10-16T12:24:45.447+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Attack Strategies"/><category scheme="http://www.blogger.com/atom/ns#" term="Custom Tools For Kali Linux"/><title type='text'>L3MON -- Access Android Devices Remotely</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;L3MON is a remote Android management suite, we can use it to gain access on any android smartphone. In easy words this is a Android RAT (Remote Administrative Tool).&lt;br /&gt;&lt;br /&gt;In today&#39;s detailed tutorial we learn how to &lt;b&gt;install &amp;amp; configure L3MON on our Kali Linux system&lt;/b&gt; and use it. &lt;span style=&quot;color: #ff00fe;&quot;&gt;&lt;b&gt;This l3MON tool has been archived by it&#39;s owner. Seems it will not updated and may not work. We are also closing our support on this tools errors.&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;Using L3MON we can make an Android APK payload and send it to android device and after installing it on android device &lt;b&gt;we can gain the access of Android device via L3MON&#39;s web based interface&lt;/b&gt;, we can send commands from the easy web based interface and execute our commands on targeted devices.&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-86dY83uDPXs/XufB053um3I/AAAAAAAACuw/89vh5f30AGIgN3XAHoDajB99BzUYzWzlgCLcBGAsYHQ/s1600/PicsArt_06-15-07.07.15.webp&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;L3mon Kali Linux Control Android device remotely&quot; border=&quot;0&quot; data-original-height=&quot;720&quot; data-original-width=&quot;954&quot; height=&quot;241&quot; src=&quot;https://1.bp.blogspot.com/-86dY83uDPXs/XufB053um3I/AAAAAAAACuw/89vh5f30AGIgN3XAHoDajB99BzUYzWzlgCLcBGAsYHQ/s320/PicsArt_06-15-07.07.15.webp&quot; title=&quot;L3mon Kali Linux Control Android device remotely&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;L3mon have lots of beautiful features they are following:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;GPS Logging&lt;/li&gt;&lt;li&gt;Microphone Recording&lt;/li&gt;&lt;li&gt;View Contacts&lt;/li&gt;&lt;li&gt;SMS Logs&lt;/li&gt;&lt;li&gt;Send SMS&lt;/li&gt;&lt;li&gt;Call Logs&lt;/li&gt;&lt;li&gt;View Installed Apps&lt;/li&gt;&lt;li&gt;View Stub Permissions&lt;/li&gt;&lt;li&gt;Live Clipboard Logging&lt;/li&gt;&lt;li&gt;Live Notification Logging&lt;/li&gt;&lt;li&gt;View WiFi Networks (logs previously seen)&lt;/li&gt;&lt;li&gt;File Explorer &amp;amp; Downloader&lt;/li&gt;&lt;li&gt;Command Queuing&lt;/li&gt;&lt;li&gt;Built In APK Builder&lt;/li&gt;&lt;/ul&gt;&lt;h3 style=&quot;text-align: center;&quot;&gt;&amp;nbsp; &lt;span style=&quot;color: blue;&quot;&gt;Installing L3MON in Kali Linux &lt;/span&gt;&lt;/h3&gt;We need Java Runtime Environment 8 and nodejs installed in our machine to run L3mon.&lt;br /&gt;&lt;br /&gt;First we install the JRE (Java Runtime Environment) on our system by applying following command:&lt;br /&gt;&lt;pre style=&quot;background: rgb(0, 0, 0) none repeat scroll 0% 0%; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-width: 1px; box-sizing: border-box; clear: both; color: lime; direction: ltr; font-family: monospace, monospace; font-size: 11.7px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; transition: all 0.3s ease 0s;&quot;&gt;&lt;code&gt;sudo apt-get install nvidia-openjdk-8-jre&lt;/code&gt;&lt;br /&gt;&lt;code style=&quot;outline: currentcolor none 0px; transition: all 0.3s ease 0s;&quot;&gt;&lt;/code&gt;&lt;/pre&gt;This command will install JRE version 8 on our system as shown in following screenshot:&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEjnDJ9FJ2YHXZOh0j9_hftRcaWYpnujmavsN9SeaTNFsRo0-C4zmbbBsj18HkZPTCqfq7GHZDowSF1Up6MFM07XydFIT-hbnccdVkQC72hK8wytqX3CFi9Bm8FuhC_lIyTLVFvbxpn91YzSVexYpw8qLn46Ihebyh0fVFnDsmqjaF_qKbgPFGKu18TJ=s670&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Installing nvidia-openjdk-8-jre on Kali Linux&quot; border=&quot;0&quot; data-original-height=&quot;248&quot; data-original-width=&quot;670&quot; height=&quot;236&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEjnDJ9FJ2YHXZOh0j9_hftRcaWYpnujmavsN9SeaTNFsRo0-C4zmbbBsj18HkZPTCqfq7GHZDowSF1Up6MFM07XydFIT-hbnccdVkQC72hK8wytqX3CFi9Bm8FuhC_lIyTLVFvbxpn91YzSVexYpw8qLn46Ihebyh0fVFnDsmqjaF_qKbgPFGKu18TJ=w640-h236&quot; title=&quot;Installing nvidia-openjdk-8-jre on Kali Linux&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;We already have installed OpenJDK-8-JRE&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;Then we need to install NodeJs on our system we apply the following commands to download nodejs in our system.&lt;br /&gt;&lt;pre style=&quot;background: rgb(0, 0, 0) none repeat scroll 0% 0%; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-width: 1px; box-sizing: border-box; clear: both; color: lime; direction: ltr; font-family: monospace, monospace; font-size: 11.7px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; transition: all 0.3s ease 0s;&quot;&gt;&lt;code&gt;curl -sL https://deb.nodesource.com/setup_13.x | sudo bash -&lt;/code&gt;&lt;/pre&gt;Then we run following command to install it.&lt;br /&gt;&lt;pre style=&quot;background: rgb(0, 0, 0) none repeat scroll 0% 0%; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-width: 1px; box-sizing: border-box; clear: both; color: lime; direction: ltr; font-family: monospace, monospace; font-size: 11.7px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; transition: all 0.3s ease 0s;&quot;&gt;&lt;code&gt;sudo apt-get install -y nodejs&lt;/code&gt;&lt;/pre&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-SOA-ok2EpRs/XuRGrcPlhII/AAAAAAAACsE/ZHhflKV5YyAVBn9lXyC51_whi2oFuQzZACLcBGAsYHQ/s1600/Screenshot_2020-06-13_14-24-23.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;installing nodejs in Kali&quot; border=&quot;0&quot; data-original-height=&quot;287&quot; data-original-width=&quot;565&quot; height=&quot;202&quot; src=&quot;https://1.bp.blogspot.com/-SOA-ok2EpRs/XuRGrcPlhII/AAAAAAAACsE/ZHhflKV5YyAVBn9lXyC51_whi2oFuQzZACLcBGAsYHQ/s400/Screenshot_2020-06-13_14-24-23.png&quot; title=&quot;installing nodejs in Kali&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;Then we install pm2 process manager by using following command:&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;pre style=&quot;background: rgb(0, 0, 0) none repeat scroll 0% 0%; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-width: 1px; box-sizing: border-box; clear: both; color: lime; direction: ltr; font-family: monospace, monospace; font-size: 11.7px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; transition: all 0.3s ease 0s;&quot;&gt;&lt;code&gt;sudo npm install pm2 -g&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;Now we are ready to install and configure L3MON.&lt;br /&gt;&lt;br /&gt;We download it from it&#39;s GitHub by using git clone command:&lt;br /&gt;&lt;br /&gt;&lt;pre style=&quot;background: rgb(0, 0, 0) none repeat scroll 0% 0%; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-width: 1px; box-sizing: border-box; clear: both; color: lime; direction: ltr; font-family: monospace, monospace; font-size: 11.7px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; transition: all 0.3s ease 0s;&quot;&gt;&lt;code&gt;wget https://github.com/D3VL/L3MON/releases/download/1.1.2/L3MON-v1.1.2.zip&lt;/code&gt;&lt;/pre&gt;This command will download L3MON in our system. Now we create a new folder in our Desktop named L3MON and copy the downloaded zip file there.&lt;br /&gt;&lt;br /&gt;Then extract it by right clicking on the zip file and choosing &quot;extract here&quot;.&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-mUg4eeEUs80/XuR3BZHOnpI/AAAAAAAACsQ/vrCFiAn4ZWwZ4MevoWoDCtfFt0LG-rO3ACLcBGAsYHQ/s1600/Screenshot_2020-06-13_12-19-19.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;unziping l3mon&quot; border=&quot;0&quot; data-original-height=&quot;353&quot; data-original-width=&quot;356&quot; height=&quot;198&quot; src=&quot;https://1.bp.blogspot.com/-mUg4eeEUs80/XuR3BZHOnpI/AAAAAAAACsQ/vrCFiAn4ZWwZ4MevoWoDCtfFt0LG-rO3ACLcBGAsYHQ/s200/Screenshot_2020-06-13_12-19-19.png&quot; title=&quot;unziping l3mon&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;Then we open a terminal window and navigate to L3MON in our Desktop by simply using cd command:&lt;br /&gt;&lt;br /&gt;&lt;pre style=&quot;background: rgb(0, 0, 0) none repeat scroll 0% 0%; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-width: 1px; box-sizing: border-box; clear: both; color: lime; direction: ltr; font-family: monospace, monospace; font-size: 11.7px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; transition: all 0.3s ease 0s;&quot;&gt;&lt;code&gt;cd /Desktop/L3MON&lt;/code&gt;&lt;/pre&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Here we install all the dependencies by using following command:&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;pre style=&quot;background: rgb(0, 0, 0) none repeat scroll 0% 0%; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-width: 1px; box-sizing: border-box; clear: both; color: lime; direction: ltr; font-family: monospace, monospace; font-size: 11.7px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; transition: all 0.3s ease 0s;&quot;&gt;&lt;code&gt;npm install&lt;/code&gt;&lt;/pre&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;It will install the dependencies now as we can see the the following screenshot:&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-Bl5owbN1lfA/XuR4plakdoI/AAAAAAAACsc/gHhnySIhxJwzER6E2Bwaw0PZWXVXMI9JQCLcBGAsYHQ/s1600/Screenshot_2020-06-13_12-27-18.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;installing dependencies of l3mon&quot; border=&quot;0&quot; data-original-height=&quot;161&quot; data-original-width=&quot;681&quot; height=&quot;93&quot; src=&quot;https://1.bp.blogspot.com/-Bl5owbN1lfA/XuR4plakdoI/AAAAAAAACsc/gHhnySIhxJwzER6E2Bwaw0PZWXVXMI9JQCLcBGAsYHQ/s400/Screenshot_2020-06-13_12-27-18.png&quot; title=&quot;installing dependencies of l3mon&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Let start the server by using following command:&lt;/span&gt;&lt;br /&gt;&lt;pre style=&quot;background: rgb(0, 0, 0) none repeat scroll 0% 0%; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-width: 1px; box-sizing: border-box; clear: both; color: lime; direction: ltr; font-family: monospace, monospace; font-size: 11.7px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; transition: all 0.3s ease 0s;&quot;&gt;&lt;code&gt;pm2 start index.js&lt;/code&gt;&lt;/pre&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-9OY5PsA_6PY/XuTlwy_sCzI/AAAAAAAACts/yXG23jyIGxwll8ZyEHjY7Wkb6vKlUNsjQCLcBGAsYHQ/s1600/Screenshot_2020-06-13_20-12-33.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;starting the instance&quot; border=&quot;0&quot; data-original-height=&quot;184&quot; data-original-width=&quot;720&quot; height=&quot;100&quot; src=&quot;https://1.bp.blogspot.com/-9OY5PsA_6PY/XuTlwy_sCzI/AAAAAAAACts/yXG23jyIGxwll8ZyEHjY7Wkb6vKlUNsjQCLcBGAsYHQ/s400/Screenshot_2020-06-13_20-12-33.png&quot; title=&quot;starting the instance&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Now we can see our server in our browser &lt;a href=&quot;http://localhost:22533/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;http://localhost:22533&lt;/a&gt; there will be a login page as following screenshot:&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/--4Rdo8qPV8s/XuR7rja5x3I/AAAAAAAACso/xzs75iBrOOsURR4uFLVnIoq1lNVammCpwCLcBGAsYHQ/s1600/Screenshot_2020-06-13_12-40-13.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;l3mon login&quot; border=&quot;0&quot; data-original-height=&quot;523&quot; data-original-width=&quot;810&quot; height=&quot;206&quot; src=&quot;https://1.bp.blogspot.com/--4Rdo8qPV8s/XuR7rja5x3I/AAAAAAAACso/xzs75iBrOOsURR4uFLVnIoq1lNVammCpwCLcBGAsYHQ/s320/Screenshot_2020-06-13_12-40-13.png&quot; title=&quot;l3mon login&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;span style=&quot;background-color: white;&quot;&gt;We create a login for our server here. But we cant login because we did not created a password to login. To create a password we stop our serve by using following command: &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;pre style=&quot;background: rgb(0, 0, 0) none repeat scroll 0% 0%; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-width: 1px; box-sizing: border-box; clear: both; color: lime; direction: ltr; font-family: monospace, monospace; font-size: 11.7px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; transition: all 0.3s ease 0s;&quot;&gt;&lt;code&gt;pm2 stop index.js&lt;/code&gt;&lt;/pre&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&amp;nbsp;Now we need to edit &lt;i&gt;maindb.json&lt;/i&gt; file using our favorite text editor mousepad.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;pre style=&quot;background: rgb(0, 0, 0) none repeat scroll 0% 0%; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-width: 1px; box-sizing: border-box; clear: both; color: lime; direction: ltr; font-family: monospace, monospace; font-size: 11.7px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; transition: all 0.3s ease 0s;&quot;&gt;&lt;code&gt;mousepad maindb.json&lt;/code&gt;&lt;/pre&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-5NEReRJC03E/XuR9G-EmJ_I/AAAAAAAACs0/QSmdOLw3OHAL4bb8XXi7IYJX4y74ek3egCLcBGAsYHQ/s1600/Screenshot_2020-06-13_12-46-17.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;288&quot; data-original-width=&quot;378&quot; height=&quot;243&quot; src=&quot;https://1.bp.blogspot.com/-5NEReRJC03E/XuR9G-EmJ_I/AAAAAAAACs0/QSmdOLw3OHAL4bb8XXi7IYJX4y74ek3egCLcBGAsYHQ/s320/Screenshot_2020-06-13_12-46-17.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Here we edit the username if we want it. But in the password field, we need to give our password&#39;s md5 hash. Means if we fill here the password as plain text, will not work. We must need to put password&#39;s md5 hash.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white;&quot;&gt;How to create a md5 hash of a password? Suppose our password is &lt;u&gt;qwerty&lt;/u&gt; (&lt;span style=&quot;font-size: x-small;&quot;&gt;This is for an example we shouldn&#39;t choose easy passwords for security reasons&lt;/span&gt;). To convert it on md5 we need to use following command in another terminal window.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;pre style=&quot;background: rgb(0, 0, 0) none repeat scroll 0% 0%; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-width: 1px; box-sizing: border-box; clear: both; color: lime; direction: ltr; font-family: monospace, monospace; font-size: 11.7px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; transition: all 0.3s ease 0s;&quot;&gt;&lt;code&gt;echo -n &quot;qwerty&quot; | md5sum | cut -d&quot; &quot; -f 1&lt;/code&gt;&lt;/pre&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Here we got the MD5 hash of our password as we can see in the following screenshot. &lt;/span&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-SN0CWzpV9sw/XuR9zxCIEgI/AAAAAAAACtA/DpCXJlOmn74Pl7THId31ZiRYIep3zA7lACLcBGAsYHQ/s1600/Screenshot_2020-06-13_12-48-17.webp&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;creating md5 hash&quot; border=&quot;0&quot; data-original-height=&quot;540&quot; data-original-width=&quot;826&quot; height=&quot;261&quot; src=&quot;https://1.bp.blogspot.com/-SN0CWzpV9sw/XuR9zxCIEgI/AAAAAAAACtA/DpCXJlOmn74Pl7THId31ZiRYIep3zA7lACLcBGAsYHQ/s400/Screenshot_2020-06-13_12-48-17.webp&quot; title=&quot;creating md5 hash&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;Then we fill our username and password in maindb.json file then save and close this file.&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-wK6d3WxHtUE/XuR-S3psRaI/AAAAAAAACtM/2mWNWAmuancHhUkO13Pm04xL8JJPFwScgCLcBGAsYHQ/s1600/Screenshot_2020-06-13_12-51-09.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;modify and save the maindb.json file&quot; border=&quot;0&quot; data-original-height=&quot;273&quot; data-original-width=&quot;506&quot; height=&quot;172&quot; src=&quot;https://1.bp.blogspot.com/-wK6d3WxHtUE/XuR-S3psRaI/AAAAAAAACtM/2mWNWAmuancHhUkO13Pm04xL8JJPFwScgCLcBGAsYHQ/s320/Screenshot_2020-06-13_12-51-09.png&quot; title=&quot;modify and save the maindb.json file&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Now we again start the server by using following command :&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;background-color: white;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;pre style=&quot;background: rgb(0, 0, 0) none repeat scroll 0% 0%; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-width: 1px; box-sizing: border-box; clear: both; color: lime; direction: ltr; font-family: monospace, monospace; font-size: 11.7px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; transition: all 0.3s ease 0s;&quot;&gt;&lt;code&gt;pm2 start index.js&lt;/code&gt;&lt;/pre&gt;Then again open our &lt;a href=&quot;http://localhost:22533/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;localhost&lt;/a&gt; in browser with 22533 port.&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-GUAr4fKKURc/XuR_ChCdoxI/AAAAAAAACtY/gWFht_J3G2MPM8KDu8ir9i4iSph2nL0QACLcBGAsYHQ/s1600/Screenshot_2020-06-13_12-54-08.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;338&quot; data-original-width=&quot;441&quot; height=&quot;245&quot; src=&quot;https://1.bp.blogspot.com/-GUAr4fKKURc/XuR_ChCdoxI/AAAAAAAACtY/gWFht_J3G2MPM8KDu8ir9i4iSph2nL0QACLcBGAsYHQ/s320/Screenshot_2020-06-13_12-54-08.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;As we set our username &lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;&quot;&gt;kali&lt;/span&gt;&lt;/i&gt; and password &lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;&quot;&gt;qwerty&lt;/span&gt;&lt;/i&gt; we fill it and click on login.&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-k0ptk3oolNQ/XuR_VYXl3dI/AAAAAAAACtg/jiWdeUvdAlAG7hZXvI12bWSzF4F8VQ_pQCLcBGAsYHQ/s1600/Screenshot_2020-06-13_12-55-46.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;429&quot; data-original-width=&quot;1173&quot; height=&quot;146&quot; src=&quot;https://1.bp.blogspot.com/-k0ptk3oolNQ/XuR_VYXl3dI/AAAAAAAACtg/jiWdeUvdAlAG7hZXvI12bWSzF4F8VQ_pQCLcBGAsYHQ/s400/Screenshot_2020-06-13_12-55-46.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;background-color: white;&quot;&gt;We are successfully logged in.&lt;/span&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;Now we are in control. We need to open the APK builder tab.&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-E-uymU_nhAQ/XuTnlmBwvAI/AAAAAAAACt4/uh0j3hMymHUvx1Td2nA-vkGGOfqwcLWxwCLcBGAsYHQ/s1600/Screenshot_2020-06-13_20-20-19.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;APK builder&quot; border=&quot;0&quot; data-original-height=&quot;456&quot; data-original-width=&quot;1154&quot; height=&quot;157&quot; src=&quot;https://1.bp.blogspot.com/-E-uymU_nhAQ/XuTnlmBwvAI/AAAAAAAACt4/uh0j3hMymHUvx1Td2nA-vkGGOfqwcLWxwCLcBGAsYHQ/s400/Screenshot_2020-06-13_20-20-19.png&quot; title=&quot;APK builder&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Here we put our IP address (local or public) and leave the port as default and click on build.&lt;br /&gt;&lt;br /&gt;Note: If we want to control android device on our local network (same WiFi) then we can use our local IP and to connect devices through internet we need to put our Public IP (Static IP is preferred for a long time use).&lt;br /&gt;&lt;br /&gt;After clicking on build we got an error like this.&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-FV32GzWhLzM/XuT0ZfP13JI/AAAAAAAACuE/AfFMreOBDBo1asFHx5nvUFwUHHVWfVf2QCLcBGAsYHQ/s1600/Screenshot_2020-06-13_20-42-56.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;we got error&quot; border=&quot;0&quot; data-original-height=&quot;165&quot; data-original-width=&quot;589&quot; height=&quot;111&quot; src=&quot;https://1.bp.blogspot.com/-FV32GzWhLzM/XuT0ZfP13JI/AAAAAAAACuE/AfFMreOBDBo1asFHx5nvUFwUHHVWfVf2QCLcBGAsYHQ/s400/Screenshot_2020-06-13_20-42-56.png&quot; title=&quot;we got error&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;We solved this error by configuring JAVA in another terminal by running following command:&lt;br /&gt;&lt;br /&gt;&lt;pre style=&quot;background: rgb(0, 0, 0) none repeat scroll 0% 0%; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-width: 1px; box-sizing: border-box; clear: both; color: lime; direction: ltr; font-family: monospace, monospace; font-size: 11.7px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; transition: all 0.3s ease 0s;&quot;&gt;&lt;code&gt;update-alternatives --config java&lt;/code&gt;&lt;/pre&gt;Here we can select Java versions. We need Java version 8 to run L3MON tool. In out case it is on number 2, as we can see in the following screenshot.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-SZahQ7YYMuM/X8HFaZhPhZI/AAAAAAAAD_Q/uGNYTn6-dx0_T_O3l6sW4EBLDSjGYXmEQCPcBGAYYCw/s749/java%2Bversion%2B8%2Balternative.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Java version 8 selecting on Kali Linux&quot; border=&quot;0&quot; data-original-height=&quot;186&quot; data-original-width=&quot;749&quot; height=&quot;99&quot; src=&quot;https://1.bp.blogspot.com/-SZahQ7YYMuM/X8HFaZhPhZI/AAAAAAAAD_Q/uGNYTn6-dx0_T_O3l6sW4EBLDSjGYXmEQCPcBGAYYCw/w400-h99/java%2Bversion%2B8%2Balternative.png&quot; title=&quot;Java version 8 selecting on Kali Linux&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;So we type 2 and hit &quot;Enter&quot;.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;Then we restart our running L3MON server by using following command:&lt;br /&gt;&lt;pre style=&quot;background: rgb(0, 0, 0) none repeat scroll 0% 0%; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-width: 1px; box-sizing: border-box; clear: both; color: lime; direction: ltr; font-family: monospace, monospace; font-size: 11.7px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; transition: all 0.3s ease 0s;&quot;&gt;&lt;code&gt;pm2 restart all&lt;/code&gt;&lt;/pre&gt;Bingo, the error goes now the build is ready to download.&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-XfTPkG0KBzo/XuT2DgKLEQI/AAAAAAAACuQ/6R35gbP4FtQ5CgLcD75zxa5921Pexmq-QCLcBGAsYHQ/s1600/Screenshot_2020-06-13_21-22-20.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;l3mon apk download&quot; border=&quot;0&quot; data-original-height=&quot;361&quot; data-original-width=&quot;1123&quot; height=&quot;127&quot; src=&quot;https://1.bp.blogspot.com/-XfTPkG0KBzo/XuT2DgKLEQI/AAAAAAAACuQ/6R35gbP4FtQ5CgLcD75zxa5921Pexmq-QCLcBGAsYHQ/s400/Screenshot_2020-06-13_21-22-20.png&quot; title=&quot;l3mon apk download&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Now we can download the L3MON.apk in our system, and send it to our targeted device anyway and make a successful installation.&lt;br /&gt;&lt;br /&gt;After a successful installation it on targeted device and the phone user tries to open this L3MON will asks all the permission of devices and automatically hide itself from the app drawer.&lt;br /&gt;&lt;br /&gt;After this we got the connection with the device. We can check it on our Devices tab.&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-mtdwz73CzDc/XuXlakNNTcI/AAAAAAAACuc/REXvY6g4IDMjHIH0pO78OAO5v7tcuqBBQCLcBGAsYHQ/s1600/Screenshot_2020-06-14_14-22-47.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;489&quot; data-original-width=&quot;1142&quot; height=&quot;171&quot; src=&quot;https://1.bp.blogspot.com/-mtdwz73CzDc/XuXlakNNTcI/AAAAAAAACuc/REXvY6g4IDMjHIH0pO78OAO5v7tcuqBBQCLcBGAsYHQ/s400/Screenshot_2020-06-14_14-22-47.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Now we can control this phone from the manage button. Here in the following screenshot we are in the file manager of the phone. Now we can spy on this phone.&lt;br /&gt;&lt;br /&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-nJZ8VGWG50c/XufKzjaikPI/AAAAAAAACu8/RDFSWj7NniovULFHhpx-kj5BNq1C7zoqQCLcBGAsYHQ/s1600/Screenshot_2020-06-14_14-23-29.png&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;File manager accessing by L3MON&quot; border=&quot;0&quot; data-original-height=&quot;616&quot; data-original-width=&quot;1180&quot; height=&quot;208&quot; src=&quot;https://1.bp.blogspot.com/-nJZ8VGWG50c/XufKzjaikPI/AAAAAAAACu8/RDFSWj7NniovULFHhpx-kj5BNq1C7zoqQCLcBGAsYHQ/s400/Screenshot_2020-06-14_14-23-29.png&quot; title=&quot;File manager accessing by L3MON&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;We are in the file manager of victim device&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;Our downloaded data and recorded audio clips will be saved under &lt;span style=&quot;font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;&quot;&gt;assets/webpublic/client_downloads/&lt;/span&gt; directory.&lt;br /&gt;&lt;br /&gt;Our discussed method is for local network. To connect a device from internet we prefer to have a static IP address and forward our default port 22533 in our router settings or we can change the default port by changing &lt;a href=&quot;https://github.com/D3VL/L3MON/blob/acbc29be4db0bd2cf297dcbf61086fa6829c9e37/server/includes/const.js#L5-L6&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;these lines&lt;/a&gt; (inside &lt;span style=&quot;font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;&quot;&gt;includes/const.js&lt;/span&gt;).&lt;br /&gt;&lt;br /&gt;Using this method we can control phones connected in our same network. We also can control devices through internet by using ngrok services. &lt;b&gt;Configuring L3MON on VPS will make it portable and useful&lt;/b&gt;.&lt;br /&gt;&lt;br /&gt;&lt;h3 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;Disclaimer&lt;/span&gt;&lt;/h3&gt;&lt;span style=&quot;background-color: #cccccc;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;Provides no warranty with this software and will not be responsible for any direct or indirect damage caused due to the usage of this tool or this tutorial.&lt;br /&gt;L3MON is built and our article is documented for both Educational and Internal use ONLY&lt;/span&gt;&lt;/span&gt;.&lt;br /&gt;&lt;br /&gt;Getting any problem during installing or configuring L3MON ? &lt;span style=&quot;color: #ff00fe;&quot;&gt;&lt;b&gt;This l3MON tool has been archived by it&#39;s owner. Seems it will not updated and may not work. We are also closing our comment support on this tool&#39;s errors.&lt;/b&gt;&lt;/span&gt; For more tutorials like this subscribe our newsletter to get updated. Also we post updates on our &lt;b&gt;&lt;a href=&quot;https://twitter.com/KaliLinux_in&quot; target=&quot;_blank&quot;&gt;Twitter&lt;/a&gt;&lt;/b&gt; and &lt;b&gt;&lt;a href=&quot;https://github.com/jaykali&quot; target=&quot;_blank&quot;&gt;GitHub&lt;/a&gt;&lt;/b&gt;.&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='https://www.kalilinux.in/feeds/8739446751544522080/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.kalilinux.in/2020/06/l3mon-access-android-remotely-kali-linux.html#comment-form' title='50 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/8739446751544522080'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/8739446751544522080'/><link rel='alternate' type='text/html' href='https://www.kalilinux.in/2020/06/l3mon-access-android-remotely-kali-linux.html' title='L3MON -- Access Android Devices Remotely'/><author><name>Kali Linux</name><uri>http://www.blogger.com/profile/07345541575706459646</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//3.bp.blogspot.com/-Mb3EvSYi1Yg/YOL_LNs2xhI/AAAAAAAAFk4/aghHydKfmagtjPYLvn-SVVNEIJW10TdLACK4BGAYYCw/s113/kali%2Bdragon.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-86dY83uDPXs/XufB053um3I/AAAAAAAACuw/89vh5f30AGIgN3XAHoDajB99BzUYzWzlgCLcBGAsYHQ/s72-c/PicsArt_06-15-07.07.15.webp" height="72" width="72"/><thr:total>50</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6091241131056531264.post-386713319923376107</id><published>2021-10-05T18:29:00.001+05:30</published><updated>2021-10-05T18:29:17.669+05:30</updated><title type='text'>Where to hire react programmer and 3 essential skills to look for</title><content type='html'>&lt;p&gt;Hiring React.js developers for your tech project can be a tough job because it&#39;s one of the most popular JavaScript frameworks in the world. Facebook, Uber, Airbnb, Netflix, PwC, Amazon, Twitter, Udemy, and nearly 9,000 others worldwide use it for web, desktop, and mobile apps. To hire React programmer, you need to challenge the competition, and as you can imagine, the talent pool isn&#39;t infinite. In this article, we will show you where to hire React js developer for your business.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-_tjwD9eFCx0/YVxL_4YK7ZI/AAAAAAAAF_Q/qkUQAw_sqiM1rvFSaHE6mTSXAlYiVqqzgCLcBGAsYHQ/s626/react%2Bdeveloper.webp&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;hire react js developer&quot; border=&quot;0&quot; data-original-height=&quot;417&quot; data-original-width=&quot;626&quot; height=&quot;213&quot; src=&quot;https://1.bp.blogspot.com/-_tjwD9eFCx0/YVxL_4YK7ZI/AAAAAAAAF_Q/qkUQAw_sqiM1rvFSaHE6mTSXAlYiVqqzgCLcBGAsYHQ/w320-h213/react%2Bdeveloper.webp&quot; title=&quot;hire react js developer&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;React js is popular, and it is here to stay&lt;/span&gt;&lt;/h1&gt;&lt;p&gt;When the latest StackOverflow survey appeared, the statistics were more than clear: &lt;a href=&quot;https://insights.stackoverflow.com/survey/2021#section-most-popular-technologies-web-frameworks&quot; target=&quot;_blank&quot;&gt;React js has conquered the category &quot;Web Frameworks&quot;&lt;/a&gt;. React is a high-performance JavaScript framework. Its simple, component-based architecture allows developers to be more productive and code faster. The framework&#39;s minimal API is focused on solving performance issues, enabling lightning-fast rendering speeds with a small overall footprint.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;&lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Where to find React js developers for hire&lt;/span&gt;&lt;/h1&gt;&lt;p&gt;There are many ways to &lt;a href=&quot;https://procoders.tech/hire-react-js-developers/&quot; target=&quot;_blank&quot;&gt;hire React js developers&lt;/a&gt;. Some of them are cheaper, others - more efficient. After all, it all depends on the project size and the budget.&lt;/p&gt;&lt;h2 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Job sites&lt;/span&gt;&lt;/h2&gt;&lt;p&gt;You can hire React js developers from a job site. When hiring React developers, know that the job seekers who want to work in the office are often eligible to receive better benefits. However, this isn&#39;t always the case when hiring remotely. Remote staff members typically don&#39;t have access to company benefits like healthcare, which is why they&#39;re typically less expensive to hire.&lt;/p&gt;&lt;h2 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Freelance platforms&lt;/span&gt;&lt;/h2&gt;&lt;p&gt;Freelance platforms provide a great way to find a large pool of React JS developers at a low cost. Freelancers might not have the same company loyalty as full-time employees, but most will be able to produce results that meet or exceed hiring a full-time employee. Finding a quality freelancer on any of these platforms takes time and effort — make sure you browse all of your options before hiring anyone! When you employ someone, remember they&#39;re working for money — and if they think they&#39;ll get more elsewhere, they&#39;ll leave.&lt;/p&gt;&lt;h2 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Hire React programmer for an outstaffing agency&lt;/span&gt;&lt;/h2&gt;&lt;p&gt;Outstaffing agencies are the best of both worlds. They have all the resources of a full-fledge company while cutting down on other expenses that would take a toll on your budget. Their big talent pools, excellent management, and other resources help companies achieve their goals without breaking the bank.&lt;/p&gt;&lt;p&gt;Skills that you should look for when hiring React js developer&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;b&gt;Ability to work on other Javascript libraries&lt;/b&gt; — You have various options when hiring React developers, but what you want is someone with experience in the Javascript ecosystem. That way, they won&#39;t need to spend time and energy learning all of the intricacies of your library — they can dive right in and start delivering value.&lt;/li&gt;&lt;li&gt;&lt;b&gt;In-depth knowledge of React Js framework&lt;/b&gt; — One of the must-haves for developers is understanding React js concepts. Using JSX, understanding the component lifecycle, and working with the virtual DOM are necessary skills that every good developer should have. These abilities will get you started quickly on your projects.&lt;/li&gt;&lt;li&gt;&lt;b&gt;Ability to write good code&lt;/b&gt; — React js developers who want to create polished products should be familiar with the Google JavaScript Style Guide so they can follow the correct standard. This will help keep code readable, consistent, and scalable on large projects.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;While a React js developer might have the skillset to build a functional prototype, a good React js developer will be able to collect business requirements and turn them into a set of technical specs. Communication skills are important for this, as well as their ability to work in a team. In addition to creativity and the desire to learn, any success in this role will also depend on their problem-solving skills.&lt;/p&gt;&lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;In conclusion&lt;/span&gt;&lt;/h1&gt;&lt;p&gt;It is not an easy task to hire React programmer. Finding a great React js developer takes a lot of time and effort — but you don&#39;t have to work with a remote freelancer or a company, or a person from a different part of the world. A trusted technology partner knows everyone in the development community, so they can help you find your ideal hire. &lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='https://www.kalilinux.in/feeds/386713319923376107/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.kalilinux.in/2021/10/where-to-hire-react-programmer-and-3.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/386713319923376107'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/386713319923376107'/><link rel='alternate' type='text/html' href='https://www.kalilinux.in/2021/10/where-to-hire-react-programmer-and-3.html' title='Where to hire react programmer and 3 essential skills to look for'/><author><name>Kali Linux</name><uri>http://www.blogger.com/profile/07345541575706459646</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//3.bp.blogspot.com/-Mb3EvSYi1Yg/YOL_LNs2xhI/AAAAAAAAFk4/aghHydKfmagtjPYLvn-SVVNEIJW10TdLACK4BGAYYCw/s113/kali%2Bdragon.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-_tjwD9eFCx0/YVxL_4YK7ZI/AAAAAAAAF_Q/qkUQAw_sqiM1rvFSaHE6mTSXAlYiVqqzgCLcBGAsYHQ/s72-w320-h213-c/react%2Bdeveloper.webp" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6091241131056531264.post-5911640872002123672</id><published>2021-10-05T01:30:00.001+05:30</published><updated>2021-10-05T01:30:00.165+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Attack Strategies"/><category scheme="http://www.blogger.com/atom/ns#" term="Configure"/><title type='text'>How to Setup SQLi Penetration Testing Lab on Kali Linux</title><content type='html'>&lt;p&gt;In our some previous articles we discussed about some penetration testing labs, like &lt;a href=&quot;https://www.kalilinux.in/2020/07/easy-penetration-testing-lab-setup.html&quot; target=&quot;_blank&quot;&gt;PentestLab&lt;/a&gt; , &lt;a href=&quot;https://www.kalilinux.in/2020/01/setup-dvwa-kali-linux.html&quot; target=&quot;_blank&quot;&gt;DVWA&lt;/a&gt; where we can practice and improve our attacking skills. In today&#39;s article we are going to discuss about how to set SQLi lab on Kali Linux to test our SQL Injection skills. Advanced SQL Injection is still a major bug can be found on various sites. That because still learning and growing SQL Injection skills are profitable for cybersecurity experts and bug bounty hunters.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-uEwos7fdfLc/YVAZNhjhpXI/AAAAAAAAF8I/LF9tUqPG-cEyS_9Fyf3lq4JJMejZInMSwCLcBGAsYHQ/s1000/sqli%2Bthumbnail.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;install sqli lab on Kali Linux&quot; border=&quot;0&quot; data-original-height=&quot;606&quot; data-original-width=&quot;1000&quot; height=&quot;194&quot; src=&quot;https://1.bp.blogspot.com/-uEwos7fdfLc/YVAZNhjhpXI/AAAAAAAAF8I/LF9tUqPG-cEyS_9Fyf3lq4JJMejZInMSwCLcBGAsYHQ/w320-h194/sqli%2Bthumbnail.png&quot; title=&quot;install sqli lab on Kali Linux&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;For this lab setup we are going to use &lt;a href=&quot;https://github.com/Rinkish/Sqli_Edited_Version&quot; target=&quot;_blank&quot;&gt;SQLi_Edited&lt;/a&gt;, this is a upgraded fork of &lt;a href=&quot;https://github.com/Audi-1/sqli-labs&quot; target=&quot;_blank&quot;&gt;sqli-labs (Dhakkan Labs)&lt;/a&gt;. Before cloning it from GitHub let we move to our /var/www/html directory, we are going to clone it there to make things easy.&lt;p&gt;&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code class=&quot;ns&quot; style=&quot;outline: currentcolor none 0px; transition: all 0.3s ease 0s;&quot;&gt;cd /var/www/html&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;Here we need to clone the repository from GitHub by using following command:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code class=&quot;ns&quot; style=&quot;outline: currentcolor none 0px; transition: all 0.3s ease 0s;&quot;&gt;sudo git clone https://github.com/Rinkish/Sqli_Edited_Version&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;In the following screenshot we can see that this repository is successfully cloned to the directory.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-OrpoGO24SWk/YUXb6eFjzSI/AAAAAAAAF7A/CyXsRR8JhzE952vf_Q8VZlbUny-BPZ9WgCLcBGAsYHQ/s573/sqli%2Bgit%2Bclone.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;SQLi Lab git clonning&quot; border=&quot;0&quot; data-original-height=&quot;243&quot; data-original-width=&quot;573&quot; height=&quot;272&quot; src=&quot;https://1.bp.blogspot.com/-OrpoGO24SWk/YUXb6eFjzSI/AAAAAAAAF7A/CyXsRR8JhzE952vf_Q8VZlbUny-BPZ9WgCLcBGAsYHQ/w640-h272/sqli%2Bgit%2Bclone.png&quot; title=&quot;SQLi Lab git clonning&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Now we can go inside this directory by using following command:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code class=&quot;ns&quot; style=&quot;outline: currentcolor none 0px; transition: all 0.3s ease 0s;&quot;&gt;cd Sqli_Edited_Version&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;Here we use &lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;ls&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt; command to see all the files, as we can see in the following screenshot:&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-l7DlBFfm9PU/YUXdnXz7vJI/AAAAAAAAF7I/duuVv6AcjsQcl3sXpeuhCDUJFBMK249lACLcBGAsYHQ/s620/sqli%2Blab%2Bgit%2Bclone.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;SQLi labs git clonned&quot; border=&quot;0&quot; data-original-height=&quot;170&quot; data-original-width=&quot;620&quot; height=&quot;176&quot; src=&quot;https://1.bp.blogspot.com/-l7DlBFfm9PU/YUXdnXz7vJI/AAAAAAAAF7I/duuVv6AcjsQcl3sXpeuhCDUJFBMK249lACLcBGAsYHQ/w640-h176/sqli%2Blab%2Bgit%2Bclone.png&quot; title=&quot;SQLi labs git clonned&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Here we can see the directory named &quot;&lt;u&gt;&lt;i&gt;sqlilabs&lt;/i&gt;&lt;/u&gt;&quot;, Now we move it on the previous directory and rename it for easy to open by applying following command:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code class=&quot;ns&quot; style=&quot;outline: currentcolor none 0px; transition: all 0.3s ease 0s;&quot;&gt;sudo mv sqlilabs/ ../sqli&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;Then we back to our previous directory by using following command:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code class=&quot;ns&quot; style=&quot;outline: currentcolor none 0px; transition: all 0.3s ease 0s;&quot;&gt;cd ..&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;We can see the process in the following screenshot:&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-5EmXAgrFKAw/YUsjMTzXfII/AAAAAAAAF7Q/UVGUp2d-f8Y4d6kDn2Cq6Vqqke5fpNLcgCLcBGAsYHQ/s609/moving%2Bdirectory%2Bof%2Bsqlilabs.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;moving sqlilabs directory&quot; border=&quot;0&quot; data-original-height=&quot;208&quot; data-original-width=&quot;609&quot; height=&quot;218&quot; src=&quot;https://1.bp.blogspot.com/-5EmXAgrFKAw/YUsjMTzXfII/AAAAAAAAF7Q/UVGUp2d-f8Y4d6kDn2Cq6Vqqke5fpNLcgCLcBGAsYHQ/w640-h218/moving%2Bdirectory%2Bof%2Bsqlilabs.png&quot; title=&quot;moving sqlilabs directory&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Now we need to edit database credential file named &quot;&lt;u&gt;&lt;i&gt;db-creds.inc&lt;/i&gt;&lt;/u&gt;&quot;, which is located under &quot;&lt;u&gt;&lt;i&gt;sqli/sql-connections/db-creds.inc&lt;/i&gt;&lt;/u&gt;&quot; and put our user name and password for database. To edit it we are going to use infamous Linux text editor nano.&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code class=&quot;ns&quot; style=&quot;outline: currentcolor none 0px; transition: all 0.3s ease 0s;&quot;&gt;sudo nano sqli/sql-connections/db-creds.inc&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;In the following screenshot we can see the default configuration of it, where the database user is root and database password is blank.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-MkiiHmnvfbw/YUslFZsAFyI/AAAAAAAAF7Y/iKEf5M0DGhA0GZOW_kK5LXy3edVdm2mpgCLcBGAsYHQ/s679/sqlilabs%2Bdatabse%2Busername%2Band%2Bpassword%2Bchanging.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;sqlilabs databse username and password changing&quot; border=&quot;0&quot; data-original-height=&quot;277&quot; data-original-width=&quot;679&quot; height=&quot;262&quot; src=&quot;https://1.bp.blogspot.com/-MkiiHmnvfbw/YUslFZsAFyI/AAAAAAAAF7Y/iKEf5M0DGhA0GZOW_kK5LXy3edVdm2mpgCLcBGAsYHQ/w640-h262/sqlilabs%2Bdatabse%2Busername%2Band%2Bpassword%2Bchanging.png&quot; title=&quot;sqlilabs databse username and password changing&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Now we modify this as per our Kali Linux system user, here we are using user &quot;kali&quot; and we can also choose a password as we want, as shown in the following screenshot:&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-AURBjGxejaY/YU7HRLGAg9I/AAAAAAAAF7g/3tdCHBTwtGgnwaFKR7mGpcTx2OXub8CGwCLcBGAsYHQ/s539/sql%2Binjection%2Blab%2Bsetup.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;sql injection lab setup&quot; border=&quot;0&quot; data-original-height=&quot;272&quot; data-original-width=&quot;539&quot; height=&quot;322&quot; src=&quot;https://1.bp.blogspot.com/-AURBjGxejaY/YU7HRLGAg9I/AAAAAAAAF7g/3tdCHBTwtGgnwaFKR7mGpcTx2OXub8CGwCLcBGAsYHQ/w640-h322/sql%2Binjection%2Blab%2Bsetup.png&quot; title=&quot;sql injection lab setup&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Now we save and close it by typing CTRL+X, then Y, then Enter ↲.&lt;/p&gt;&lt;p&gt;Now we need to setup our mySQL database for our Kali Linux system. MySQL comes preloaded with Kali Linux. We need to open up our MariaDB as root user by using following command:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code class=&quot;ns&quot; style=&quot;outline: currentcolor none 0px; transition: all 0.3s ease 0s;&quot;&gt;sudo mysql -u root&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;Then we need to create our user with password, in our case our user will be &#39;&lt;b&gt;kali&lt;/b&gt;&#39; and password will be &#39;&lt;b&gt;1234&lt;/b&gt;&#39;. So the command for us will be following:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code class=&quot;ns&quot; style=&quot;outline: currentcolor none 0px; transition: all 0.3s ease 0s;&quot;&gt;CREATE USER &#39;kali&#39;@&#39;localhost&#39; IDENTIFIED BY &#39;1234&#39;;&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;Now our user is created as we can see in the following screenshot:&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-zdVqIqeEe8s/YU8WxQ_SQ_I/AAAAAAAAF7w/gz1Cc1rU_fMgNDsPhQoAluUqN1JPr9IJACLcBGAsYHQ/s610/creating%2Buser%2Bon%2Bmysql%2BKali%2BLinux.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;creating user on mysql Kali Linux&quot; border=&quot;0&quot; data-original-height=&quot;206&quot; data-original-width=&quot;610&quot; height=&quot;216&quot; src=&quot;https://1.bp.blogspot.com/-zdVqIqeEe8s/YU8WxQ_SQ_I/AAAAAAAAF7w/gz1Cc1rU_fMgNDsPhQoAluUqN1JPr9IJACLcBGAsYHQ/w640-h216/creating%2Buser%2Bon%2Bmysql%2BKali%2BLinux.png&quot; title=&quot;creating user on mysql Kali Linux&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Now we need to grant all permission to user &#39;&lt;b&gt;kali&lt;/b&gt;&#39; by using following command:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code class=&quot;ns&quot; style=&quot;outline: currentcolor none 0px; transition: all 0.3s ease 0s;&quot;&gt;GRANT ALL PRIVILEGES ON *.* TO &#39;kali&#39;@&#39;localhost&#39;;&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;The screenshot of the above command is following:&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-R0KQPK3H7E8/YU8XeILQhyI/AAAAAAAAF74/wIA8UQpS4nsmdtvNhUy_kbtQ8ZszYl8_ACLcBGAsYHQ/s582/grant%2Bpermission%2Bfor%2Bmysql%2Bdatabase%2Buser%2Bon%2BKali%2BLinux.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;grant permission for mysql database user on Kali Linux&quot; border=&quot;0&quot; data-original-height=&quot;67&quot; data-original-width=&quot;582&quot; height=&quot;74&quot; src=&quot;https://1.bp.blogspot.com/-R0KQPK3H7E8/YU8XeILQhyI/AAAAAAAAF74/wIA8UQpS4nsmdtvNhUy_kbtQ8ZszYl8_ACLcBGAsYHQ/w640-h74/grant%2Bpermission%2Bfor%2Bmysql%2Bdatabase%2Buser%2Bon%2BKali%2BLinux.png&quot; title=&quot;grant permission for mysql database user on Kali Linux&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Database setup is done, now we can exit from MariaDB by using CTRL+C keys and run following command to start our MySQL services:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code class=&quot;ns&quot; style=&quot;outline: currentcolor none 0px; transition: all 0.3s ease 0s;&quot;&gt;sudo service mysql start&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;Our setup is almost complete now we need to run our apache2 server (comes pre-loaded with Kali). We start our Apache2 web server by using following command:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code class=&quot;ns&quot; style=&quot;outline: currentcolor none 0px; transition: all 0.3s ease 0s;&quot;&gt;sudo service apache2 start&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;Now our web server is running, we can see it by navigating to &lt;a href=&quot;http://127.0.0.1/sqli/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;localhost/sqli&lt;/a&gt; URL from our browser. Our SQL Injection lab will open in front of us as we can see in the following screenshot:&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-2r38u8JHfJo/YU7ODBQBZyI/AAAAAAAAF7o/tkr5IE64yBItDM6xh0PWk9vOqypR322vwCLcBGAsYHQ/s923/sqli%2Blab%2Bchallanges.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;sqli lab challanges&quot; border=&quot;0&quot; data-original-height=&quot;402&quot; data-original-width=&quot;923&quot; height=&quot;278&quot; src=&quot;https://1.bp.blogspot.com/-2r38u8JHfJo/YU7ODBQBZyI/AAAAAAAAF7o/tkr5IE64yBItDM6xh0PWk9vOqypR322vwCLcBGAsYHQ/w640-h278/sqli%2Blab%2Bchallanges.png&quot; title=&quot;sqli lab challanges&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Here for the very first time we need to &#39;Setup/reset database for labs&#39;. After clicking there our database setup will start as we can see in the following screenshot:&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-ikSjxlNMWF0/YU8aueth1rI/AAAAAAAAF8A/28GTjQCJTIg_k-JnDaYu60MJ6yWXWynnACLcBGAsYHQ/s1019/SQLi%2Blab%2Bdatabbase%2Bconnecting.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;SQLi labs database connecting&quot; border=&quot;0&quot; data-original-height=&quot;675&quot; data-original-width=&quot;1019&quot; height=&quot;265&quot; src=&quot;https://1.bp.blogspot.com/-ikSjxlNMWF0/YU8aueth1rI/AAAAAAAAF8A/28GTjQCJTIg_k-JnDaYu60MJ6yWXWynnACLcBGAsYHQ/w400-h265/SQLi%2Blab%2Bdatabbase%2Bconnecting.png&quot; title=&quot;SQLi labs database connecting&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Now a page will open up in our browser which is an indication that we can access different kinds of Sqli challenges, as we can see in the following screenshot:&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://4.bp.blogspot.com/-403T-oGpSw4/XNBYWuzVZFI/AAAAAAAAeRI/kP6OltomyacVyI4Lggmn-Zte8BfG5DFlwCLcBGAs/s953/27.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;SQLi labs on Kali Linux&quot; border=&quot;0&quot; data-original-height=&quot;568&quot; data-original-width=&quot;953&quot; height=&quot;382&quot; src=&quot;https://4.bp.blogspot.com/-403T-oGpSw4/XNBYWuzVZFI/AAAAAAAAeRI/kP6OltomyacVyI4Lggmn-Zte8BfG5DFlwCLcBGAs/w640-h382/27.png&quot; title=&quot;SQLi labs on Kali Linux&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Here we can solve various types of SQL injection challenges, by solving them our SQL Injection skill will be improved. For an example, to start the basic SQL Injection challenge we need to click on Lesson 1.&lt;br /&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://2.bp.blogspot.com/-llJnOGNDPgY/XNBYWW5_K2I/AAAAAAAAeRE/B7svXkR0Q94YCMbEFINfkU-A6rwsErFmACLcBGAs/s925/28.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;SQLi Labs basic challenge 1&quot; border=&quot;0&quot; data-original-height=&quot;410&quot; data-original-width=&quot;925&quot; height=&quot;284&quot; src=&quot;https://2.bp.blogspot.com/-llJnOGNDPgY/XNBYWW5_K2I/AAAAAAAAeRE/B7svXkR0Q94YCMbEFINfkU-A6rwsErFmACLcBGAs/w640-h284/28.png&quot; title=&quot;SQLi Labs basic challenge 1&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;This is all for this article. We had learnt how we can &lt;u&gt;&lt;i&gt;&lt;b&gt;set up SQL Injection labs on our Kali Linux&lt;/b&gt;&lt;/i&gt;&lt;/u&gt; system and practice our SQL Injection skills from basics to advance.&lt;/p&gt;&lt;p&gt;Love our articles? Make sure to &lt;b&gt;follow us&lt;/b&gt; on &lt;a class=&quot;d-link&quot; href=&quot;https://twitter.com/KaliLinux_in&quot; target=&quot;_blank&quot;&gt;Twitter&lt;/a&gt; and &lt;a class=&quot;d-link&quot; href=&quot;https://github.com/jaykali&quot; target=&quot;_blank&quot;&gt;GitHub&lt;/a&gt;, we post article updates there. To join our &lt;b&gt;KaliLinuxIn&lt;/b&gt; family, join our &lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;a class=&quot;d-link&quot; href=&quot;https://t.me/kalilinuxin&quot; target=&quot;_blank&quot;&gt;Telegram Group&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;. We are trying to build a community for Linux and Cybersecurity. For anything we always happy to help everyone on the &lt;span style=&quot;color: red;&quot;&gt;comment section&lt;/span&gt;. As we know our comment section is always open to everyone. We read each and every comment and &lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;we always reply&lt;/span&gt;&lt;/b&gt;.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='https://www.kalilinux.in/feeds/5911640872002123672/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.kalilinux.in/2021/09/how-to-setup-sql-injection-labs-kali-linux.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/5911640872002123672'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/5911640872002123672'/><link rel='alternate' type='text/html' href='https://www.kalilinux.in/2021/09/how-to-setup-sql-injection-labs-kali-linux.html' title='How to Setup SQLi Penetration Testing Lab on Kali Linux'/><author><name>Kali Linux</name><uri>http://www.blogger.com/profile/07345541575706459646</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//3.bp.blogspot.com/-Mb3EvSYi1Yg/YOL_LNs2xhI/AAAAAAAAFk4/aghHydKfmagtjPYLvn-SVVNEIJW10TdLACK4BGAYYCw/s113/kali%2Bdragon.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-uEwos7fdfLc/YVAZNhjhpXI/AAAAAAAAF8I/LF9tUqPG-cEyS_9Fyf3lq4JJMejZInMSwCLcBGAsYHQ/s72-w320-h194-c/sqli%2Bthumbnail.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6091241131056531264.post-450752224945705399</id><published>2021-09-30T18:50:00.001+05:30</published><updated>2021-09-30T18:50:00.171+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Password Attacks"/><title type='text'>Hashcat -- Crack Passwords in Minutes</title><content type='html'>&lt;div&gt;&lt;p&gt;Hashcat is an advanced free (License: MIT) multi-threaded password recovery tool and it is world&#39;s fastest password cracker and recovery utility, which supports multiple unique attack modes of attacks for more than 200 highly optimized hashing algorithms. Hashcat currently supports CPUs and GPUs and other hardware accelerators on Linux, Windows, and OSX, and has facilities to help enable distributed password cracking.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-9t1jmkJgxX8/YUHu4qhjqMI/AAAAAAAAF64/prRPsnmXshA8EMosIQnUIF8yk3xqAPsmACLcBGAsYHQ/s1000/hashcat%2Bthumbnail.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;hashcat on Kali Linux&quot; border=&quot;0&quot; data-original-height=&quot;606&quot; data-original-width=&quot;1000&quot; height=&quot;194&quot; src=&quot;https://1.bp.blogspot.com/-9t1jmkJgxX8/YUHu4qhjqMI/AAAAAAAAF64/prRPsnmXshA8EMosIQnUIF8yk3xqAPsmACLcBGAsYHQ/w320-h194/hashcat%2Bthumbnail.png&quot; title=&quot;hashcat on Kali Linux&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;a href=&quot;https://hashcat.net/hashcat/&quot; target=&quot;_blank&quot;&gt;Hashcat&lt;/a&gt; comes pre-installed on our Kali Linux system, So we don&#39;t need to install it, but if installation is required we can use &lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;sudo apt install hashcat&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt; command.&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Features of Hashcat&lt;/span&gt;&lt;/h1&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;World&#39;s fastest password cracker.&lt;/li&gt;&lt;li&gt;World&#39;s first and only in-kernel rule engine.&lt;/li&gt;&lt;li&gt;Free and open source.&lt;/li&gt;&lt;li&gt;Multi-OS (Linux, Windows and macOS).&lt;/li&gt;&lt;li&gt;Multi-Platform (CPU, GPU, APU, etc., everything that comes with an OpenCL runtime).&lt;/li&gt;&lt;li&gt;Multi-Hash (Cracking multiple hashes at the same time).&lt;/li&gt;&lt;li&gt;Multi-Devices (Utilizing multiple devices in same system).&lt;/li&gt;&lt;li&gt;Multi-Device-Types (Utilizing mixed device types in same system).&lt;/li&gt;&lt;li&gt;Supports password candidate brain functionality.&lt;/li&gt;&lt;li&gt;Supports distributed cracking networks (using overlay).&lt;/li&gt;&lt;li&gt;Supports interactive pause / resume.&lt;/li&gt;&lt;li&gt;Supports sessions.&lt;/li&gt;&lt;li&gt;Supports restore.&lt;/li&gt;&lt;li&gt;Supports reading password candidates from file and stdin.&lt;/li&gt;&lt;li&gt;Supports hex-salt and hex-charset.&lt;/li&gt;&lt;li&gt;Supports automatic performance tuning.&lt;/li&gt;&lt;li&gt;Supports automatic keyspace ordering markov-chains.&lt;/li&gt;&lt;li&gt;Built-in benchmarking system.&lt;/li&gt;&lt;li&gt;Integrated thermal watchdog.&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://hashcat.net/hashcat/#features-algos&quot; target=&quot;_blank&quot;&gt;350+ Hash-types&lt;/a&gt; implemented with performance in mind.&lt;/li&gt;&lt;li&gt;... and much more. &lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;p&gt;Hashcat offers multiple unique attack modes for cracking passwords. Those are following:&amp;nbsp;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Brute-Force attack&lt;/li&gt;&lt;li&gt;Combinator attack&lt;/li&gt;&lt;li&gt;Dictionary attack&lt;/li&gt;&lt;li&gt;Fingerprint attack&lt;/li&gt;&lt;li&gt;Hybrid attack&lt;/li&gt;&lt;li&gt;Mask attack&lt;/li&gt;&lt;li&gt;Permutation attack&lt;/li&gt;&lt;li&gt;Rule-based attack&lt;/li&gt;&lt;li&gt;Table-Lookup attack&lt;/li&gt;&lt;li&gt;Toggle-Case attack&lt;/li&gt;&lt;li&gt;PRINCE attack&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Now without wasting any more time lets dive into Hashcat.&lt;/p&gt;&lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Hashcat on Kali Linux&lt;/span&gt;&lt;/h1&gt;&lt;p&gt;As we told Hashcat comes pre-installed with a Kali Linux and it is multi-threaded so first let we benchmark our system by using following command:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;hashcat -b&lt;/pre&gt;&lt;p&gt;In the following screenshot we can see the benchmark of our system and get an idea how it can perform while cracking various types of hashes.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-lhUfCFLsFhk/YT7iq88CGmI/AAAAAAAAF6I/yWoNzf7qLKAjzGQouUpk1SKJ4I7JYuR6gCLcBGAsYHQ/s1248/benchmark%2Bhashcat.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;benchmark of hashcat&quot; border=&quot;0&quot; data-original-height=&quot;712&quot; data-original-width=&quot;1248&quot; height=&quot;366&quot; src=&quot;https://1.bp.blogspot.com/-lhUfCFLsFhk/YT7iq88CGmI/AAAAAAAAF6I/yWoNzf7qLKAjzGQouUpk1SKJ4I7JYuR6gCLcBGAsYHQ/w640-h366/benchmark%2Bhashcat.png&quot; title=&quot;benchmark of hashcat&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Here we can get an idea about the performance of our system. Let&#39;s run this tool to crack some hashes. Here we have collected some hashed on a text file. For educational purposes we just generated these hashed not collected from any website&#39;s database.&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-EXOfiVpybUc/YT7qsw1MrII/AAAAAAAAF6Q/eNozZMKzhbUhERX0LTYP29-MfuN6t6kuACLcBGAsYHQ/s363/hashes.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;hashes list on our system&quot; border=&quot;0&quot; data-original-height=&quot;213&quot; data-original-width=&quot;363&quot; height=&quot;235&quot; src=&quot;https://1.bp.blogspot.com/-EXOfiVpybUc/YT7qsw1MrII/AAAAAAAAF6Q/eNozZMKzhbUhERX0LTYP29-MfuN6t6kuACLcBGAsYHQ/w400-h235/hashes.png&quot; title=&quot;hashes list on our system&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Now we can crack these using Hashcat, and store the output in a craced.txt file by applying following command:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;hashcat -m 0 -a 0 -o cracked.txt hashes.txt /usr/share/seclists/Passwords/Common-Credentials/10k-most-common.txt&lt;/pre&gt;&lt;p&gt;Let&#39;s discuss about the above command, in this command we have used &lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;-m&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt; flag to specify the hash type, &lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;-a&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt; for attack mode and &lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;-o&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt; for output file, here we named our output file &#39;cracked.txt&#39;, then we give the target hash file to crack named &#39;hashes.txt&#39;, at last we specify the wordlist file to be used. In the following screenshot we can see that hashcat finishes the cracking job.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-__aaKeM0zzA/YUCU1B4MSpI/AAAAAAAAF6Y/3Z85RUaR1BAmtmL7yFFXYqQZr0H0x1FggCLcBGAsYHQ/s924/hashcat%2Bwork%2Bdone.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;hashcat finishes cracking passwords&quot; border=&quot;0&quot; data-original-height=&quot;437&quot; data-original-width=&quot;924&quot; height=&quot;302&quot; src=&quot;https://1.bp.blogspot.com/-__aaKeM0zzA/YUCU1B4MSpI/AAAAAAAAF6Y/3Z85RUaR1BAmtmL7yFFXYqQZr0H0x1FggCLcBGAsYHQ/w640-h302/hashcat%2Bwork%2Bdone.png&quot; title=&quot;hashcat finishes cracking passwords&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Let&#39;s see our output file (cracked.txt).&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-HmIOrSqFPus/YUCVZiMC-5I/AAAAAAAAF6g/H9EU5PoqXIEEmixQsOwTM-0sQXtdggvuACLcBGAsYHQ/s378/hashcat%2Bpassword%2Brecovered.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;hashcat password recovered&quot; border=&quot;0&quot; data-original-height=&quot;119&quot; data-original-width=&quot;378&quot; height=&quot;202&quot; src=&quot;https://1.bp.blogspot.com/-HmIOrSqFPus/YUCVZiMC-5I/AAAAAAAAF6g/H9EU5PoqXIEEmixQsOwTM-0sQXtdggvuACLcBGAsYHQ/w640-h202/hashcat%2Bpassword%2Brecovered.png&quot; title=&quot;hashcat password recovered&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;In the above screenshot we can see that hashcat cracked the hashes. Here for the new readers, in this attack mode we can crack those password hashes if the plaintext of the hashes is available in the wordlist file. Using bigger wordlist file will increase the chance to crack hashes.&lt;p&gt;&lt;/p&gt;&lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Hashcat &amp;amp; Type of Hashes &amp;amp; Attacks&lt;/span&gt;&lt;br /&gt;&lt;/h1&gt;&lt;p&gt;In the above we saw that we need to specify our attack modes and type of hashes we want to crack. These attack modes and hashes are refereed by numbers. Here we are giving hashcat supported all numbers that referees to the attack modes and the type of hashes (as Sep 2021, update of Hashcat tool may include some new things).&lt;/p&gt;&lt;h2 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Attack Types of Hashcat&lt;/span&gt;&lt;/h2&gt;&lt;p&gt;&amp;nbsp; 0 | Straight&lt;br /&gt;&amp;nbsp; 1 | Combination&lt;br /&gt;&amp;nbsp; 3 | Brute-force&lt;br /&gt;&amp;nbsp; 6 | Hybrid Wordlist + Mask&lt;br /&gt;&amp;nbsp; 7 | Hybrid Mask + Wordlist&lt;/p&gt;&lt;h2 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Hash types in Hashcat&lt;/span&gt;&lt;/h2&gt;&lt;p&gt;Hashcat supports so much types of hashes if we include all them here then this article will very lengthy. We encourage to use &lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;hashcat - h&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt; command on our Kali Linux system to get all the numbers corresponding to the hash type (Uff.. It&#39;s really large 😫).&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-06nFVzs9msI/YUCb4kIC1JI/AAAAAAAAF6o/6OSux5H9NbsjFpxljsR4WEciaq29QGfLgCLcBGAsYHQ/s1366/hash%2Btypes%2Bin%2Bhashcat.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;types of hashes on hashcat&quot; border=&quot;0&quot; data-original-height=&quot;768&quot; data-original-width=&quot;1366&quot; height=&quot;360&quot; src=&quot;https://1.bp.blogspot.com/-06nFVzs9msI/YUCb4kIC1JI/AAAAAAAAF6o/6OSux5H9NbsjFpxljsR4WEciaq29QGfLgCLcBGAsYHQ/w640-h360/hash%2Btypes%2Bin%2Bhashcat.png&quot; title=&quot;types of hashes on hashcat&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Whenever we are trying to crack a hash we have to know the type of the hash. We can use &lt;a href=&quot;https://www.kalilinux.in/2019/03/hash-id-hash-identifier.html&quot; target=&quot;_blank&quot;&gt;hash-id&lt;/a&gt; tool to know the type of hash. Then we need to choose our attack type and wordlist. That&#39;s all it&#39;s not hard.&lt;/p&gt;&lt;p&gt;This is all about Hashcat, and how we can use Hashcat to crack passwords on our Kali Linux. Hashcat (#🐈) is really a very widely used tool for cracking passwords.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Love our articles?&lt;/b&gt; Make sure to &lt;b&gt;follow us&lt;/b&gt; on &lt;a class=&quot;d-link&quot; href=&quot;https://twitter.com/KaliLinux_in&quot; target=&quot;_blank&quot;&gt;Twitter&lt;/a&gt; and &lt;a class=&quot;d-link&quot; href=&quot;https://github.com/jaykali&quot; target=&quot;_blank&quot;&gt;GitHub&lt;/a&gt;, we post article updates there. To join our &lt;b&gt;KaliLinuxIn&lt;/b&gt; family, join our &lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;a class=&quot;d-link&quot; href=&quot;https://t.me/kalilinuxin&quot; target=&quot;_blank&quot;&gt;Telegram Group&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;. We are trying to build a community for Linux and Cybersecurity. For anything we always happy to help everyone on the &lt;span style=&quot;color: red;&quot;&gt;comment section&lt;/span&gt;. As we know our comment section is always open to everyone. We read each and every comment and &lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;we always reply&lt;/span&gt;&lt;/b&gt;.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='https://www.kalilinux.in/feeds/450752224945705399/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.kalilinux.in/2021/09/hashcat-crack-.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/450752224945705399'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/450752224945705399'/><link rel='alternate' type='text/html' href='https://www.kalilinux.in/2021/09/hashcat-crack-.html' title='Hashcat -- Crack Passwords in Minutes'/><author><name>Kali Linux</name><uri>http://www.blogger.com/profile/07345541575706459646</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//3.bp.blogspot.com/-Mb3EvSYi1Yg/YOL_LNs2xhI/AAAAAAAAFk4/aghHydKfmagtjPYLvn-SVVNEIJW10TdLACK4BGAYYCw/s113/kali%2Bdragon.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-9t1jmkJgxX8/YUHu4qhjqMI/AAAAAAAAF64/prRPsnmXshA8EMosIQnUIF8yk3xqAPsmACLcBGAsYHQ/s72-w320-h194-c/hashcat%2Bthumbnail.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6091241131056531264.post-7958305459274063494</id><published>2021-09-26T01:30:00.001+05:30</published><updated>2021-09-26T01:30:00.149+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Attack Strategies"/><category scheme="http://www.blogger.com/atom/ns#" term="Configure"/><category scheme="http://www.blogger.com/atom/ns#" term="Custom Tools For Kali Linux"/><title type='text'>How to Install &amp; Use Ngrok on Kali Linux</title><content type='html'>&lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;What is Ngrok ?&lt;/span&gt;&lt;/h1&gt;&lt;p&gt;&lt;b&gt;Ngrok&lt;/b&gt; is a multi-platform application that provides us to forward our local development server to the internet without &lt;b&gt;port forwarding&lt;/b&gt;. Ngrok hosts our locally hosted web server in to a subdomain of ngrok.com. That means we can easily show our localhost in the internet without owning &lt;b&gt;domain names/static IP or port forwarding&lt;/b&gt;.&lt;/p&gt;&lt;p&gt;Ngrok is a very good tool for the developers to check and show the projects to the clients before launching the project. But as everything it also be misused by the bad guys. They always trying to host their localhost phishing page on Ngrok to capture victims on the internet. So as a cybersecurity expert we need to look up on this Ngrok.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-7JzLzWhPppM/YTxZfUh4J6I/AAAAAAAAF6A/NrtJzQ2cW1Yc-pRmqBJYGK2pvkka7Z7VgCLcBGAsYHQ/s1200/ngrok.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;How to install ngrok on Kali Linux&quot; border=&quot;0&quot; data-original-height=&quot;750&quot; data-original-width=&quot;1200&quot; height=&quot;200&quot; src=&quot;https://1.bp.blogspot.com/-7JzLzWhPppM/YTxZfUh4J6I/AAAAAAAAF6A/NrtJzQ2cW1Yc-pRmqBJYGK2pvkka7Z7VgCLcBGAsYHQ/w320-h200/ngrok.png&quot; title=&quot;How to install ngrok on Kali Linux&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;Warning:-&lt;/b&gt;&lt;/span&gt; Learning is the most beneficial way to protect everyone in the cybersecurity field, so our this article will focus on educational things. Ngrok is like a knife, knife is created for helping people to cut vegetables, but bad guys misuse it. Same for Ngrok also, it is created to help developers but bad guys misuse it. So don&#39;t try to misuse it against anyone. We will not responsible for that.&lt;/p&gt;&lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Download &amp;amp; Configure Ngrok on Kali Linux&lt;/span&gt;&lt;/h1&gt;&lt;p&gt;To install Ngrok on our Kali Linux system we need to open our browser and navigate to the &lt;a href=&quot;https://ngrok.com/download&quot; target=&quot;_blank&quot;&gt;official Ngrok&#39;s download page&lt;/a&gt;. Then we can see the webpage like the following screenshot:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-xS4wtwXgdZs/YTizZBec-LI/AAAAAAAAF3w/2XQYf44XhbwXlr9liZ4yA4BYfS1WgDVEgCLcBGAsYHQ/s1290/ngrok%2Bdownload%2Bpage.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;ngrok download page&quot; border=&quot;0&quot; data-original-height=&quot;738&quot; data-original-width=&quot;1290&quot; height=&quot;366&quot; src=&quot;https://1.bp.blogspot.com/-xS4wtwXgdZs/YTizZBec-LI/AAAAAAAAF3w/2XQYf44XhbwXlr9liZ4yA4BYfS1WgDVEgCLcBGAsYHQ/w640-h366/ngrok%2Bdownload%2Bpage.png&quot; title=&quot;ngrok download page&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Here we need to click on &quot;Download for Linux&quot;, because we are using Linux. For other OS we can go on the &quot;More Options&quot;. After clicking on download we can see that download is started.&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-E9mYUfCWuXg/YTi1QecbCuI/AAAAAAAAF34/ZzLeMbPWVWUdGxNoX0T3urW1RZii97xIACLcBGAsYHQ/s505/download%2Bngrok.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;download ngrok&quot; border=&quot;0&quot; data-original-height=&quot;331&quot; data-original-width=&quot;505&quot; height=&quot;210&quot; src=&quot;https://1.bp.blogspot.com/-E9mYUfCWuXg/YTi1QecbCuI/AAAAAAAAF34/ZzLeMbPWVWUdGxNoX0T3urW1RZii97xIACLcBGAsYHQ/w320-h210/download%2Bngrok.png&quot; title=&quot;download ngrok&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;After download the starting it may not take much time with decent internet. The ZIP file will be downloaded on our &quot;Downloads&quot; directory. We need to go to the &quot;Downloads&quot; directory and decompress the compressed file.&lt;/p&gt;&lt;p&gt;We open the terminal and use following command to go to our &quot;Downloads&quot; directory.&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code class=&quot;ns&quot; style=&quot;outline: currentcolor none 0px; transition: all 0.3s ease 0s;&quot;&gt;cd Downloads&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;Then we unzip the downloaded ZIP file by using following command:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;unzip ngrok-stable*zip&lt;/pre&gt;&lt;p&gt;In the following screenshot we can see that our zip compressed file is extracted.&lt;br /&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-4RFsSJRD35k/YTi7NjFvF6I/AAAAAAAAF4A/N382H8_Lk5w97SDICCpLyh9PgqBKnfnDwCLcBGAsYHQ/s424/extracting%2Bngrok.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;ngrok zip extracting&quot; border=&quot;0&quot; data-original-height=&quot;189&quot; data-original-width=&quot;424&quot; height=&quot;286&quot; src=&quot;https://1.bp.blogspot.com/-4RFsSJRD35k/YTi7NjFvF6I/AAAAAAAAF4A/N382H8_Lk5w97SDICCpLyh9PgqBKnfnDwCLcBGAsYHQ/w640-h286/extracting%2Bngrok.png&quot; title=&quot;ngrok zip extracting&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Now our ngrok file is decompressed. Before running it we need to give it executable permission by using following command:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;chmod +x ngrok&lt;/pre&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-vL326rz8-Ew/YTw7B26PcdI/AAAAAAAAF4g/xRapIxzLkBQWmus5x_rpyF72D2xkGeU4ACLcBGAsYHQ/s266/ngrok%2Bchmod%2Bpermission.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;executable permission ngrok&quot; border=&quot;0&quot; data-original-height=&quot;85&quot; data-original-width=&quot;266&quot; height=&quot;128&quot; src=&quot;https://1.bp.blogspot.com/-vL326rz8-Ew/YTw7B26PcdI/AAAAAAAAF4g/xRapIxzLkBQWmus5x_rpyF72D2xkGeU4ACLcBGAsYHQ/w400-h128/ngrok%2Bchmod%2Bpermission.png&quot; title=&quot;executable permission ngrok&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Now we are all set to run. But wait, we need to setup Ngrok before running. We need to set authentication with Ngrok API token. Where I can get my token? Well for that we need to sign up on Ngrok website. Lets navigate to &lt;a href=&quot;https://dashboard.ngrok.com/signup&quot; target=&quot;_blank&quot;&gt;Ngrok signup page&lt;/a&gt; on our browser.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-u0Rao8PsXqc/YTw8yS72hwI/AAAAAAAAF4o/wvHl-k1Fyt4UtEhyF0efyUA-ISTEKrshgCLcBGAsYHQ/s869/ngrok%2Bsign%2Bup.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;ngrok signup page&quot; border=&quot;0&quot; data-original-height=&quot;523&quot; data-original-width=&quot;869&quot; height=&quot;241&quot; src=&quot;https://1.bp.blogspot.com/-u0Rao8PsXqc/YTw8yS72hwI/AAAAAAAAF4o/wvHl-k1Fyt4UtEhyF0efyUA-ISTEKrshgCLcBGAsYHQ/w400-h241/ngrok%2Bsign%2Bup.png&quot; title=&quot;ngrok signup page&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Here we need to fill up our name and email and choose a password. If we want we can use disposable mail address to login and verify our mail address we don&#39;t need to give our own mail address.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-5eSfw61YM3I/YTw91RGv_cI/AAAAAAAAF4w/LDkV72pQELgewhafCgsu5VkZyCnLxuCHQCLcBGAsYHQ/s1353/ngrok%2Blogin.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;logged in on ngrok&quot; border=&quot;0&quot; data-original-height=&quot;509&quot; data-original-width=&quot;1353&quot; height=&quot;240&quot; src=&quot;https://1.bp.blogspot.com/-5eSfw61YM3I/YTw91RGv_cI/AAAAAAAAF4w/LDkV72pQELgewhafCgsu5VkZyCnLxuCHQCLcBGAsYHQ/w640-h240/ngrok%2Blogin.png&quot; title=&quot;logged in on ngrok&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;After verifying our mail address we can get the API token on the &quot;Your Authentication&quot; area on the sidebar, as we can see in the following screenshot:&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-grY9KPNyC6g/YTxAgJkWWUI/AAAAAAAAF44/xDnK0WvILhYpTHcgbrpfMcbPGg-SKIZfgCLcBGAsYHQ/s1346/ngrok%2BAPI%2B2.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;ngrok authentication command&quot; border=&quot;0&quot; data-original-height=&quot;489&quot; data-original-width=&quot;1346&quot; height=&quot;232&quot; src=&quot;https://1.bp.blogspot.com/-grY9KPNyC6g/YTxAgJkWWUI/AAAAAAAAF44/xDnK0WvILhYpTHcgbrpfMcbPGg-SKIZfgCLcBGAsYHQ/w640-h232/ngrok%2BAPI%2B2.png&quot; title=&quot;ngrok authentication command&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;In the above screenshot we can see our Ngrok authentication API key and the command to set it up. For security we had hided a part of our API keys. So we run the command with API key to set up the Ngrok.&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code&gt;&lt;/code&gt;&lt;code&gt;./ngrok authtoken 1xyqb*****************25PTTHqMpHqB&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;In the above command again we hided our the same API key with *. In the following screenshot we can see the output of the command:&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-4NkQ2W0pIYM/YTxCD57uhdI/AAAAAAAAF5A/DCAxcPx31KopwRwZdCsxaZIOyp_tjX3ywCLcBGAsYHQ/s596/ngrok%2Bauthentication.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;ngrok authentication command&quot; border=&quot;0&quot; data-original-height=&quot;142&quot; data-original-width=&quot;596&quot; height=&quot;152&quot; src=&quot;https://1.bp.blogspot.com/-4NkQ2W0pIYM/YTxCD57uhdI/AAAAAAAAF5A/DCAxcPx31KopwRwZdCsxaZIOyp_tjX3ywCLcBGAsYHQ/w640-h152/ngrok%2Bauthentication.png&quot; title=&quot;ngrok authentication command&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Now we are all set to run Ngrok. For an example we forward a locally hosted demo website to the internet.&lt;/p&gt;&lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Using Ngrok on Kali Linux&lt;/span&gt;&lt;/h1&gt;&lt;p&gt;Ngrok&#39;s work is simple it just host our local website to internet. So first we need a local website. Here we have a demo html page on our desktop, and we had opened it on Firefox browser.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-qLDGuYnAHOA/YTxJJ_1fZII/AAAAAAAAF5I/wZJtdAgEQn8R4B90czj-0aakMEuEhq1kgCLcBGAsYHQ/s1197/demo%2Bsite.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;website demo&quot; border=&quot;0&quot; data-original-height=&quot;611&quot; data-original-width=&quot;1197&quot; height=&quot;326&quot; src=&quot;https://1.bp.blogspot.com/-qLDGuYnAHOA/YTxJJ_1fZII/AAAAAAAAF5I/wZJtdAgEQn8R4B90czj-0aakMEuEhq1kgCLcBGAsYHQ/w640-h326/demo%2Bsite.png&quot; title=&quot;website demo&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;But it is just a html page we need to host it locally. For that, we need to run a localhost server on our desktop. We open another terminal and go to the directory where our html page is stored. Then run python localhost server there to host the html page on our localhost by using following command:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code&gt;sudo python3 -m http.server 80&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;In the following screenshot we can see that our local web server is started:&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-awKtZLlfRq0/YTxKXiZp8rI/AAAAAAAAF5Q/4UPSO7DVV24iJqNHbv-pu2RwAqIUq1TCgCLcBGAsYHQ/s521/python3%2Bhttp%2Bserver.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;python3 http server&quot; border=&quot;0&quot; data-original-height=&quot;188&quot; data-original-width=&quot;521&quot; height=&quot;230&quot; src=&quot;https://1.bp.blogspot.com/-awKtZLlfRq0/YTxKXiZp8rI/AAAAAAAAF5Q/4UPSO7DVV24iJqNHbv-pu2RwAqIUq1TCgCLcBGAsYHQ/w640-h230/python3%2Bhttp%2Bserver.png&quot; title=&quot;python3 http server&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Now we can check it by opening our localhost IP on our browser &lt;a href=&quot;http://127.0.0.1&quot;&gt;127.0.0.1&lt;/a&gt;. In the following screenshot we can see that page is now accessible by using our local host IP (127.0.0.1).&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-DBkVikwMqkk/YTxLmyqXN_I/AAAAAAAAF5Y/qFWHm0KSxLUuAXx-oSW0PC8V6WZV-XcSQCLcBGAsYHQ/s1193/localhost%2Bserver%2Bis%2Bstarted.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;localhost server is started&quot; border=&quot;0&quot; data-original-height=&quot;589&quot; data-original-width=&quot;1193&quot; height=&quot;316&quot; src=&quot;https://1.bp.blogspot.com/-DBkVikwMqkk/YTxLmyqXN_I/AAAAAAAAF5Y/qFWHm0KSxLUuAXx-oSW0PC8V6WZV-XcSQCLcBGAsYHQ/w640-h316/localhost%2Bserver%2Bis%2Bstarted.png&quot; title=&quot;localhost server is started&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Now this is accessible from our computer by using localhost IP (127.0.0.1), and from devices on the same network by using our Local IP (IP assigned by router for our Kali Linux system). But it isn&#39;t available for other network, because this web server isn&#39;t hosted on internet.&lt;p&gt;&lt;/p&gt;&lt;p&gt;Now we leave our web host terminal as it is, and back to our previous terminal window (where we setup Ngrok), and run the following command to run Ngrok:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code&gt;./ngrok http 80&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;Here we run the Ngrok script on http with port number 80, because our localhost server is running on port 80. (If we can&#39;t use the localhost port 80 then we can use other ports like 8080 or 8888, in that case we need to specify our that port on Ngrok).&lt;/p&gt;&lt;p&gt;After that we can see our Ngrok is started as we can see in the following screenshot:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-ccz_MWBvG4M/YTxSgrIjqEI/AAAAAAAAF5o/zvYUA8ZYZFAQBT1vf9s04lBi8NoOPcY8ACLcBGAsYHQ/s762/ngrok%2Bis%2Brunning.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;ngrok is running&quot; border=&quot;0&quot; data-original-height=&quot;216&quot; data-original-width=&quot;762&quot; height=&quot;182&quot; src=&quot;https://1.bp.blogspot.com/-ccz_MWBvG4M/YTxSgrIjqEI/AAAAAAAAF5o/zvYUA8ZYZFAQBT1vf9s04lBi8NoOPcY8ACLcBGAsYHQ/w640-h182/ngrok%2Bis%2Brunning.png&quot; title=&quot;ngrok is running&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;In the above screenshot we can see our forwarding link. Using that forwarding link (in actual links both http and https) we can see our that page from our browser.&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-aZi7vlCV6SQ/YTxSw7E1fAI/AAAAAAAAF5w/uzyDvfj6S6Q9XOs33xQuNOisjCGbT8wGQCLcBGAsYHQ/s1181/ngrok%2Bforwarded%2Bsite.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;ngrok forwards our localhost site on the internet&quot; border=&quot;0&quot; data-original-height=&quot;592&quot; data-original-width=&quot;1181&quot; height=&quot;320&quot; src=&quot;https://1.bp.blogspot.com/-aZi7vlCV6SQ/YTxSw7E1fAI/AAAAAAAAF5w/uzyDvfj6S6Q9XOs33xQuNOisjCGbT8wGQCLcBGAsYHQ/w640-h320/ngrok%2Bforwarded%2Bsite.png&quot; title=&quot;ngrok forwards our localhost site on the internet&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Not only from our browser we can access it from anywhere on the internet by the link provided by Ngrok.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-yuALJBk9vLE/YTxTRnsNFAI/AAAAAAAAF54/nrMxpLkdiNcDMvgf8AmSqV6RPIKTnYt0ACLcBGAsYHQ/s1280/ngrom%2Bsite%2Bon%2Bmobile.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Ngrok site on Mobile&quot; border=&quot;0&quot; data-original-height=&quot;1280&quot; data-original-width=&quot;719&quot; height=&quot;400&quot; src=&quot;https://1.bp.blogspot.com/-yuALJBk9vLE/YTxTRnsNFAI/AAAAAAAAF54/nrMxpLkdiNcDMvgf8AmSqV6RPIKTnYt0ACLcBGAsYHQ/w225-h400/ngrom%2Bsite%2Bon%2Bmobile.jpg&quot; title=&quot;Ngrok site on Mobile&quot; width=&quot;225&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;We can see that page on our mobile which is connected to mobile data (not in our WiFi network). This link will be active until we don&#39;t close the Ngrok tunnel, but in real life uses Ngrok can&#39;t run this for a long time in their free plan. It can be a temporary solution.&lt;br /&gt;&lt;/p&gt;&lt;p&gt;This is how &lt;b&gt;we can use Ngrok on Kali Linux&lt;/b&gt;, this is the solution for hosting our local website or web server on the internet. Here we don&#39;t need a &lt;b&gt;static IP&lt;/b&gt; address neither requires &lt;b&gt;port forwarding&lt;/b&gt;.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Love our articles?&lt;/b&gt; Make sure to &lt;b&gt;follow us&lt;/b&gt; on &lt;a class=&quot;d-link&quot; href=&quot;https://twitter.com/KaliLinux_in&quot; target=&quot;_blank&quot;&gt;Twitter&lt;/a&gt; and &lt;a class=&quot;d-link&quot; href=&quot;https://github.com/jaykali&quot; target=&quot;_blank&quot;&gt;GitHub&lt;/a&gt;, we post article updates there. To join our &lt;b&gt;KaliLinuxIn&lt;/b&gt; family, join our &lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;a class=&quot;d-link&quot; href=&quot;https://t.me/kalilinuxin&quot; target=&quot;_blank&quot;&gt;Telegram Group&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;. We are trying to build a community for Linux and Cybersecurity. For anything we always happy to help everyone on the &lt;span style=&quot;color: red;&quot;&gt;comment section&lt;/span&gt;. As we know our comment section is always open to everyone. We read each and every comment and &lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;we always reply&lt;/span&gt;&lt;/b&gt;.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='https://www.kalilinux.in/feeds/7958305459274063494/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.kalilinux.in/2021/09/how-to-install-ngrok-on-kali-linux.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/7958305459274063494'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/7958305459274063494'/><link rel='alternate' type='text/html' href='https://www.kalilinux.in/2021/09/how-to-install-ngrok-on-kali-linux.html' title='How to Install &amp; Use Ngrok on Kali Linux'/><author><name>Kali Linux</name><uri>http://www.blogger.com/profile/07345541575706459646</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//3.bp.blogspot.com/-Mb3EvSYi1Yg/YOL_LNs2xhI/AAAAAAAAFk4/aghHydKfmagtjPYLvn-SVVNEIJW10TdLACK4BGAYYCw/s113/kali%2Bdragon.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-7JzLzWhPppM/YTxZfUh4J6I/AAAAAAAAF6A/NrtJzQ2cW1Yc-pRmqBJYGK2pvkka7Z7VgCLcBGAsYHQ/s72-w320-h200-c/ngrok.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6091241131056531264.post-5541626691774212388</id><published>2021-09-22T01:30:00.001+05:30</published><updated>2021-09-22T01:30:00.203+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Attack Strategies"/><category scheme="http://www.blogger.com/atom/ns#" term="Scanning"/><title type='text'>Find Vulnerabilities using NMAP Scripts (NSE)</title><content type='html'>&lt;p&gt;&lt;b&gt;Nmap&lt;/b&gt; comes pre-installed with &lt;b&gt;Kali Linux&lt;/b&gt;. Not just Kali Linux Nmap comes pre-installed with every security focused operating system. We have already discussed how to use Nmap for active reconnaissance in our previous article &quot;&lt;a href=&quot;https://www.kalilinux.in/2018/12/nmap-tutorial.html&quot; target=&quot;_blank&quot;&gt;NMAP -- The Network Mapper&lt;/a&gt;&quot;.&lt;/p&gt;&lt;p&gt;But cybersecurity experts don&#39;t just use Nmap for scanning ports and services running on the target system, Nmap also can be used for vulnerability assessment and much more using NSE (Nmap Scripting Engine).&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-5gYP7KEApoA/YTdh3017KtI/AAAAAAAAF3o/vm2ojKR4wc4jgq2iPLR5A0bSHm-lzhmigCLcBGAsYHQ/s500/Vulnerability%2Bscanning%2Busing%2Bnmap%2Bscripts.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Vulnerability scanning using nmap scripts&quot; border=&quot;0&quot; data-original-height=&quot;303&quot; data-original-width=&quot;500&quot; height=&quot;194&quot; src=&quot;https://1.bp.blogspot.com/-5gYP7KEApoA/YTdh3017KtI/AAAAAAAAF3o/vm2ojKR4wc4jgq2iPLR5A0bSHm-lzhmigCLcBGAsYHQ/w320-h194/Vulnerability%2Bscanning%2Busing%2Bnmap%2Bscripts.png&quot; title=&quot;Vulnerability scanning using nmap scripts&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;The Nmap Scripting Engine (NSE) has revolutionized the possibilities of a port scanner by allowing users to write scripts that perform custom tasks using the host information collected by Nmap. As of September 2021, when we are writing this article, Nmap has over 600+ scripts on Nmap version 7.91.&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-uwLcRiMZ76g/YTYJ-GqZBjI/AAAAAAAAF3A/7VA0Xww3atQX3PXUy5jvqVwNuOZLErM6gCLcBGAsYHQ/s539/nmap%2Bscripts.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Nmap scripts for security testing&quot; border=&quot;0&quot; data-original-height=&quot;303&quot; data-original-width=&quot;539&quot; height=&quot;360&quot; src=&quot;https://1.bp.blogspot.com/-uwLcRiMZ76g/YTYJ-GqZBjI/AAAAAAAAF3A/7VA0Xww3atQX3PXUy5jvqVwNuOZLErM6gCLcBGAsYHQ/w640-h360/nmap%2Bscripts.png&quot; title=&quot;Nmap scripts for security testing&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Penetration testers uses Nmap&#39;s most powerful and flexible features, which allows them to to write their own scripts and automate various tasks. &lt;a href=&quot;https://nmap.org/book/nse.html&quot; target=&quot;_blank&quot;&gt;&lt;b&gt;NSE&lt;/b&gt; (&lt;b&gt;N&lt;/b&gt;map &lt;b&gt;S&lt;/b&gt;cripting &lt;b&gt;E&lt;/b&gt;ngine)&lt;/a&gt; was developed for following reasons:&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Network Discovery:- This is the primary purpose that most of the people utilize Nmap for network port discovery, which we had learned in our &quot;&lt;a href=&quot;https://www.kalilinux.in/2018/12/nmap-tutorial.html&quot; target=&quot;_blank&quot;&gt;Nmap - The Network Mapper&lt;/a&gt;&quot; article.&lt;/li&gt;&lt;li&gt;Classier version detection of a service:- There are tons of services with multiple version details for the same service, so Nmap makes it more easy to identify the service.&lt;/li&gt;&lt;li&gt;Backdoor detection:- Some of the Nmap scripts are written to identify the pattern of backdoors. If there are any worms or malicious program infecting the network, it makes the attacker&#39;s job easy to short down and focus on taking over the machine remotely.&lt;/li&gt;&lt;li&gt;Vulnerability Scanning:- Pen testers also uses Nmap for exploitation in combination with other tools such as Metasploit or write a custom reverse shell code and combine Nmap&#39;s capability with them for exploitation.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Before jumping in to finding vulnerabilities using Nmap we must need to update the database of scripts, so newer scripts will be added on our database. Then we are ready to scan for vulnerabilities with all Nmap scripts. To update the Nmap scripts database we need to apply following command on our terminal window:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code class=&quot;ns&quot; style=&quot;outline: currentcolor none 0px; transition: all 0.3s ease 0s;&quot;&gt;sudo nmap --script-updatedb&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;In the following screenshot we can see that we have an updated Nmap scripts database.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-w_MeboSTME8/YTYQjvgcpiI/AAAAAAAAF3I/PfxvvJlKEzslFeeCLgTksAN2HvD5bam3gCLcBGAsYHQ/s587/nmap%2Bscript%2Bdatabase%2Bupdate.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;nmap script database update&quot; border=&quot;0&quot; data-original-height=&quot;143&quot; data-original-width=&quot;587&quot; height=&quot;156&quot; src=&quot;https://1.bp.blogspot.com/-w_MeboSTME8/YTYQjvgcpiI/AAAAAAAAF3I/PfxvvJlKEzslFeeCLgTksAN2HvD5bam3gCLcBGAsYHQ/w640-h156/nmap%2Bscript%2Bdatabase%2Bupdate.png&quot; title=&quot;nmap script database update&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Now we are ready to scan any target for vulnerabilities. Well we can use following command to run all vulnerability scanning scripts against a target.&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code class=&quot;ns&quot; style=&quot;outline: currentcolor none 0px; transition: all 0.3s ease 0s;&quot;&gt;nmap -sV --script vuln &amp;lt;target&amp;gt;&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;As we can see in the following screenshot:&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-SmjQR0HeHo8/YTbnit_rjeI/AAAAAAAAF3Y/KFNobNalBu4g91Bpw5qMRajBW51WC-8iQCLcBGAsYHQ/s1267/Nmap%2Bvulnerability%2Bscanning.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;nmap vulnerability scripts&quot; border=&quot;0&quot; data-original-height=&quot;553&quot; data-original-width=&quot;1267&quot; height=&quot;280&quot; src=&quot;https://1.bp.blogspot.com/-SmjQR0HeHo8/YTbnit_rjeI/AAAAAAAAF3Y/KFNobNalBu4g91Bpw5qMRajBW51WC-8iQCLcBGAsYHQ/w640-h280/Nmap%2Bvulnerability%2Bscanning.png&quot; title=&quot;nmap vulnerability scripts&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;When we are talking about Nmap Scripts then we need to know that, not only vulnerability scanning (&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;vuln&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;) there are lots of categories of Nmap scripts those are following:&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;auth&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;: This categorized scripts related to user authentication.&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;broadcast&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;: This is a very interesting category of scripts that use broadcast petitions to gather information.&amp;nbsp;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;brute&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;: This category is for scripts that help conduct brute-force password auditing.&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;default&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;: This category is for scripts that are executed when a script scan is executed ( &lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;-sC&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt; ).&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;discovery&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;: This category is for scripts related to host and service discovery.&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;dos&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;: This category is for scripts related to denial of service attacks.&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;exploit&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;: This category is for scripts that exploit security vulnerabilities.&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;external&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;: This category is for scripts that depend on a third-party service.&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;fuzzer&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;: This category is for Nmap scripts that are focused on fuzzing.&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;intrusive&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;: These scripts might crash system by generate lot of network noise, sysadmins considers it intrusive.&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;malware&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;: This category is for scripts related to malware detection.&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;safe&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;: This category is for scripts that are considered safe in all situations.&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;version&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;: This category is for NSE scripts that are used for advanced versioning.&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;vuln&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;: This category is for scripts related to security vulnerabilities.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;So we can see that we can do various tasks using Nmap using Nmap Scripting Engine scripts. When we need to run all the scripts against single target we can use following command:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code class=&quot;ns&quot; style=&quot;outline: currentcolor none 0px; transition: all 0.3s ease 0s;&quot;&gt;nmap -sV --script all &amp;lt;target&amp;gt;&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;In the following screenshot we can see that all scripts are using against one target, but here every script will run so it will consume good amount of time.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-xiQegbqtfmw/YTbrFUMI2gI/AAAAAAAAF3g/rd_SEOzc4c8ztchdPdwhZkrGp45BEBBxgCLcBGAsYHQ/s920/nmap%2Ball%2Bscripts%2Bon%2Ba%2Btarget.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;nmap all scripts running at once&quot; border=&quot;0&quot; data-original-height=&quot;214&quot; data-original-width=&quot;920&quot; height=&quot;148&quot; src=&quot;https://1.bp.blogspot.com/-xiQegbqtfmw/YTbrFUMI2gI/AAAAAAAAF3g/rd_SEOzc4c8ztchdPdwhZkrGp45BEBBxgCLcBGAsYHQ/w640-h148/nmap%2Ball%2Bscripts%2Bon%2Ba%2Btarget.png&quot; title=&quot;nmap all scripts running at once&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;That is all for this article. We will back again with &lt;b&gt;Nmap&lt;/b&gt;. Hope this article helps our fellow &lt;b&gt;Kali Linux&lt;/b&gt; users. Love our articles? Make sure to &lt;b&gt;follow us&lt;/b&gt; on &lt;a class=&quot;d-link&quot; href=&quot;https://twitter.com/KaliLinux_in&quot; target=&quot;_blank&quot;&gt;Twitter&lt;/a&gt; and &lt;a class=&quot;d-link&quot; href=&quot;https://github.com/jaykali&quot; target=&quot;_blank&quot;&gt;GitHub&lt;/a&gt;, we post article updates there. To join our &lt;b&gt;KaliLinuxIn&lt;/b&gt; family, join our &lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;a class=&quot;d-link&quot; href=&quot;https://t.me/kalilinuxin&quot; target=&quot;_blank&quot;&gt;Telegram Group&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;. We are trying to build a community for Linux and Cybersecurity. For anything we always happy to help everyone on the &lt;span style=&quot;color: red;&quot;&gt;comment section&lt;/span&gt;. As we know our comment section is always open to everyone. We read each and every comment and &lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;we always reply&lt;/span&gt;&lt;/b&gt;.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='https://www.kalilinux.in/feeds/5541626691774212388/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.kalilinux.in/2021/09/find-vulnerabilities-using-nmap-scripts.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/5541626691774212388'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/5541626691774212388'/><link rel='alternate' type='text/html' href='https://www.kalilinux.in/2021/09/find-vulnerabilities-using-nmap-scripts.html' title='Find Vulnerabilities using NMAP Scripts (NSE)'/><author><name>Kali Linux</name><uri>http://www.blogger.com/profile/07345541575706459646</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//3.bp.blogspot.com/-Mb3EvSYi1Yg/YOL_LNs2xhI/AAAAAAAAFk4/aghHydKfmagtjPYLvn-SVVNEIJW10TdLACK4BGAYYCw/s113/kali%2Bdragon.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-5gYP7KEApoA/YTdh3017KtI/AAAAAAAAF3o/vm2ojKR4wc4jgq2iPLR5A0bSHm-lzhmigCLcBGAsYHQ/s72-w320-h194-c/Vulnerability%2Bscanning%2Busing%2Bnmap%2Bscripts.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6091241131056531264.post-6671079664854846017</id><published>2021-09-18T01:30:00.015+05:30</published><updated>2021-09-19T18:24:13.689+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Scanning"/><title type='text'>How Port Scanning Works ? Port Scanning TCP &amp; UDP Explained</title><content type='html'>&lt;p&gt;Identifying open ports on a target system &lt;span class=&quot;rcolor4&quot; data-name=&quot;is very|is extremely|is incredibly&quot;&gt; is extremely &lt;/span&gt; important step to defining the attack surface of a target system. &lt;b&gt;Open ports correspond to the networked services that are running on a system.&lt;/b&gt; Programming errors or implementation flaws can make these services &lt;span class=&quot;rcolor5&quot; data-name=&quot;vulnerable to|susceptible to|liable to|prone to|at risk of&quot;&gt; susceptible to &lt;/span&gt; security and it also may &lt;span class=&quot;rcolor6&quot; data-name=&quot;lead to|cause|result in&quot;&gt; cause &lt;/span&gt; compromise entire system. &lt;span class=&quot;rcolor1&quot; data-name=&quot;to determine|to work out|to see&quot;&gt; to work out &lt;/span&gt; the possible attack vectors, we must first enumerate the open ports on all of the remote systems.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-UszGiCxWlQc/YTa2Lw0MZ3I/AAAAAAAAF3Q/vbPcyntrwjoQpj8bv_a0UGiRV0NIXqGJQCLcBGAsYHQ/s500/port%2Bscanning%2Bexplained.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;port scanning explained&quot; border=&quot;0&quot; data-original-height=&quot;303&quot; data-original-width=&quot;500&quot; height=&quot;194&quot; src=&quot;https://1.bp.blogspot.com/-UszGiCxWlQc/YTa2Lw0MZ3I/AAAAAAAAF3Q/vbPcyntrwjoQpj8bv_a0UGiRV0NIXqGJQCLcBGAsYHQ/w320-h194/port%2Bscanning%2Bexplained.png&quot; title=&quot;port scanning explained&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;These open ports correspond to services which will be addressed with either UDP or TCP traffic. Both &lt;b&gt;TCP&lt;/b&gt; and &lt;b&gt;UDP&lt;/b&gt; are transport protocols. &lt;b&gt;T&lt;/b&gt;ransmission &lt;b&gt;C&lt;/b&gt;ontrol &lt;b&gt;P&lt;/b&gt;rotocol (&lt;b&gt;TCP&lt;/b&gt;) is that the more widely used of the 2 and provides connection-oriented communication. &lt;b&gt;U&lt;/b&gt;ser &lt;b&gt;D&lt;/b&gt;atagram &lt;b&gt;P&lt;/b&gt;rotocol (&lt;b&gt;UDP&lt;/b&gt;) may be a non connection-oriented protocol that&#39;s sometimes used with services that speed of transmission is more important than data integrity.&lt;p&gt;&lt;/p&gt;&lt;p&gt;The penetration testing method used to determine these services is called port scanning. In our this article we are going to cover some basic theory about the port scanning then we can easily understand the work methodology of any port scanner tools.&lt;/p&gt;&lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;UDP Port Scanning&lt;/span&gt;&lt;/h1&gt;&lt;p&gt;Because TCP may be a more widely used transport layer protocol, services that operate over UDP are frequently forgotten. Despite the natural tendency to overlook UDP services, it&#39;s absolutely critical that these services are enumerated to accumulate an entire understanding of the attack surface of any given target. UDP scanning can often be challenging, tedious, and time consuming. within the next article we&#39;ll cover the way to perform a UDP port scan in Kali Linux. to know how these tools work, it&#39;s important to know the 2 different approaches to UDP scanning which will be used.&lt;br /&gt;&lt;/p&gt;In the first method, is to rely exclusively on ICMP port-unreachable responses. this sort of scanning relies on the idea that any UDP ports that aren&#39;t related to a live service will return an ICMP port-unreachable response, and a scarcity of response is interpreted as a sign of a live service. While this approach are often effective in some circumstances, it also can return inaccurate leads to cases where the host isn&#39;t generating port-unreachable responses, or the port-unreachable replies are rate limited or they&#39;re filtered by a firewall.&lt;br /&gt;In the second method, which is addressed within the second and third recipes, is to use service-specific probes to aim to solicit a response, which might indicate that the expected service is running on the targeted port. While this approach are often highly effective, it also can be very time consuming.&lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;TCP Port Scanning&lt;/span&gt;&lt;/h1&gt;&lt;p&gt;In this article, many different methods to TCP scanning will be covered. These methods include &lt;b&gt;stealth scanning&lt;/b&gt;, &lt;b&gt;connect scanning&lt;/b&gt;, and &lt;b&gt;zombie scanning&lt;/b&gt;. To understand how these scanning techniques work, it is important to understand how TCP connections are established and worded. TCP is a connection-oriented protocol, and data is only transported over TCP after a connection has been established between two systems. The process associated with establishing a TCP connection is often referred to as the three-way handshake. This name alludes to the three steps involved in the connection process. The following diagram shows this process in a graphical form:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-zHCWVa0Wtf8/YTHNU3vIQAI/AAAAAAAAF2o/JDm1bjWRdu0pbfxxid_2MSD2F-oHUwVVQCLcBGAsYHQ/s1920/Threeway%2Bhandshake.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;threeway handshake&quot; border=&quot;0&quot; data-original-height=&quot;900&quot; data-original-width=&quot;1920&quot; height=&quot;300&quot; src=&quot;https://1.bp.blogspot.com/-zHCWVa0Wtf8/YTHNU3vIQAI/AAAAAAAAF2o/JDm1bjWRdu0pbfxxid_2MSD2F-oHUwVVQCLcBGAsYHQ/w640-h300/Threeway%2Bhandshake.png&quot; title=&quot;threeway handshake&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;From the above picture we can see that a TCP SYN packet is sent from the device that wishes to establish a connection with a port of the device that it desires to connect with. If the service associated with the receiving port grants the connection, it will reply to the requesting system with a TCP packet that has both the SYN and ACK bits activated. The connection is established that time when the requesting system responds with a TCP ACK response. This three-step process (three-way handshake) establishes a TCP session between the two systems. All of the TCP port scanning techniques will perform some varieties of this process to identify live services on remote hosts.&lt;/p&gt;Connect scanning and stealth scanning both are quite easy to know . Connect scanning wont to establish a full TCP connection for each port that&#39;s scanned. that&#39;s to mention , for each port that&#39;s scanned, the complete three-way handshake is completed. If a connection is successfully established, the port is then seems to be open.&lt;br /&gt;In the case of stealth scanning doesn&#39;t establish a full connection. Stealth scanning is additionally referred as SYN scanning or half-open scanning. for every port that&#39;s scanned, one SYN packet is shipped to the destination port, and every one ports that reply with a SYN+ACK packet are assumed to be running live services. Since no final ACK is shipped from the initiating system, the connection is left half-open. this is often mentioned as stealth scanning because logging solutions that only record established connections won&#39;t record any evidence of the scan. the ultimate method of TCP scanning which will be discussed during this chapter may be a technique called zombie scanning. the aim of zombie scanning is to map open ports on a foreign system without producing any evidence that you simply have interacted thereupon system. The principles behind how zombie scanning works are somewhat complex. perform the method of zombie scanning with the subsequent steps:&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Identify a remote system for our zombie host. The system should have the some characteristics, they are following:&lt;/li&gt;&lt;/ul&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li&gt;The system need to be idle and does not communicate actively with other systems over the network.&lt;/li&gt;&lt;li&gt;The system need to use an incremental IPID sequence.&lt;/li&gt;&lt;/ol&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Send a SYN+ACK packet to this zombie host and record the initial IPID value.&lt;/li&gt;&lt;li&gt;Send a SYN packet with a spoofed source IP address of the zombie system to the scan target system.&lt;/li&gt;&lt;li&gt;Depending on the status of the port on the scan target, one of the following two things will happen:&lt;/li&gt;&lt;/ul&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li&gt;If the port is open, the scan target will return a SYN+ACK packet to the zombie host, which it believes sent the original SYN request. In this case, the zombie host will respond to this unsolicited SYN+ACK packet with an RST packet and thereby increment its IPID value by one.&lt;/li&gt;&lt;li&gt;If the port is closed, the scan target will return an RST response to the zombie host, which it believes sent the original SYN request. This RST packet will solicit no response from the zombie, and the IPID will not be incremented.&lt;/li&gt;&lt;/ol&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Send another SYN+ACK packet to the zombie host, and evaluate the final IPID value of the returned RST response. If this value has incremented by one, then the port on the scan target is closed, and if the value has incremented by two, then the port on the scan target is open.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;The following image shows the interactions that take place when we use a zombie host to scan an open port:&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-IHW4LXLapqY/YTMOpaeYEbI/AAAAAAAAF2w/zIR423voT9w1RTwdXoh6MPRrNvmN8EgVQCLcBGAsYHQ/s708/zombie%2Bscan%2Bport%2Bopen.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Zombie port scanning process&quot; border=&quot;0&quot; data-original-height=&quot;297&quot; data-original-width=&quot;708&quot; height=&quot;268&quot; src=&quot;https://1.bp.blogspot.com/-IHW4LXLapqY/YTMOpaeYEbI/AAAAAAAAF2w/zIR423voT9w1RTwdXoh6MPRrNvmN8EgVQCLcBGAsYHQ/w640-h268/zombie%2Bscan%2Bport%2Bopen.png&quot; title=&quot;Zombie port scanning process&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;To perform a zombie scan, an initial SYN+ACK request should be sent to the zombie system to work out the present IPID value within the returned RST packet. Then, a spoofed SYN packet is shipped to the scan target with a source IP address of the zombie system. If the port is open, the scan target will send a SYN+ACK response back to the zombie. Since the zombie didn&#39;t actually send the initial SYN request, it&#39;ll interpret the SYN+ACK response as unsolicited and send an RST packet back to the target, thereby incrementing its IPID by one.&lt;/p&gt;&lt;p&gt;Finally, another SYN+ACK packet should be sent to the zombie, which can return an RST packet and increment the IPID another time. An IPID that has incremented by two from the initial response is indicative of the very fact that each one of those events have transpired which the destination port on the scanned system is open. Alternatively, if the port on the scan target is closed, a special series of events will transpire, which can only cause the ultimate RST response IPID value to increment by one.&lt;br /&gt;The following picture is an demo of the sequence of events comes with the zombie scan of a closed port:&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-lXi_aGsgWK4/YTMQwdkkjLI/AAAAAAAAF24/ho5uc-hn4AcDX5KZ0Na8pCY_tWqaPMQvQCLcBGAsYHQ/s707/zombie%2Bscan%2Bport%2Bclose.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Zombie scan port close&quot; border=&quot;0&quot; data-original-height=&quot;296&quot; data-original-width=&quot;707&quot; height=&quot;268&quot; src=&quot;https://1.bp.blogspot.com/-lXi_aGsgWK4/YTMQwdkkjLI/AAAAAAAAF24/ho5uc-hn4AcDX5KZ0Na8pCY_tWqaPMQvQCLcBGAsYHQ/w640-h268/zombie%2Bscan%2Bport%2Bclose.png&quot; title=&quot;Zombie scan port close&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;If the destination port on the scan target is closed, an RST packet are going to be sent to the zombie system in response to the initially spoofed SYN packet. Since the RST packet solicits no response, the IPID value of the zombie system won&#39;t be incremented. As a result, the ultimate RST packet returned to the scanning system in response to the SYN+ACK packet will have the IPID incremented by just one .&lt;/p&gt;&lt;p&gt;This process are often performed for every port that&#39;s to be scanned, and it are often wont to map open ports on a remote system without leaving any evidence that a scan was performed by the scanning system.&lt;/p&gt;&lt;p&gt;This is &lt;b&gt;how port scanning methods works&lt;/b&gt;. In this article we tried to do something different, this is not about any tool but if we are using Kali Linux or we are in cybersecurity field then we should have some technical knowledge. Hope this article also get love. This is all for today.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Love our articles?&lt;/b&gt; Make sure to &lt;span style=&quot;color: #ff00fe;&quot;&gt;&lt;b&gt;follow us&lt;/b&gt; on &lt;a class=&quot;d-link&quot; href=&quot;https://twitter.com/KaliLinux_in&quot; target=&quot;_blank&quot;&gt;Twitter&lt;/a&gt; and &lt;a class=&quot;d-link&quot; href=&quot;https://github.com/jaykali&quot; target=&quot;_blank&quot;&gt;GitHub&lt;/a&gt;,&lt;/span&gt; we post article updates there. To join our &lt;b&gt;KaliLinuxIn&lt;/b&gt; family, join our &lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;a class=&quot;d-link&quot; href=&quot;https://t.me/kalilinuxin&quot; target=&quot;_blank&quot;&gt;Telegram Group&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;. We are trying to build a community for Linux and Cybersecurity. For anything we always happy to help everyone on the &lt;span style=&quot;color: red;&quot;&gt;comment section&lt;/span&gt;. As we know our comment section is always open to everyone. We read each and every comment and &lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;we always reply&lt;/span&gt;&lt;/b&gt;.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='https://www.kalilinux.in/feeds/6671079664854846017/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.kalilinux.in/2021/09/port-scanning-TCP-UDP-.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/6671079664854846017'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/6671079664854846017'/><link rel='alternate' type='text/html' href='https://www.kalilinux.in/2021/09/port-scanning-TCP-UDP-.html' title='How Port Scanning Works ? Port Scanning TCP &amp; UDP Explained'/><author><name>Kali Linux</name><uri>http://www.blogger.com/profile/07345541575706459646</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//3.bp.blogspot.com/-Mb3EvSYi1Yg/YOL_LNs2xhI/AAAAAAAAFk4/aghHydKfmagtjPYLvn-SVVNEIJW10TdLACK4BGAYYCw/s113/kali%2Bdragon.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-UszGiCxWlQc/YTa2Lw0MZ3I/AAAAAAAAF3Q/vbPcyntrwjoQpj8bv_a0UGiRV0NIXqGJQCLcBGAsYHQ/s72-w320-h194-c/port%2Bscanning%2Bexplained.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6091241131056531264.post-6252808913018446994</id><published>2021-09-15T10:18:00.000+05:30</published><updated>2021-09-15T10:18:33.274+05:30</updated><title type='text'>Kali Linux 2021.3 Update is Here !</title><content type='html'>&lt;p&gt;The third update of Kali Linux in 2021 is live and ready to &lt;b&gt;ROCK&lt;/b&gt;.&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Say Welcome to &lt;b&gt;Kali Linux 2021.3&lt;/b&gt;! This release welcomes a mixture of new items as well as enhancements of existing features, and is ready to be &lt;a href=&quot;https://www.kali.org/get-kali/&quot;&gt;downloaded &lt;i&gt;(from our updated page)&lt;/i&gt;&lt;/a&gt; &lt;i&gt;or &lt;a href=&quot;https://www.kali.org/docs/general-use/updating-kali/&quot;&gt;upgraded if you have an existing Kali Linux installation&lt;/a&gt;&lt;/i&gt;.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-TfGOC40Wako/YUF559MBzBI/AAAAAAAAF6w/UtTgCjm7eE4pGmJibd_HaObMBMWJZG1zQCLcBGAsYHQ/s1200/banner-2021.3-release.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Kali Linux 2021.3 Update&quot; border=&quot;0&quot; data-original-height=&quot;628&quot; data-original-width=&quot;1200&quot; height=&quot;167&quot; src=&quot;https://1.bp.blogspot.com/-TfGOC40Wako/YUF559MBzBI/AAAAAAAAF6w/UtTgCjm7eE4pGmJibd_HaObMBMWJZG1zQCLcBGAsYHQ/w320-h167/banner-2021.3-release.jpg&quot; title=&quot;Kali Linux 2021.3 Update&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;A quick summary of the change log since the 2021.1 release from February 2021 is:&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div id=&quot;content&quot;&gt;&lt;ul&gt;&lt;li&gt;&lt;strong&gt;OpenSSL&lt;/strong&gt; - Wide compatibility by default - Keep reading for what that means.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;New Kali-Tools site&lt;/strong&gt; - Following the footsteps of Kali-Docs, Kali-Tools has had a complete refresh.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Better VM support in the Live image session&lt;/strong&gt; - Copy &amp;amp; paste and drag &amp;amp; drop from your machine into a Kali VM by default.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;New tools&lt;/strong&gt; - From adversary emulation, to subdomain takeover to Wi-Fi attacks.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Kali NetHunter smartwatch&lt;/strong&gt; - first of its kind, for TicHunter Pro&lt;/li&gt;&lt;li&gt;&lt;strong&gt;KDE 5.21&lt;/strong&gt; - Plasma desktop received a version bump.&lt;span&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div id=&quot;content&quot;&gt;&lt;h2 id=&quot;introducing-kaboxer-v10-_again_&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;OpenSSL: wide compatibility by default&lt;/span&gt;&lt;/h2&gt;&lt;p&gt;Going forwards from Kali Linux 2021.3, OpenSSL has now been configured for &lt;strong&gt;wider compatibility&lt;/strong&gt; to allow Kali to talk to as many services as possible. This means that legacy protocols &lt;em&gt;(such as TLS 1.0 and TLS 1.1)&lt;/em&gt; and older ciphers are &lt;strong&gt;enabled by default&lt;/strong&gt;. This is done to help increase Kali’s ability to talk to older, obsolete systems and servers that are still using these older protocols. This may potentially increase your options on available attack surfaces &lt;em&gt;(if your target has these End of Life (EoL) services running, having then forgotten about them, what else could this uncover?)&lt;/em&gt;. While this is not a configuration that would be good for a general purpose operating systems, this setting makes sense for Kali as it enables the user to engage and talk with more potential targets.&lt;/p&gt;&lt;p&gt;This setting is easy to modify via the command-line tool &lt;code&gt;kali-tweaks&lt;/code&gt; though. Enter the &lt;code&gt;Hardening&lt;/code&gt; section, and from there you can configure OpenSSL for &lt;strong&gt;Strong Security&lt;/strong&gt; mode instead, which uses today’s current modern standard allowing for secure communication.&lt;/p&gt;For more details, refer to the documentation: &lt;a href=&quot;https://www.kali.org/docs/general-use/openssl-configuration/&quot;&gt;kali.org/docs/general-use/openssl-configuration&lt;/a&gt;&lt;h2 id=&quot;releasing-kali-tweaks-v10&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Kali-Tools&lt;/span&gt;&lt;/h2&gt;&lt;p&gt;In &lt;a href=&quot;https://www.kali.org/blog/kali-linux-2019-4-release/&quot;&gt;2019.4&lt;/a&gt; we moved our documentation over to our updated &lt;a href=&quot;https://www.kali.org/docs/&quot;&gt;/docs/&lt;/a&gt; page. It’s now finally the turn of our &lt;a href=&quot;https://www.kali.org/tools/&quot;&gt;Kali-Tools&lt;/a&gt; site!&lt;/p&gt;&lt;p&gt;We have refreshed every aspect of the previous site, giving a new, faster, layout, content, and system! The backend is now in a semi-automated state and more in the open, which like before, allows for anyone to help out and &lt;a href=&quot;https://www.kali.org/docs/community/contribute/&quot;&gt;contribute&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;Once these sites have settled down from all the changes and matured a bit, we will start to package these both up, allowing for offline reading.&lt;/p&gt;&lt;p&gt;&lt;img alt=&quot;Kali tools&quot; height=&quot;450&quot; src=&quot;https://www.kali.org/blog/kali-linux-2021-3-release/images/kali-tools.png&quot; title=&quot;Kali tools&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;&lt;h2 id=&quot;refreshed-bleeding-edge-branch&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Virtualization: improvements all over the place&lt;/span&gt;&lt;/h2&gt;&lt;p&gt;The Kali Live image received some love during this release cycle! We worked hard to make the experience smoother for those who run the Live image in &lt;a href=&quot;https://www.kali.org/docs/virtualization/&quot;&gt;virtualized environments&lt;/a&gt;. Basic features like &lt;strong&gt;copy’n’paste&lt;/strong&gt; and &lt;strong&gt;drag’n’drop&lt;/strong&gt; between the host and the guest should now work out of the box. And this is really for everyone: VMware, VirtualBox, Hyper-V and QEMU+Spice. Did we forget anyone? Drop us a word on the &lt;a href=&quot;https://bugs.kali.org/&quot;&gt;Kali bug tracker&lt;/a&gt;!&lt;/p&gt;&lt;p&gt;On the same line: it’s now very easy to configure Kali for &lt;a href=&quot;https://docs.microsoft.com/en-us/windows-server/virtualization/hyper-v/learn-more/use-local-resources-on-hyper-v-virtual-machine-with-vmconnect&quot;&gt;&lt;strong&gt;Hyper-V Enhanced Session Mode&lt;/strong&gt;&lt;/a&gt;. Open &lt;code&gt;kali-tweaks&lt;/code&gt; in a terminal, select &lt;code&gt;Virtualization&lt;/code&gt;, and if Kali is running under Hyper-V, you’ll see a setting to turn on Hyper-V Enhanced Session Mode. It’s now as simple as hitting Enter!&lt;/p&gt;&lt;p&gt;If you use this feature, make sure to visit &lt;a href=&quot;https://www.kali.org/docs/virtualization/install-hyper-v-guest-enhanced-session-mode/&quot;&gt;kali.org/docs/virtualization/install-hyper-v-guest-enhanced-session-mode/&lt;/a&gt;, as there are a few additional things to be aware of.&lt;/p&gt;&lt;p&gt;Many thanks to &lt;a href=&quot;https://gitlab.com/jetbennett&quot;&gt;@Shane Bennett&lt;/a&gt;, who spent a tremendous amount of time testing this feature, provided extremely detailed feedback all along, and even helped us with the documentation. Kudos Shane!&lt;/p&gt;&lt;h2 id=&quot;disabled-privileged-ports&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;New Tools in Kali Linux 2021.3&lt;/span&gt;&lt;/h2&gt;&lt;p&gt;It wouldn’t be a Kali release if there weren’t any new tools added! A quick run down of what’s been added &lt;em&gt;(to the network repositories)&lt;/em&gt;:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://pkg.kali.org/pkg/berate-ap&quot;&gt;Berate_ap&lt;/a&gt; - Orchestrating MANA rogue Wi-Fi Access Points&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://pkg.kali.org/pkg/caldera&quot;&gt;CALDERA&lt;/a&gt; - Scalable automated adversary emulation platform&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://pkg.kali.org/pkg/eaphammer&quot;&gt;EAPHammer&lt;/a&gt; - Targeted evil twin attacks against WPA2-Enterprise Wi-Fi networks&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://pkg.kali.org/pkg/hosthunter&quot;&gt;HostHunter&lt;/a&gt; - Recon tool for discovering hostnames using OSINT techniques&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://pkg.kali.org/pkg/routerkeygenpc&quot;&gt;RouterKeygenPC&lt;/a&gt; - Generate default WPA/WEP Wi-Fi keys&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://pkg.kali.org/pkg/subjack&quot;&gt;Subjack&lt;/a&gt; - Subdomain takeover&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://pkg.kali.org/pkg/wpa-sycophant&quot;&gt;WPA_Sycophant&lt;/a&gt; - Evil client portion of EAP relay attack&lt;/li&gt;&lt;/ul&gt;&lt;code&gt;&lt;/code&gt;&lt;pre&gt;&lt;code&gt;&lt;span&gt;&lt;!--more--&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;h2 id=&quot;new-tools-in-kali&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Kali Nethunter Updates&lt;/span&gt;&lt;/h2&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://www.kali.org/blog/kali-linux-2021-3-release/images/NHWheader.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Kali Linux Nethunter for smartwatch&quot; border=&quot;0&quot; data-original-height=&quot;354&quot; data-original-width=&quot;800&quot; height=&quot;283&quot; src=&quot;https://www.kali.org/blog/kali-linux-2021-3-release/images/NHWheader.png&quot; title=&quot;Kali Linux Nethunter for smartwatch&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;We proudly introduce the world’s &lt;strong&gt;first Kali NetHunter smartwatch, the TicHunter Pro&lt;/strong&gt; thanks to the outstanding work of our very own NetHunter developer &lt;a href=&quot;https://twitter.com/yesimxev&quot;&gt;@yesimxev&lt;/a&gt;. It is still experimental, hence the features are limited to USB attacks, and some basic functions. The hardware also has limitations, as such a small battery won’t supply enough voltage for any OTG adapters, so huge antennas won’t stick out of your wrist! The future is very promising, bringing support for Nexmon and internal bluetooth usage.&lt;/p&gt;&lt;p&gt;The image is available on our &lt;a href=&quot;https://www.kali.org/get-kali/&quot;&gt;download page&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;Please note that those images contain a “nano Kali rootfs” due to technical reasons. The detailed installation guide can be found in our &lt;a href=&quot;https://www.kali.org/docs/nethunter/installing-nethunter-on-the-ticwatch-pro/&quot;&gt;Kali documentation&lt;/a&gt;. Feel free to join the adventure!&lt;/p&gt;&lt;h2 id=&quot;theme-enhancement&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Kali NetHunter Installation via Magisk&lt;/span&gt;&lt;/h2&gt;&lt;p&gt;Thanks to the amazing work of &lt;a href=&quot;https://twitter.com/Mominul00650279&quot;&gt;@Mominul Islam&lt;/a&gt;, we can now bring &lt;strong&gt;Kali NetHunter to Android 11 devices without a fully working TWRP&lt;/strong&gt;!&lt;/p&gt;&lt;p&gt;Each Kali NetHunter image can be flashed as a Magisk module. This work is still in its infancy and more work is needed to bring it up to par with the traditional installer through TWRP.&lt;/p&gt;&lt;p&gt;One of the missing parts is the kernel installation. We haven’t been able to install the kernel through Magisk yet. That has to be done via kernel installers like the “Franco Kernel Manager”. If you are keen to get NetHunter onto your Android 11 device, just give it a crack. If you are interested in helping out with getting the kernel part finished, please get in touch with us through our &lt;a href=&quot;https://gitlab.com/kalilinux/nethunter/build-scripts/kali-nethunter-project/-/issues&quot;&gt;GitLab issue tracker&lt;/a&gt;. Any help is greatly appreciated!&lt;/p&gt;&lt;h2 id=&quot;raspberry-pi-recharged&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Kali NetHunter installation step-by-step guide for our preferred device, the OnePlus 7&lt;/span&gt;&lt;/h2&gt;&lt;p&gt;Our &lt;strong&gt;preferred device for Kali NetHunter is the OnePlus 7 running Android 10 (stock ROM)&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;For a step-by-step installation guide and links to all the files required to restore your phone to the latest stock Android 10 ROM, install TWRP, Magisk and Kali NetHunter, head over to our &lt;a href=&quot;https://www.kali.org/docs/nethunter/installing-nethunter-on-the-oneplus-7/&quot;&gt;Kali documentation&lt;/a&gt; page.&lt;/p&gt;&lt;h2 id=&quot;kali-nethunter-updates&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Kali ARM Updates&lt;/span&gt;&lt;/h2&gt;&lt;p&gt;We have been busy doing various tweaks and tinkering on our &lt;a href=&quot;https://www.kali.org/docs/arm/&quot;&gt;Kali ARM images&lt;/a&gt;, which covers:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Our &lt;strong&gt;&lt;a href=&quot;https://gitlab.com/kalilinux/build-scripts/kali-arm&quot;&gt;Kali ARM build-scripts&lt;/a&gt; have been re-worked&lt;/strong&gt;. &lt;ul&gt;&lt;li&gt;Thanks to &lt;a href=&quot;https://gitlab.com/cyrus104&quot;&gt;@cyrus104&lt;/a&gt;, we now have a &lt;a href=&quot;https://gitlab.com/kalilinux/build-scripts/kali-arm/-/blob/master/gateworks-newport.sh&quot;&gt;build-script to support the &lt;strong&gt;Gateworks Newport&lt;/strong&gt;&lt;/a&gt; board, and he also added &lt;a href=&quot;https://www.kali.org/docs/arm/gateworks-newport/&quot;&gt;documentation&lt;/a&gt; for it.&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://twitter.com/re4sonkernel&quot;&gt;@Re4son&lt;/a&gt; contributed a &lt;a href=&quot;https://gitlab.com/kalilinux/build-scripts/kali-arm/-/blob/master/rpi0w-pitail.sh&quot;&gt;build-script&lt;/a&gt; for the Raspberry Pi Zero W based &lt;strong&gt;&lt;a href=&quot;https://whitedome.com.au/re4son/pi-tail/&quot;&gt;“Pi-Tail”&lt;/a&gt;&lt;/strong&gt; &lt;em&gt;(Find &lt;a href=&quot;https://www.kali.org/docs/arm/pi-tail/&quot;&gt;more information here&lt;/a&gt;)&lt;/em&gt;.&lt;/li&gt;&lt;li&gt;Additionally, the RaspberryPi Zero W based &lt;a href=&quot;https://gitlab.com/kalilinux/build-scripts/kali-arm/-/blob/master/rpi0w-nexmon-p4wnp1-aloa.sh&quot;&gt;&lt;strong&gt;“P4wnP1”&lt;/strong&gt; build-script&lt;/a&gt; has undergone some major changes.&lt;/li&gt;&lt;/ul&gt;&lt;/li&gt;&lt;li&gt;All images &lt;em&gt;should&lt;/em&gt; finally &lt;strong&gt;resize the file-system on the first boot&lt;/strong&gt;.&lt;/li&gt;&lt;li&gt;We now &lt;strong&gt;re-generate the default snakeoil cert&lt;/strong&gt;, which fixes a couple of tools that were failing to run previously.&lt;/li&gt;&lt;li&gt;Images default to &lt;code&gt;iptables-legacy&lt;/code&gt; and &lt;code&gt;ip6tables-legacy&lt;/code&gt; for &lt;strong&gt;iptables support&lt;/strong&gt;.&lt;/li&gt;&lt;li&gt;We now &lt;strong&gt;set a default locale&lt;/strong&gt; of &lt;code&gt;en_US.UTF-8&lt;/code&gt; on all images, you can, of course, change this to your preferred locale.&lt;/li&gt;&lt;li&gt;The &lt;strong&gt;Kali user&lt;/strong&gt; on ARM images is now in all of the &lt;strong&gt;same groups&lt;/strong&gt; as base images by default, and uses &lt;strong&gt;zsh&lt;/strong&gt; for the default shell. You can change your default shell by using the &lt;code&gt;kali-tweaks&lt;/code&gt; tool which also comes pre-installed.&lt;/li&gt;&lt;li&gt;Raspberry Pi images can &lt;strong&gt;now use a &lt;code&gt;wpa_supplicant.conf&lt;/code&gt; file on the &lt;code&gt;/boot&lt;/code&gt; partition&lt;/strong&gt;.&lt;/li&gt;&lt;li&gt;Raspberry Pi images &lt;strong&gt;now come with &lt;code&gt;kalipi-config&lt;/code&gt;, and &lt;code&gt;kalipi-tft-config&lt;/code&gt;&lt;/strong&gt; pre-installed.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Pinebook Pro’s kernel&lt;/strong&gt; has been updated to &lt;strong&gt;5.14&lt;/strong&gt;, and you now get &lt;strong&gt;messages on the LCD screen as it’s booting&lt;/strong&gt;, instead of a blinking cursor until X starts.&lt;/li&gt;&lt;/ul&gt;&lt;!--more--&gt;&lt;p&gt;&lt;/p&gt;&lt;h2 id=&quot;more-docker-supportparallels-supportbug-fixes&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Desktop &amp;amp; Theme Updates&lt;/span&gt;&lt;/h2&gt;&lt;p&gt;There are also some changes in the desktop space:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Improved GTK3 theme for Xfce’s notifications and logout-dialog&lt;/li&gt;&lt;li&gt;Redesigned GTK2 theme for a better fit of older programs&lt;/li&gt;&lt;li&gt;Improved Kali-Dark and Kali-Light syntax-highlighting themes for GNOME and Xfce&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;In addition to these changes, one of Kali’s preferred desktops, KDE plasma, has received a version bump, now including version &lt;a href=&quot;https://kde.org/announcements/plasma/5/5.21.0/&quot;&gt;5.21&lt;/a&gt;. This update brings an updated look, with a new application launcher and theme improvements. Here’s a preview of how it looks with Kali’s customization:&lt;/p&gt;&lt;p&gt;&lt;img alt=&quot;Kali 2021.3 theme updates&quot; height=&quot;360&quot; src=&quot;https://www.kali.org/blog/kali-linux-2021-3-release/images/KDE_5.21.png&quot; title=&quot;Kali 2021.3 theme updates&quot; width=&quot;640&quot; /&gt;&lt;/p&gt;&lt;/div&gt;&lt;div id=&quot;content&quot; style=&quot;text-align: left;&quot;&gt;&lt;h2 id=&quot;download-kali-linux-20212&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Kali Docs Update&lt;br /&gt;&lt;/span&gt;&lt;/h2&gt;&lt;p&gt;Our documentation site, as well as the pages mentioned already in this blog post, the following other pages have received major changes:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;https://www.kali.org/docs/introduction/download-images-securely/&quot;&gt;Download Kali Linux Images Securely&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://www.kali.org/docs/wsl/mesa-21/&quot;&gt;Kali Linux &amp;amp; WSL &amp;amp; Mesa&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://www.kali.org/docs/community/kali-linux-irc-channel/&quot;&gt;Kali Linux IRC Channel&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://www.kali.org/docs/development/contributing-runtime-tests/&quot;&gt;Contributing runtime tests&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h1 id=&quot;gitlab-commit-2021&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;GitLab Commit 2021&lt;/span&gt;&lt;/h1&gt;&lt;p&gt;We participated in GitLab’s virtual conference this year and &lt;a href=&quot;https://twitter.com/g0tmi1k&quot;&gt;@g0tmi1k&lt;/a&gt; gave a talk on the &lt;a href=&quot;https://www.youtube.com/watch?v=M7ixTe-6Oyw&quot;&gt;Dynamic between Kali Linux and OffSec&lt;/a&gt;. Give it a watch!&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;iframe allowfullscreen=&quot;&quot; class=&quot;BLOG_video_class&quot; height=&quot;266&quot; src=&quot;https://www.youtube.com/embed/M7ixTe-6Oyw&quot; width=&quot;481&quot; youtube-src-id=&quot;M7ixTe-6Oyw&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Ampere and ARM&lt;/span&gt;&lt;/h1&gt;&lt;p&gt;Following our &lt;a href=&quot;https://www.kali.org/blog/ampere/&quot;&gt;announcement&lt;/a&gt; of our &lt;a href=&quot;https://www.kali.org/partnerships-sponsorships/&quot;&gt;partnerships&lt;/a&gt; with Ampere, we have now fully moved our ARM package building machines over to their hardware, and loving the speed increase! Thank you again to Ampere for the assistance! If you need some ARM servers give them a look! If they are nice enough to help us out this way, we are sure they will treat you good as well.&lt;/p&gt;&lt;h1 id=&quot;upcoming-changes&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Upcoming Changes&lt;/span&gt;&lt;/h1&gt;&lt;p&gt;Looking forward, we are going to be announcing the following changes:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Kali-Menu refresh&lt;/strong&gt; - We know you may not use it, but for the people who do, we are planning on making some major alterations in its structure. This will hopefully be &lt;strong&gt;live for testing in 2021.4&lt;/strong&gt;, and then made default in a later release based on user response. You will be able to change the menu layout by using &lt;code&gt;kali-tweaks&lt;/code&gt;. If you want to provide input on this change, get engaged with us and make your voice heard!&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Load Balancer&lt;/strong&gt; (http.kali.org &amp;amp; cdimage.kali.org) - This handles apt packages as well as OS images. We will be switching from MirrorBrain to MirrorBits. We will be soon in touch with all the community mirror maintainers to give them notice of our infrastructure changes. If you would like to become a mirror, please see &lt;a href=&quot;https://www.kali.org/docs/community/setting-up-a-kali-linux-mirror/&quot;&gt;our guide&lt;/a&gt;.&lt;/li&gt;&lt;/ul&gt;&lt;h2 id=&quot;download-kali-linux-20213&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Download Kali Linux 2021.3&lt;/span&gt;&lt;/h2&gt;&lt;p&gt;&lt;strong&gt;Fresh Images&lt;/strong&gt;: So what are you waiting for? Start &lt;a href=&quot;https://www.kali.org/get-kali/&quot;&gt;downloading&lt;/a&gt; already!&lt;/p&gt;&lt;p&gt;Seasoned Kali Linux users are already aware of this, but for the those who are not, we do also produce &lt;strong&gt;&lt;a href=&quot;https://cdimage.kali.org/kali-images/kali-weekly/&quot;&gt;weekly builds&lt;/a&gt;&lt;/strong&gt; that you can use as well. If you cannot wait for our next release and you want the latest packages &lt;em&gt;(or bug fixes)&lt;/em&gt; when you download the image, you can just use the weekly image instead. This way you’ll have fewer updates to do. &lt;em&gt;Just know that these are automated builds that we do not QA like we do our standard &lt;a href=&quot;https://www.kali.org/releases/&quot;&gt;release images&lt;/a&gt;&lt;/em&gt;. But we gladly take &lt;a href=&quot;https://bugs.kali.org/&quot;&gt;bug reports&lt;/a&gt; about those images because we want any issues to be fixed before our next release!&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Existing Installs&lt;/strong&gt;: If you already have an existing Kali Linux installation, remember you can always do a quick &lt;a href=&quot;https://www.kali.org/docs/general-use/updating-kali/&quot;&gt;update&lt;/a&gt;:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code class=&quot;ns&quot; style=&quot;outline: currentcolor none 0px; transition: all 0.3s ease 0s;&quot;&gt;echo &quot;deb http://http.kali.org/kali kali-rolling main non-free contrib&quot; | sudo tee /etc/apt/sources.list&lt;/code&gt;&lt;/pre&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code class=&quot;ns&quot; style=&quot;outline: currentcolor none 0px; transition: all 0.3s ease 0s;&quot;&gt;sudo apt update &amp;amp;&amp;amp; sudo apt -y full-upgrade&lt;/code&gt;&lt;/pre&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code class=&quot;ns&quot; style=&quot;outline: currentcolor none 0px; transition: all 0.3s ease 0s;&quot;&gt;[ -f /var/run/reboot-required ] &amp;amp;&amp;amp; sudo reboot -f&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;You should now be on Kali Linux 2021.3. We can do a quick check by doing:&lt;/p&gt;&lt;pre&gt;&lt;code&gt;┌──(kali㉿kali)-[~]&lt;br /&gt;└─$ grep VERSION /etc/os-release&lt;br /&gt;VERSION=&quot;2021.3&quot;&lt;br /&gt;VERSION_ID=&quot;2021.3&quot;&lt;br /&gt;VERSION_CODENAME=&quot;kali-rolling&quot;&lt;br /&gt;&lt;br /&gt;┌──(kali㉿kali)-[~]&lt;br /&gt;└─$ uname -v&lt;br /&gt;#1 SMP Debian 5.10.46-4kali1 (2021-08-09)&lt;br /&gt;&lt;br /&gt;┌──(kali㉿kali)-[~]&lt;br /&gt;└─$ uname -r&lt;br /&gt;5.10.0-kali9-amd64&lt;br /&gt;&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;&lt;em&gt;NOTE: The output of &lt;code&gt;uname -r&lt;/code&gt; may be different depending on the system &lt;a href=&quot;https://pkg.kali.org/pkg/linux&quot;&gt;architecture&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;&lt;p&gt;As always, should you come across any bugs in Kali, please submit a report on our &lt;a href=&quot;https://bugs.kali.org/&quot;&gt;bug tracker&lt;/a&gt;. &lt;em&gt;We’ll never be able to fix what we do not know is broken!&lt;/em&gt; &lt;strong&gt;And &lt;a href=&quot;https://twitter.com/kalilinux&quot;&gt;Twitter&lt;/a&gt; is not a Bug Tracker!&lt;/strong&gt;&lt;/p&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='https://www.kalilinux.in/feeds/6252808913018446994/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.kalilinux.in/2021/02/kali-linux-2021-update.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/6252808913018446994'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/6252808913018446994'/><link rel='alternate' type='text/html' href='https://www.kalilinux.in/2021/02/kali-linux-2021-update.html' title='Kali Linux 2021.3 Update is Here !'/><author><name>Kali Linux</name><uri>http://www.blogger.com/profile/07345541575706459646</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//3.bp.blogspot.com/-Mb3EvSYi1Yg/YOL_LNs2xhI/AAAAAAAAFk4/aghHydKfmagtjPYLvn-SVVNEIJW10TdLACK4BGAYYCw/s113/kali%2Bdragon.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-TfGOC40Wako/YUF559MBzBI/AAAAAAAAF6w/UtTgCjm7eE4pGmJibd_HaObMBMWJZG1zQCLcBGAsYHQ/s72-w320-h167-c/banner-2021.3-release.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6091241131056531264.post-285679871741038928</id><published>2021-09-14T01:30:00.001+05:30</published><updated>2021-09-14T01:30:00.182+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Information Gathering Tools"/><title type='text'>Amap -- Application Mapping Tool, Banner Grabbing</title><content type='html'>&lt;p&gt;Amap is an application mapping tool that we can use to read banners from network services running on remote ports. In our this detailed article we are going to learn hot we can use &lt;b&gt;Amap on Kali Linux&lt;/b&gt; to acquire service banners in order to identify the services running with open ports on a target system.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-6nwyWEibpBw/YS3G6lq9DBI/AAAAAAAAF2Y/4c7vRhKUnZwvhsIvm6gjUKLIWsVlzFRqgCLcBGAsYHQ/s500/AMAP%2BThumbnail.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;amap on Kali Linux&quot; border=&quot;0&quot; data-original-height=&quot;303&quot; data-original-width=&quot;500&quot; height=&quot;194&quot; src=&quot;https://1.bp.blogspot.com/-6nwyWEibpBw/YS3G6lq9DBI/AAAAAAAAF2Y/4c7vRhKUnZwvhsIvm6gjUKLIWsVlzFRqgCLcBGAsYHQ/w320-h194/AMAP%2BThumbnail.png&quot; title=&quot;amap on Kali Linux&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;To use Amap to gather service banners, we will need to have a remote system running network services that discloses information when a client device connects to them. In our article we are going to use a Metasploitable2 instance for example. We already have an article about installing Metasploitable2.&lt;p&gt;&lt;/p&gt;&lt;p&gt;Amap is comes preloaded with our Kali Linux system so we don&#39;t need to install it on our system, we can directly run the following command on our terminal to see the help/options of Amap:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code class=&quot;ns&quot; style=&quot;outline: currentcolor none 0px; transition: all 0.3s ease 0s;&quot;&gt;amap --h&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;The output of command shown in the following screenshot:&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;In the screenshot we can see that -B flag in Amap can be used to run Amap in banner mode. This have it collect banners for the specified IP and service port(s). This application can be used to collect the banner from a single service by specifying the remote IP address and port number.&lt;/p&gt;&lt;p&gt;For an example we run following command on our terminal:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code class=&quot;ns&quot; style=&quot;outline: currentcolor none 0px; transition: all 0.3s ease 0s;&quot;&gt;amap -B 172.20.10.10 21&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;This command will scan our Metaspoitable2 IP to grab the banner of port 21. The result shown in the following screenshot:&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-CwDIdicUUyo/YRoA-hKjC4I/AAAAAAAAFy4/bFRTr8rfmE8RCaazOChERFVH9Awz5LpSwCLcBGAsYHQ/s626/Amap%2BBanner%2Bon%2Bport%2B21.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;banner garbbing on port 21 using amap&quot; border=&quot;0&quot; data-original-height=&quot;136&quot; data-original-width=&quot;626&quot; height=&quot;140&quot; src=&quot;https://1.bp.blogspot.com/-CwDIdicUUyo/YRoA-hKjC4I/AAAAAAAAFy4/bFRTr8rfmE8RCaazOChERFVH9Awz5LpSwCLcBGAsYHQ/w640-h140/Amap%2BBanner%2Bon%2Bport%2B21.png&quot; title=&quot;banner garbbing on port 21 using amap&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;On the above screenshot, we can see that Amap has grabbed the service banner from port 21 on the Metasploitable2 system. We can also run this command to perform a scan of all the possible TCP ports, all the possible ports must need to scanned. The portions of the TCP headers that define the source &amp;amp; destination port address are both 16 bits in length, also each bit can retain a value of 1 or 0. So there are &lt;span&gt;2&lt;sup&gt;16 &lt;/sup&gt;&lt;/span&gt;or 65536 possible TCP port addresses. To scan all the TCP ports all we need to specify the range of 1 to 65535. We can do this by using following command on our terminal:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code class=&quot;ns&quot; style=&quot;outline: currentcolor none 0px; transition: all 0.3s ease 0s;&quot;&gt;amap -B 172.20.10.10 1-65535&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;In the following screenshot we can see the output of the applied command.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-ziA3UKvhrbc/YRoArn3VubI/AAAAAAAAFyw/X6iUJT0qRYsRDgOFodmOgyzVJuAn4Q3_wCLcBGAsYHQ/s1351/amap%2Bbanner%2Bof%2Ball%2Bports.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;amap banner grabbing of all ports&quot; border=&quot;0&quot; data-original-height=&quot;395&quot; data-original-width=&quot;1351&quot; height=&quot;188&quot; src=&quot;https://1.bp.blogspot.com/-ziA3UKvhrbc/YRoArn3VubI/AAAAAAAAFyw/X6iUJT0qRYsRDgOFodmOgyzVJuAn4Q3_wCLcBGAsYHQ/w640-h188/amap%2Bbanner%2Bof%2Ball%2Bports.png&quot; title=&quot;amap banner grabbing of all ports&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;In the above screenshot we can see that we got the opened ports and their banners. Sometimes the normal output of the command shows lots of unnecessary &amp;amp; redundant information that can be extracted from the output. Like the IP address &amp;amp; metadata is there without any logic. We can filter the output using following command:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code class=&quot;ns&quot; style=&quot;outline: currentcolor none 0px; transition: all 0.3s ease 0s;&quot;&gt;amap -B 172.20.10.10 1-65535 | grep &quot;on&quot; | cut -d &quot;:&quot; -f 2-5&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;Now in the following screenshot we can see that the output is to the point.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-eUUyhg3BzJ8/YRoEHkJtCBI/AAAAAAAAFzA/v83I4THHkNg9SEvF6wcJR4ipIyQu13xJACLcBGAsYHQ/s702/filtered%2Boutput%2Bof%2Bamap.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;filtered output of amap&quot; border=&quot;0&quot; data-original-height=&quot;302&quot; data-original-width=&quot;702&quot; height=&quot;276&quot; src=&quot;https://1.bp.blogspot.com/-eUUyhg3BzJ8/YRoEHkJtCBI/AAAAAAAAFzA/v83I4THHkNg9SEvF6wcJR4ipIyQu13xJACLcBGAsYHQ/w640-h276/filtered%2Boutput%2Bof%2Bamap.png&quot; title=&quot;filtered output of amap&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;This shows the principal that tells how Amap can accomplish the task of banner grabbing is same as some other tools like Nmap. Amap cycles through the list of destination port address, attempts to establish a connection with each port, and then receives every returned banner that is sent upon connection to the service running on the port.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Love our articles?&lt;/b&gt; Make sure to &lt;b&gt;follow us&lt;/b&gt; on &lt;a class=&quot;d-link&quot; href=&quot;https://twitter.com/KaliLinux_in&quot; target=&quot;_blank&quot;&gt;Twitter&lt;/a&gt; and &lt;a class=&quot;d-link&quot; href=&quot;https://github.com/jaykali&quot; target=&quot;_blank&quot;&gt;GitHub&lt;/a&gt;, we post article updates there. To join our &lt;b&gt;KaliLinuxIn&lt;/b&gt; family, join our &lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;a class=&quot;d-link&quot; href=&quot;https://t.me/kalilinuxin&quot; target=&quot;_blank&quot;&gt;Telegram Group&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;. We are trying to build a community for Linux and Cybersecurity. For anything we always happy to help everyone on the &lt;span style=&quot;color: red;&quot;&gt;comment section&lt;/span&gt;. As we know our comment section is always open to everyone. We read each and every comment and &lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;we always reply&lt;/span&gt;&lt;/b&gt;. &lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='https://www.kalilinux.in/feeds/285679871741038928/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.kalilinux.in/2021/08/amap-application-mapping-tool.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/285679871741038928'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/285679871741038928'/><link rel='alternate' type='text/html' href='https://www.kalilinux.in/2021/08/amap-application-mapping-tool.html' title='Amap -- Application Mapping Tool, Banner Grabbing'/><author><name>Kali Linux</name><uri>http://www.blogger.com/profile/07345541575706459646</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//3.bp.blogspot.com/-Mb3EvSYi1Yg/YOL_LNs2xhI/AAAAAAAAFk4/aghHydKfmagtjPYLvn-SVVNEIJW10TdLACK4BGAYYCw/s113/kali%2Bdragon.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-6nwyWEibpBw/YS3G6lq9DBI/AAAAAAAAF2Y/4c7vRhKUnZwvhsIvm6gjUKLIWsVlzFRqgCLcBGAsYHQ/s72-w320-h194-c/AMAP%2BThumbnail.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6091241131056531264.post-4327761355384639218</id><published>2021-09-10T01:30:00.002+05:30</published><updated>2021-09-10T18:48:23.590+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Attack Strategies"/><category scheme="http://www.blogger.com/atom/ns#" term="Configure"/><title type='text'>How to Stay Anonymous Completely [100% Perfect]</title><content type='html'>&lt;p&gt;In today&#39;s article we are going to discuss about how we can &lt;u&gt;&lt;i&gt;&lt;b&gt;be anonymous on the internet&lt;/b&gt;&lt;/i&gt;&lt;/u&gt;, because we all love privacy. Sometimes we need to do some private jobs on the internet. So anonymity is important. We can say we can use Tor, VPN to be anonymous. But that&#39;s totally not true.&lt;/p&gt;&lt;p&gt;The perfect say is &quot;&lt;u&gt;&lt;b&gt;Privacy is a myth&lt;/b&gt;&lt;/u&gt;&quot;. We can use the Tor, VPN, Proxychains etc to increase our privacy, but those methods are not totally bulletproof. But in this article we are going to discuss about some techniques that will be really helpful to be more anonymous on the internet. This is going to be another level of anonymity if we didn&#39;t do any mistake from our side.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-00GZL8UU7og/YS3DEzgpCmI/AAAAAAAAF2Q/1zf3Bdkup3Q7niyGnhoKiRLQhGH_4uq_ACLcBGAsYHQ/s1000/Anonymous%2Bthumbnail.webp&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;How to Stay Anonymous Completely on Kali Linux&quot; border=&quot;0&quot; data-original-height=&quot;606&quot; data-original-width=&quot;1000&quot; height=&quot;194&quot; src=&quot;https://1.bp.blogspot.com/-00GZL8UU7og/YS3DEzgpCmI/AAAAAAAAF2Q/1zf3Bdkup3Q7niyGnhoKiRLQhGH_4uq_ACLcBGAsYHQ/w320-h194/Anonymous%2Bthumbnail.webp&quot; title=&quot;How to Stay Anonymous Completely on Kali Linux&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Before going further we need to have a clear idea about Tor and VPN like stuffs. After that we are good to go. As we know that Tor a very good way to be anonymous on internet, but some services detects that we are using Tor and restricts us to use the services. A good example is Google.&lt;p&gt;&lt;/p&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-jx8mGM1uf3A/YSeCfYoDNAI/AAAAAAAAF0A/8T-c8QxfXQIANuYGx7l4UFOZVQivP657ACLcBGAsYHQ/s998/google%2Bdetects%2Btor.png&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;google detects tor&quot; border=&quot;0&quot; data-original-height=&quot;609&quot; data-original-width=&quot;998&quot; height=&quot;244&quot; src=&quot;https://1.bp.blogspot.com/-jx8mGM1uf3A/YSeCfYoDNAI/AAAAAAAAF0A/8T-c8QxfXQIANuYGx7l4UFOZVQivP657ACLcBGAsYHQ/w400-h244/google%2Bdetects%2Btor.png&quot; title=&quot;google detects tor&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Google &lt;/span&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;ILfuVd NA6bn&quot;&gt;&lt;span class=&quot;hgKElc&quot;&gt;catch&lt;/span&gt;&lt;/span&gt; Tor network&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;p&gt;Also the VPN providers may keep our activity logs on their database (Paid VPN providers told that, they don&#39;t keep logs. &lt;b&gt;But can we trust them?&lt;/b&gt; let us know in the comment section below). Then what to do?&lt;/p&gt;&lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Be Anonymous Online&lt;/span&gt;&lt;/h1&gt;&lt;p&gt;So, in this article we are going to talk about a easy, fast and effective way to be anonymous online. By following this real IP address will be very very hard to detect by anyone on the world, we just need to finish the article totally to get the pro idea.&lt;/p&gt;&lt;p&gt;The idea is easy yet powerful. We are going to use Tor and Proxychains together. First we run Tor then we run our proxychains. By doing this services like Google TorCheck etc will get the IP address of our proxy servers and those proxyservers also don&#39;t have our real IP address, they have the IP address of our Tor. Let&#39;s practically do it. For the first time we need to do some proxychains configurations and need to learn basics of it.&lt;/p&gt;&lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Configuring ProxyChains&lt;/span&gt;&lt;/h1&gt;&lt;p&gt;Proxychains comes pre-installed with Kali Linux, also we can install it using following command:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;sudo apt install proxychains&lt;/pre&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-sUchZTpASr0/YSh0LXCwxqI/AAAAAAAAF0I/CQS_ubuM_QcJK35AN_OKG_GB83UfV9tIgCLcBGAsYHQ/s940/installing%2Bproxychains.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;installing proxychains on Kali Linux&quot; border=&quot;0&quot; data-original-height=&quot;446&quot; data-original-width=&quot;940&quot; height=&quot;304&quot; src=&quot;https://1.bp.blogspot.com/-sUchZTpASr0/YSh0LXCwxqI/AAAAAAAAF0I/CQS_ubuM_QcJK35AN_OKG_GB83UfV9tIgCLcBGAsYHQ/w640-h304/installing%2Bproxychains.png&quot; title=&quot;installing proxychains on Kali Linux&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;After that we need to configure it as we want to use. Let we open the configuration file by using following command:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;sudo nano /etc/proxychains.conf&lt;/pre&gt;&lt;p&gt;The above command will open the proxychains configuration file as we can see in the following screenshot:&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-MPBv1rb8tYI/YSh1fJHMGOI/AAAAAAAAF0Q/wzhW63pHGps-u8ZlwZg4ufj1NjE-SIpkwCLcBGAsYHQ/s940/proxychains%2Bconfiguration%2Bfile.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;proxychains configuration file&quot; border=&quot;0&quot; data-original-height=&quot;446&quot; data-original-width=&quot;940&quot; height=&quot;304&quot; src=&quot;https://1.bp.blogspot.com/-MPBv1rb8tYI/YSh1fJHMGOI/AAAAAAAAF0Q/wzhW63pHGps-u8ZlwZg4ufj1NjE-SIpkwCLcBGAsYHQ/w640-h304/proxychains%2Bconfiguration%2Bfile.png&quot; title=&quot;proxychains configuration file&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;If we scroll down to the end of the file we can see the list of proxies.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-mub2EnRrhNg/YSh2EhI6HJI/AAAAAAAAF0Y/jM4QNjYjMI8QKc7QgXizqyuwsD_vq3cUwCLcBGAsYHQ/s915/proxylists.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;proxylists&quot; border=&quot;0&quot; data-original-height=&quot;353&quot; data-original-width=&quot;915&quot; height=&quot;246&quot; src=&quot;https://1.bp.blogspot.com/-mub2EnRrhNg/YSh2EhI6HJI/AAAAAAAAF0Y/jM4QNjYjMI8QKc7QgXizqyuwsD_vq3cUwCLcBGAsYHQ/w640-h246/proxylists.png&quot; title=&quot;proxylists&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;We can add our proxy servers here. First is proxy type then IP address then port number. We also can add username and password of the proxy server (If required). Everything is shown in the following screenshot:&lt;/p&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-pQF2_eLEB3s/YSh5UmlppoI/AAAAAAAAF0g/Lt5HeIEmBxY816tdoHn8pA3W_eFnljKgACLcBGAsYHQ/s915/proxylists.png&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Proxylists configuration&quot; border=&quot;0&quot; data-original-height=&quot;353&quot; data-original-width=&quot;915&quot; height=&quot;246&quot; src=&quot;https://1.bp.blogspot.com/-pQF2_eLEB3s/YSh5UmlppoI/AAAAAAAAF0g/Lt5HeIEmBxY816tdoHn8pA3W_eFnljKgACLcBGAsYHQ/w640-h246/proxylists.png&quot; title=&quot;Proxylists configuration&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Proxy list explained&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;p&gt;Now we can add proxies list here.&lt;/p&gt;&lt;p&gt;Just not only proxies list we can configure many more things here, like if the proxy server is taking to much time then we can set timeout for them.&lt;/p&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-5okX-CyWV5E/YSh7ROY-fhI/AAAAAAAAF0o/skbRNpnF0FcMxgD2561I_V1QtjXl9CZfQCLcBGAsYHQ/s835/proxy%2Btimeout%2Bsettings.png&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;proxy timeout settings&quot; border=&quot;0&quot; data-original-height=&quot;391&quot; data-original-width=&quot;835&quot; height=&quot;300&quot; src=&quot;https://1.bp.blogspot.com/-5okX-CyWV5E/YSh7ROY-fhI/AAAAAAAAF0o/skbRNpnF0FcMxgD2561I_V1QtjXl9CZfQCLcBGAsYHQ/w640-h300/proxy%2Btimeout%2Bsettings.png&quot; title=&quot;proxy timeout settings&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Proxy timeout settings&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;p&gt;We also can configure various type of chains (proxychains) here, like dynamic chain, random chain, strict chain. The works of the chains is well written here.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-q2X_5EhLY7w/YSh8JLSohxI/AAAAAAAAF0w/cLpdKvfqzxc1jx6qhQE-57gWUNapkpS7wCLcBGAsYHQ/s740/various%2Btype%2Bof%2Bproxychains.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;various type of proxychains&quot; border=&quot;0&quot; data-original-height=&quot;370&quot; data-original-width=&quot;740&quot; height=&quot;320&quot; src=&quot;https://1.bp.blogspot.com/-q2X_5EhLY7w/YSh8JLSohxI/AAAAAAAAF0w/cLpdKvfqzxc1jx6qhQE-57gWUNapkpS7wCLcBGAsYHQ/w640-h320/various%2Btype%2Bof%2Bproxychains.png&quot; title=&quot;various type of proxychains&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;But in easy language we can explain them as following. Suppose we have a list of proxies in this configuration file.&lt;br /&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;u&gt;&lt;b&gt;Dynamic Chain:-&lt;/b&gt;&lt;/u&gt; In this chain our proxy server&#39;s list will maintain the order we have set, but if one or more proxy server is not working it will skip it to get the connection.&lt;/li&gt;&lt;li&gt;&lt;u&gt;&lt;b&gt;Strict Chain:-&lt;/b&gt;&lt;/u&gt; In this type of chain our proxy server&#39;s order will maintained and also every proxy server must need to work otherwise it will not make the connection.&lt;/li&gt;&lt;li&gt;&lt;u&gt;&lt;b&gt;Random Chain:-&lt;/b&gt;&lt;/u&gt; In this type it will use random proxies from our proxy server&#39;s list. It will not maintain any order.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Here we are going to set multiple proxy servers in our proxy list. Where to get free proxies? well there are some websites that provides us free and paid proxies. &lt;a href=&quot;https://hidemy.name/en/proxy-list/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;HidemyName&lt;/a&gt;, &lt;a href=&quot;https://geonode.com/free-proxy-list&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Genode&lt;/a&gt; and &lt;a href=&quot;https://github.com/TheSpeedX/PROXY-List&quot; target=&quot;_blank&quot;&gt;Proxy-List&lt;/a&gt; etc.We can Google &quot;free proxy server&quot; for more.&lt;br /&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-x4f3sA05oxg/YSh-2G5b0AI/AAAAAAAAF04/x9S0E9l5kzAP71_CTQzTfjnVFhIq2l1VgCLcBGAsYHQ/s1283/hidemyname.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;hidemyname&quot; border=&quot;0&quot; data-original-height=&quot;589&quot; data-original-width=&quot;1283&quot; height=&quot;184&quot; src=&quot;https://1.bp.blogspot.com/-x4f3sA05oxg/YSh-2G5b0AI/AAAAAAAAF04/x9S0E9l5kzAP71_CTQzTfjnVFhIq2l1VgCLcBGAsYHQ/w400-h184/hidemyname.png&quot; title=&quot;hidemyname&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;We can see the IP address and port of proxy servers, also we can see country/city, speed, type, anonymity etc in the list. We just need the Type, IP and port to add them on our proxychains.conf file. Here we had add two proxies on the configuration file.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-21tomGHkxv0/YS27ZflfPKI/AAAAAAAAF2I/78GkXzhRsSYb2R4_i3HptdtzNUwOBu5igCLcBGAsYHQ/s915/proxychains%2Blist.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Proxy lists in proxychains configuration file on Kali Linux&quot; border=&quot;0&quot; data-original-height=&quot;357&quot; data-original-width=&quot;915&quot; height=&quot;250&quot; src=&quot;https://1.bp.blogspot.com/-21tomGHkxv0/YS27ZflfPKI/AAAAAAAAF2I/78GkXzhRsSYb2R4_i3HptdtzNUwOBu5igCLcBGAsYHQ/w640-h250/proxychains%2Blist.png&quot; title=&quot;Proxy lists in proxychains configuration file on Kali Linux&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Here for example we are going to use dynamic proxy chains. So we remove the &#39;#&#39; before the dynamic chain and put a &#39;#&#39; before the strict chain to disable it. Shown in the following screenshot:&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-G6_SqbWQtqU/YSiBJEHhzaI/AAAAAAAAF1I/6IOBz5BJFHUR0WSsXoUUZei9xsihqWVmwCLcBGAsYHQ/s533/dynamic%2Bchain%2Bproxy.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;dynamic proxy chain enabled&quot; border=&quot;0&quot; data-original-height=&quot;180&quot; data-original-width=&quot;533&quot; height=&quot;216&quot; src=&quot;https://1.bp.blogspot.com/-G6_SqbWQtqU/YSiBJEHhzaI/AAAAAAAAF1I/6IOBz5BJFHUR0WSsXoUUZei9xsihqWVmwCLcBGAsYHQ/w640-h216/dynamic%2Bchain%2Bproxy.png&quot; title=&quot;dynamic proxy chain enabled&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Now we can save and close the proxy chains configuration file by pressing &lt;span style=&quot;font-family: courier;&quot;&gt;CTRL+X&lt;/span&gt; then &lt;span style=&quot;font-family: courier;&quot;&gt;Y&lt;/span&gt;, Then &lt;span style=&quot;font-family: courier;&quot;&gt;Enter ⤶&lt;/span&gt;.&lt;/p&gt;&lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Using Tor with Proxychains&lt;br /&gt;&lt;/span&gt;&lt;/h1&gt;&lt;p&gt;We can install Tor services on our Kali Linux system by using following command:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;sudo apt install tor&lt;/pre&gt;&lt;p&gt;In the following screenshot we can see that tor is installing on our system:&lt;/p&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-PxX26oaopEU/YSiC9d4uOnI/AAAAAAAAF1Q/2XmZlW_nxy0cHY2YkfSdGuTmq8-fTg-FQCLcBGAsYHQ/s1146/installing%2Btor%2Bon%2Bkali%2Blinux.png&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;installing tor on kali linux&quot; border=&quot;0&quot; data-original-height=&quot;539&quot; data-original-width=&quot;1146&quot; height=&quot;302&quot; src=&quot;https://1.bp.blogspot.com/-PxX26oaopEU/YSiC9d4uOnI/AAAAAAAAF1Q/2XmZlW_nxy0cHY2YkfSdGuTmq8-fTg-FQCLcBGAsYHQ/w640-h302/installing%2Btor%2Bon%2Bkali%2Blinux.png&quot; title=&quot;installing tor on kali linux&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Installing Tor on Kali Linux&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;p&gt;After the installation is complete we can start the Tor services by using following command:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;sudo service tor start&lt;/pre&gt;Then our Tor services will start, we can check the status of the services by using following command:&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;sudo service tor status&lt;/pre&gt;&lt;p&gt;Yes, our Tor services is running successfully, we can see it in the following screenshot:&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-0Maa6NAcvAI/YS22eCYZNPI/AAAAAAAAF1g/1Z7ImSN5-PoHD7zlVpV32DMIQhPG75XkACLcBGAsYHQ/s888/tor%2Bservices%2Brunning.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Tor services is running&quot; border=&quot;0&quot; data-original-height=&quot;263&quot; data-original-width=&quot;888&quot; height=&quot;190&quot; src=&quot;https://1.bp.blogspot.com/-0Maa6NAcvAI/YS22eCYZNPI/AAAAAAAAF1g/1Z7ImSN5-PoHD7zlVpV32DMIQhPG75XkACLcBGAsYHQ/w640-h190/tor%2Bservices%2Brunning.png&quot; title=&quot;Tor services is running&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Now we can check this on our browser. We open our browser and navigate to torchecker. In the following screenshot we can see that we are using Tor and it detects it. Now all websites or services on the internet can catch us that we are using Tor network. Here we runs our proxychains.&lt;/p&gt;&lt;p&gt;If we want to run proxychains with our browser we need to type following command on our terminal:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;proxychains firefox&lt;/pre&gt;&lt;p&gt;Now our firefox browser will open in front of us. Lets have a look at TorChecker.&lt;/p&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-ADRiDLd-_-g/YS24xtZo8hI/AAAAAAAAF1w/ycMzquWfr0siR2_w-PjZ7V83UuM-Te3hgCLcBGAsYHQ/s1330/proxychainns%2Bwith%2Btor1.png&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Proxychains with Tor&quot; border=&quot;0&quot; data-original-height=&quot;442&quot; data-original-width=&quot;1330&quot; height=&quot;133&quot; src=&quot;https://1.bp.blogspot.com/-ADRiDLd-_-g/YS24xtZo8hI/AAAAAAAAF1w/ycMzquWfr0siR2_w-PjZ7V83UuM-Te3hgCLcBGAsYHQ/w400-h133/proxychainns%2Bwith%2Btor1.png&quot; title=&quot;Proxychains with Tor&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;It detects the IP of Proxyservers&lt;/span&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;p&gt;As the above screenshot we can see that it can&#39;t detect us that we are using Tor. But Tor services is running. Then why it can&#39;t detect it? Our connection is going through the Tor nodes to the proxy servers by doing proxy servers didn&#39;t getting our real IP. If they keep logs they can, but our real IP will remain hidden for Tor. We can see it on the following screenshot:&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-A3LErD1n060/YS25YuA54NI/AAAAAAAAF14/_9Fovsb-kOEc71v_sDS44qWYSO6kNUI2wCLcBGAsYHQ/s1357/proxychainns%2Bwith%2Btor.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;proxychains used with tor on Kali Linux&quot; border=&quot;0&quot; data-original-height=&quot;713&quot; data-original-width=&quot;1357&quot; height=&quot;336&quot; src=&quot;https://1.bp.blogspot.com/-A3LErD1n060/YS25YuA54NI/AAAAAAAAF14/_9Fovsb-kOEc71v_sDS44qWYSO6kNUI2wCLcBGAsYHQ/w640-h336/proxychainns%2Bwith%2Btor.png&quot; title=&quot;proxychains used with tor on Kali Linux&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Here we can directly use Tor Tor is good for anonymity but as we told some websites and services didn&#39;t allow Tor network IP&#39;s. Now they can&#39;t detect us and we can do all the things online remain anonymous.&lt;/p&gt;&lt;p&gt;By using this method not only web surfing we can do almost every task. Like by using the following command we can use it for nmap scanning:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;proxychains nmap -Pn google.com&lt;/pre&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-ykXKxa9z6LY/YS26INMjWLI/AAAAAAAAF2A/tzIMCg4jbTMB39SfzsYpZ-SL8mrfl4CxQCLcBGAsYHQ/s579/proxychains%2Bwith%2Bnmap.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;using nmap with proxychains on kali linux&quot; border=&quot;0&quot; data-original-height=&quot;170&quot; data-original-width=&quot;579&quot; height=&quot;118&quot; src=&quot;https://1.bp.blogspot.com/-ykXKxa9z6LY/YS26INMjWLI/AAAAAAAAF2A/tzIMCg4jbTMB39SfzsYpZ-SL8mrfl4CxQCLcBGAsYHQ/w400-h118/proxychains%2Bwith%2Bnmap.png&quot; title=&quot;using nmap with proxychains on kali linux&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Now in the above screenshot we can see that we are scanning using Nmap with the help of Tor and Proxychains.&lt;/p&gt;&lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Things We Should Aware&lt;/span&gt;&lt;br /&gt;&lt;/h1&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;We need to remember that after sometimes we need to check if our tor services are running properly by using &lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;sudo service tor status&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt; command.&lt;/li&gt;&lt;li&gt;Here we had used dynamic chain for an example but in this dynamic chain if we got any issue with one proxy sever it will skip it. So if we want a better result we need to use strict chain.&lt;/li&gt;&lt;li&gt;Here for an example we have used only two proxy servers but for better anonymity we need to use as much as proxy server we can. But one thing, increasing amount of proxy servers will decrease the internet speed.&lt;/li&gt;&lt;li&gt;We need to check if the proxy we got for free is working or not. In real life scenario they mostly found dead. We can use some &lt;a href=&quot;https://github.com/TheSpeedX/socker&quot; target=&quot;_blank&quot;&gt;proxy checker tools&lt;/a&gt; to check if they are working or not. It the proxy is not working then we might get &quot;socket error or timeout!&quot; error.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Proxychains configuration file uses Tor because of it&#39;s default Tor proxychains configuration. We shouldn&#39;t remove Tor&#39;s proxy from here. If we removed Tor&#39;s proxy from here then proxychain will not work with Tor. &lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&amp;nbsp;&lt;/p&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-kaQZgOO8RJI/YS23_DECSrI/AAAAAAAAF1o/V96ELcH4GMUR9uTBKWl4Ue-jwhjDZfyIQCLcBGAsYHQ/s379/tor%2527s%2Bproxy.png&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;tor default proxy&quot; border=&quot;0&quot; data-original-height=&quot;141&quot; data-original-width=&quot;379&quot; height=&quot;149&quot; src=&quot;https://1.bp.blogspot.com/-kaQZgOO8RJI/YS23_DECSrI/AAAAAAAAF1o/V96ELcH4GMUR9uTBKWl4Ue-jwhjDZfyIQCLcBGAsYHQ/w400-h149/tor%2527s%2Bproxy.png&quot; title=&quot;tor default proxy&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Default proxy for Tor Should not remove&lt;/span&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;This is all about smart way to be anonymous in the internet world. Here we had used Tor, but Tor checkers didn&#39;t catch us. Internet will got our Proxy server&#39;s IP and the Proxy server will get our Tor network&#39;s IP. By that way we can browse the &lt;b&gt;Internet anonymously&lt;/b&gt;.&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Love our articles?&lt;/b&gt; Make sure to &lt;b&gt;follow us&lt;/b&gt; on &lt;a class=&quot;d-link&quot; href=&quot;https://twitter.com/KaliLinux_in&quot; target=&quot;_blank&quot;&gt;Twitter&lt;/a&gt; and &lt;a class=&quot;d-link&quot; href=&quot;https://github.com/jaykali&quot; target=&quot;_blank&quot;&gt;GitHub&lt;/a&gt;, we post article updates there. To join our &lt;b&gt;KaliLinuxIn&lt;/b&gt; family, join our &lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;a class=&quot;d-link&quot; href=&quot;https://t.me/kalilinuxin&quot; target=&quot;_blank&quot;&gt;Telegram Group&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;. We are trying to build a community for Linux and Cybersecurity. For anything we always happy to help everyone on the &lt;span style=&quot;color: red;&quot;&gt;comment section&lt;/span&gt;. As we know our comment section is always open to everyone. We read each and every comment and &lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;we always reply&lt;/span&gt;&lt;/b&gt;.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='https://www.kalilinux.in/feeds/4327761355384639218/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.kalilinux.in/2021/08/how-to-be-complete-anonymous-online.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/4327761355384639218'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/4327761355384639218'/><link rel='alternate' type='text/html' href='https://www.kalilinux.in/2021/08/how-to-be-complete-anonymous-online.html' title='How to Stay Anonymous Completely [100% Perfect]'/><author><name>Kali Linux</name><uri>http://www.blogger.com/profile/07345541575706459646</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//3.bp.blogspot.com/-Mb3EvSYi1Yg/YOL_LNs2xhI/AAAAAAAAFk4/aghHydKfmagtjPYLvn-SVVNEIJW10TdLACK4BGAYYCw/s113/kali%2Bdragon.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-00GZL8UU7og/YS3DEzgpCmI/AAAAAAAAF2Q/1zf3Bdkup3Q7niyGnhoKiRLQhGH_4uq_ACLcBGAsYHQ/s72-w320-h194-c/Anonymous%2Bthumbnail.webp" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6091241131056531264.post-4716935209676690017</id><published>2021-09-10T01:00:00.001+05:30</published><updated>2021-09-10T18:53:44.047+05:30</updated><title type='text'>How To Decode VIN Numbers For Vehicle Identification</title><content type='html'>&lt;p&gt;&lt;a href=&quot;https://vinpit.com/&quot; target=&quot;_blank&quot;&gt;VIN number&lt;/a&gt; is a significant number that helps you know a lot of information about any vehicle. There are a number of VIN decoders available online. You can use any decoder, but the Mercedes VIN decoder is the best option to go for.&lt;/p&gt;&lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;What is a VIN Number?&lt;/span&gt;&lt;/h1&gt;&lt;p&gt;VIN is the short form to Vehicle Identification Number. It is an identifying code that is unique to each and every vehicle. VIN number defines a lot of details about the particular vehicle.&lt;/p&gt;&lt;p&gt;The code is 17 characters long which involves numerical digits and letters. What if the code is not 17 characters long? You can cross-check it several times from several places. If the correct code is, then definitely the vehicle has been manufactured before 1981 and has limited information.&lt;/p&gt;&lt;p&gt;VIN is termed the DNA of vehicles. As DNA tells the traits of a human, VIN reveals essential information about the car. &lt;br /&gt;&lt;/p&gt;&lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;How To Decode The VIN?&lt;/span&gt;&lt;/h1&gt;&lt;p style=&quot;text-align: left;&quot;&gt;Analysing the VIN Number itself is sufficient to know a number of details about the vehicle. This 17 character code is a combination of codes that represents many different things about the vehicle. &lt;br /&gt;&lt;br /&gt;&lt;/p&gt;&lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;How Can You Identify or Decode the VIN Number?&lt;/span&gt;&lt;/h1&gt;&lt;p style=&quot;text-align: left;&quot;&gt;Each character of VIN represents something or the other. You can understand what each character means.&lt;br /&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;The 1st character specifies where the vehicle is manufactured. It is the country code where the manufacturing unit is located. &lt;/li&gt;&lt;li&gt;2nd character tells about the manufacturer of the vehicle. &lt;/li&gt;&lt;li&gt;3rd character represents the vehicle type or division. &lt;/li&gt;&lt;li&gt;The 4th to 8th characters represents the portrait of the vehicles that is vehicle’s brand, body style, engine size and type, model, series, etc. &lt;/li&gt;&lt;li&gt;The 9th character is a security code that identifies the VIN as being authorised by the manufacturer. &lt;/li&gt;&lt;li&gt;The 10th character is a representation of the model year of the car.&lt;/li&gt;&lt;li&gt;The 11th character indicates which plant assembled the vehicle. &lt;/li&gt;&lt;li&gt;The last six characters are the serial number or production number of the vehicle.&lt;/li&gt;&lt;/ul&gt;&lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;How is VIN Decoder Useful?&lt;/span&gt;&lt;/h1&gt;&lt;p style=&quot;text-align: left;&quot;&gt;A VIN number decoder is straightforward yet effective. It uses enormous data culled from sources just like the National Highway Traffic Safety Administration (NHTSA) to extract vehicle info stored within the VIN.&lt;br /&gt;&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-giUSntd_C5Q/YTqjfC5x6eI/AAAAAAAAF4Q/Tx2vrGZ42q8euUZj4OcXL8xKzJ0lOVpJgCLcBGAsYHQ/s1200/mercedes-vin-decoder.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;mercedes-vin-decoder&quot; border=&quot;0&quot; data-original-height=&quot;469&quot; data-original-width=&quot;1200&quot; height=&quot;250&quot; src=&quot;https://1.bp.blogspot.com/-giUSntd_C5Q/YTqjfC5x6eI/AAAAAAAAF4Q/Tx2vrGZ42q8euUZj4OcXL8xKzJ0lOVpJgCLcBGAsYHQ/w640-h250/mercedes-vin-decoder.jpg&quot; title=&quot;mercedes-vin-decoder&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;A VIN decoder will provide accurate information related to a vehicle. It will help you verify the information provided manually to you. The VIN has in it several details about your car. And you might need that information while you are trying to purchase a car or get a spare for your vehicle.&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;How to Decode VIN Numbers for Identification of Vehicle?&lt;/span&gt;&lt;/h1&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;/p&gt;&lt;p&gt;Now that you know you can get a big piece of information about the vehicle through its VIN, the question arises of how anyone can decode it. VIN decoders are available to ease out your process.&lt;/p&gt;&lt;p&gt;Here are some quick, simple steps through which you can decode any VIN&lt;/p&gt;&lt;h3 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;1. Get VIN Number&lt;/span&gt;&lt;/h3&gt;&lt;p&gt;The foremost step is to get the VIN number. You can get this on different locations of the car, insurance card or vehicle title.&lt;/p&gt;&lt;h3 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;2. Go to the Mercedes VIN Decoder&lt;/span&gt;&lt;/h3&gt;&lt;p style=&quot;text-align: left;&quot;&gt;Once you get the VIN number, now you look for a VIN decoder. You will get an ample amount of options to choose from. Or a simpler and much convenient option is to go for &lt;a href=&quot;https://mercedes-vin-decoder.com/&quot; target=&quot;_blank&quot;&gt;Mercedes VIN Decoder&lt;/a&gt;. This is the best VIN decoder you can have.&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-HdNOaFqvqzc/YTql6MdgNiI/AAAAAAAAF4Y/qlPLn4ZHfbwLzuYpfJrIpJ6RPAvQrQwcQCLcBGAsYHQ/s1200/mercedes-vin-decoder.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Search Your VIN Number&quot; border=&quot;0&quot; data-original-height=&quot;469&quot; data-original-width=&quot;1200&quot; height=&quot;250&quot; src=&quot;https://1.bp.blogspot.com/-HdNOaFqvqzc/YTql6MdgNiI/AAAAAAAAF4Y/qlPLn4ZHfbwLzuYpfJrIpJ6RPAvQrQwcQCLcBGAsYHQ/w640-h250/mercedes-vin-decoder.jpg&quot; title=&quot;Search Your VIN Number&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;h3 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;3. Search Your VIN Number&lt;/span&gt;&lt;/h3&gt;&lt;p&gt;On the homepage, you will see a tab named ‘VIN Decoder ’. Click on that tab to get the VIN decoder search bar.&lt;/p&gt;&lt;p&gt;Now next step is to type the VIN number and press search. You will get all the desired results within a couple of seconds.&lt;/p&gt;&lt;p&gt;The VIN number has now been successfully decoded for the identification of the vehicle.&lt;/p&gt;&lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;VIN Decoder Results&lt;/span&gt;&lt;/h1&gt;&lt;p&gt;Now that you have searched the VIN number and got your desired results. You should know beforehand that what can you expect from a VIN decoder.&lt;/p&gt;&lt;p&gt;You can run a VIN decoder to figure the full vehicle history report in one go.&lt;/p&gt;&lt;h3 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Theft history&lt;/span&gt;&lt;/h3&gt;&lt;p style=&quot;text-align: left;&quot;&gt;With the help of a VIN decoder, you will get to know if the car has ever been stolen or there has been a theft record of this car.&lt;/p&gt;&lt;h3 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Accident history&lt;/span&gt;&lt;/h3&gt;&lt;p style=&quot;text-align: left;&quot;&gt;Nobody’s going to tell you that the car had met an accident ever in past. This reduces the value of the vehicle. There may be some hidden damages to the vehicle that you are unable to identify.&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;VIN number helps you with the full accidental history of the vehicle.&lt;/p&gt;&lt;h3 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Year of production&lt;/span&gt;&lt;/h3&gt;&lt;p style=&quot;text-align: left;&quot;&gt;You will be able to know in which year the vehicle was manufactured.&lt;/p&gt;&lt;h3 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Safety information related&lt;/span&gt;&lt;/h3&gt;&lt;p style=&quot;text-align: left;&quot;&gt;Mercedes VIN decoder provides you with all the safety-related information associated with the vehicle.&lt;/p&gt;&lt;h3 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Location of vehicle registration&lt;/span&gt;&lt;/h3&gt;&lt;p style=&quot;text-align: left;&quot;&gt;The registration details of the vehicle, along with the location of registration, can also be obtained through the VIN decoder.&lt;/p&gt;&lt;h3 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Other Vital information&lt;/span&gt;&lt;/h3&gt;&lt;p&gt;VIN decoder lets you know all other vital information about the car.&lt;/p&gt;&lt;p&gt;With these search results, you will get to know all the above-mentioned information that you use and how you need it.&lt;/p&gt;&lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;End Notes&lt;/span&gt;&lt;/h1&gt;&lt;p&gt;VIN number is truly an identification code of any vehicle. You can decode a large piece of information through the VIN. Mercedes VIN decoder is a really useful tool that helps to decode the VIN numbers for vehicle identification.&lt;/p&gt;&lt;p&gt;You will not just be able to identify the vehicle but also get in-depth knowledge about the minute details of any vehicle.&lt;/p&gt;&lt;p&gt;There are many VIN decoders in the market. You can try those decoders by yourself. Although, the Mercedes VIN decoder is the most recommended VIN decoder ever. It has been highly reviewed and liked by users across different countries. When you have an option, why not go for the best.&lt;/p&gt;&lt;p&gt;Try the Mercedes VIN decoder now, use all its features, and you will definitely like it. All the information provided is very useful and must be known. You can use the features and results of the tool to your utmost benefit.&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='https://www.kalilinux.in/feeds/4716935209676690017/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.kalilinux.in/2021/09/how-to-decode-vin-numbers-for-vehicle.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/4716935209676690017'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/4716935209676690017'/><link rel='alternate' type='text/html' href='https://www.kalilinux.in/2021/09/how-to-decode-vin-numbers-for-vehicle.html' title='How To Decode VIN Numbers For Vehicle Identification'/><author><name>Kali Linux</name><uri>http://www.blogger.com/profile/07345541575706459646</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//3.bp.blogspot.com/-Mb3EvSYi1Yg/YOL_LNs2xhI/AAAAAAAAFk4/aghHydKfmagtjPYLvn-SVVNEIJW10TdLACK4BGAYYCw/s113/kali%2Bdragon.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-giUSntd_C5Q/YTqjfC5x6eI/AAAAAAAAF4Q/Tx2vrGZ42q8euUZj4OcXL8xKzJ0lOVpJgCLcBGAsYHQ/s72-w640-h250-c/mercedes-vin-decoder.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6091241131056531264.post-8122853014414783854</id><published>2021-09-09T06:29:00.000+05:30</published><updated>2021-09-09T06:29:31.320+05:30</updated><title type='text'>How students can cope with paper on a cybersecurity topic</title><content type='html'>&lt;p&gt;Today students have to deal with written assignments regularly. Writing papers for college starts when you complete an admission essay or a personal statement and finish after getting the desired degree. Moreover, people proceed with writing emails, work documents, and other professional papers after college too. That is why learning how to write papers on different topics is essential when you are a student. Choosing the correct topic for any paper is significant.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-mbUErf1kKIY/YTlcJDt5S1I/AAAAAAAAF4I/x8F_61AGo-Qm7ep2lNHMG1a1K5jb6OMEACLcBGAsYHQ/s1000/thumbnail.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;How students can cope with paper on a cybersecurity topic&quot; border=&quot;0&quot; data-original-height=&quot;667&quot; data-original-width=&quot;1000&quot; height=&quot;213&quot; src=&quot;https://1.bp.blogspot.com/-mbUErf1kKIY/YTlcJDt5S1I/AAAAAAAAF4I/x8F_61AGo-Qm7ep2lNHMG1a1K5jb6OMEACLcBGAsYHQ/w320-h213/thumbnail.jpg&quot; title=&quot;How students can cope with paper on a cybersecurity topic&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;For example, if you are studying subjects in cybersecurity, you have to concentrate on the topic and research to create a meaningful paper. However, writing about cybersecurity has many other aspects, and the teacher&#39;s impression of your work would depend on various criteria. There are many vital elements to consider in terms of writing, and not all students can meet the requirements for papers. Thanks to writing services, there is an ability to purchase affordable essays, speeches, and reviews. At a reliable homework help website, you could find &lt;a href=&quot;https://writingcheap.com/paper-writing.html&quot; target=&quot;_blank&quot;&gt;cheap term papers&lt;/a&gt; and get help with other types of tasks.&lt;p&gt;&lt;/p&gt;&lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;What is cybersecurity?&lt;/span&gt;&lt;/h1&gt;&lt;p style=&quot;text-align: left;&quot;&gt;The area of cybersecurity learns the processes and innovations in PC systems and projects to ensure and protect them from assaults and cybercrimes. Many fields involve cybersecurity: from healthcare and sales to finances and banking.&lt;/p&gt;&lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;How to write a paper on a cybersecurity topic?&lt;/span&gt;&lt;/h1&gt;&lt;p&gt;There are many aspects in the cybersecurity field, so following the advice would help you navigate through the process.&lt;/p&gt;&lt;h3 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Define the subject&lt;/span&gt;&lt;/h3&gt;&lt;p style=&quot;text-align: left;&quot;&gt;Choosing a subject is significant for any type of paper on cybersecurity. If you are interested in some areas of cybersecurity or liked the topic you discussed in class, ask your professor about the possibility of dedicating your research to this area. If the subject inspired you, the motivation to create a meaningful paper would be high, and your teacher would appreciate your efforts. If you are new to an area of cybersecurity, then choose one of the topics suggested in the manuals for your paper.&lt;/p&gt;&lt;h3 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Read the requirements&lt;/span&gt;&lt;/h3&gt;&lt;p style=&quot;text-align: left;&quot;&gt;Before you proceed with writing, you need to define the type of paper, word count, style of formatting, grading criteria, and other vital aspects of your future paper. The main thing to define is the aim of writing a paper on cybersecurity, as the structure of a paper would depend on it. For example, if you need to write an argumentative essay, you have to state your opinion and prove it right. If you are assigned to write a research paper, you need to collect information from various sources and expose the results properly.&lt;/p&gt;&lt;h3 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Research the topic&lt;/span&gt;&lt;/h3&gt;&lt;p style=&quot;text-align: left;&quot;&gt;Now it is time to collect all the information you may find on a chosen topic. You need to consider the list of sources suggested by your teacher first and add some materials you find relevant. Depending on the type of paper, you would require to use online materials, websites, blogs, science literature, and books. Note that if you use quotations from sources, you have to put references in the text.&lt;/p&gt;&lt;h3 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Outline your paper&lt;/span&gt;&lt;/h3&gt;&lt;p style=&quot;text-align: left;&quot;&gt;Dedicate enough time to outline your paper properly and make sure you included all vital sections in its structure. The number of sections would depend on the type of assignment. For example, for a standard 5-paragraph essay, you would require an introduction, the main body, and a conclusion. Each section must be added by description and quotations. The detailed outline would result in the first draft of your paper on cybersecurity and save your time.&lt;/p&gt;&lt;h3 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Format your paper&lt;/span&gt;&lt;/h3&gt;&lt;p style=&quot;text-align: left;&quot;&gt;Depending on the type of paper, you would require applying the correct formatting style and make your work correctly arranged. Usually, the requirements on formatting are in the manuals from the teacher. There are three main types of formatting for college papers: APA, MLA, and Chicago/Turabian. Each of these formatting styles has its peculiarities and elements to consider.&lt;/p&gt;&lt;h3 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Edit properly&lt;/span&gt;&lt;/h3&gt;&lt;p style=&quot;text-align: left;&quot;&gt;When your paper on cybersecurity is ready, you need to proofread it. Check the relevance of dates, numbers, and facts to make sure you used reliable sources. Proceed with checking on grammar, spelling, style, and punctuation, reduce repeated words and mistypes. For professional proofreading, you can involve some online tools that help effectively check words and sentences in the process. For example, &lt;a href=&quot;https://app.grammarly.com/&quot; target=&quot;_blank&quot;&gt;you might use Grammarly&lt;/a&gt; or other similar tools.&lt;/p&gt;&lt;h3 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Wrap up&lt;/span&gt;&lt;/h3&gt;&lt;p&gt;Now you know how to cope with a paper on a cybersecurity topic. The main pieces of advice are choosing the correct topic and reading instructions from your professor correctly. Do not forget to collect enough relevant materials if you are about to write a meaningful paper. Outlining is a key to success if you want to save your precious time and make the paper structures, correct formatting would bring you high grades. The editing stage is vital and allows polishing your paper effectively.&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='https://www.kalilinux.in/feeds/8122853014414783854/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.kalilinux.in/2021/09/how-students-can-cope-with-paper-on.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/8122853014414783854'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/8122853014414783854'/><link rel='alternate' type='text/html' href='https://www.kalilinux.in/2021/09/how-students-can-cope-with-paper-on.html' title='How students can cope with paper on a cybersecurity topic'/><author><name>Kali Linux</name><uri>http://www.blogger.com/profile/07345541575706459646</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//3.bp.blogspot.com/-Mb3EvSYi1Yg/YOL_LNs2xhI/AAAAAAAAFk4/aghHydKfmagtjPYLvn-SVVNEIJW10TdLACK4BGAYYCw/s113/kali%2Bdragon.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-mbUErf1kKIY/YTlcJDt5S1I/AAAAAAAAF4I/x8F_61AGo-Qm7ep2lNHMG1a1K5jb6OMEACLcBGAsYHQ/s72-w320-h213-c/thumbnail.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6091241131056531264.post-501562291209321274</id><published>2021-09-05T16:00:00.004+05:30</published><updated>2021-09-06T18:25:43.454+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Configure"/><title type='text'>How To Secure Our Kali Linux System To Ensure Our Protection</title><content type='html'>&lt;p&gt;Kali Linux is an open-source Debian based Linux distribution which mostly used for offensive security. Previously known as Backtrack Linux this Linux distribution is a symbol of security itself. Kali Linux used by penetration testers around the world. It also used by cybersecurity students to practicing penetration testing and stuff. But to run Kali Linux with the default settings may be a bad idea.&lt;/p&gt;&lt;p&gt;&lt;u&gt;&lt;i&gt;&lt;b&gt;Why?&lt;/b&gt;&lt;/i&gt;&lt;/u&gt; Because default settings are easy to crack and Kali Linux is not a privacy focused distribution (like Tails OS), Kali is created for attacking not for defending. Security is a huge concept. Most people use Kali to test security, but it&#39;s also very important to secure the Kali itself. Because it is based on Debian we got good security. But what if we need more security?&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-9uvWA5GqQmU/YRi1YPu2cZI/AAAAAAAAFyo/WWhFbm7LqRkZR47RbdLoJt8Ov7Ce3FrYwCLcBGAsYHQ/s1000/Keep%2Bsafe%2BKali%2BLinux%2BSystem%2BThumbnail.webp&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;How To Secure Our Kali Linux System&quot; border=&quot;0&quot; data-original-height=&quot;606&quot; data-original-width=&quot;1000&quot; height=&quot;194&quot; src=&quot;https://1.bp.blogspot.com/-9uvWA5GqQmU/YRi1YPu2cZI/AAAAAAAAFyo/WWhFbm7LqRkZR47RbdLoJt8Ov7Ce3FrYwCLcBGAsYHQ/w320-h194/Keep%2Bsafe%2BKali%2BLinux%2BSystem%2BThumbnail.webp&quot; title=&quot;How To Secure Our Kali Linux System&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;In this article we are going to discuss how we can &lt;u&gt;&lt;i&gt;&lt;b&gt;improve the security of our Kali Linux system&lt;/b&gt;&lt;/i&gt;&lt;/u&gt;. Running Kali Linux with the default settings is not be a good idea.&lt;p&gt;&lt;/p&gt;&lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Change the Default Password&lt;/span&gt;&lt;/h1&gt;&lt;p&gt;If we are using older Kali Linux versions (older then 2020.1) then our default credential is &quot;&lt;u&gt;root&lt;/u&gt;&quot; &quot;&lt;u&gt;toor&lt;/u&gt;&quot;. If we have newer Kali Linux versions then the default credential is &quot;&lt;u&gt;Kali&lt;/u&gt;&quot; &quot;&lt;u&gt;Kali&lt;/u&gt;&quot;. We need to change it ASAP. It&#39;s easy. We need to run following command on our Kali Linux terminal:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code class=&quot;ns&quot; style=&quot;outline: currentcolor none 0px; transition: all 0.3s ease 0s;&quot;&gt;passwd&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;This simple command will ask us the current user&#39;s password (default if we don&#39;t change it already). Then it will prompt for a new password and again it will verify it. A good password should contain both uppercase and lowercase letters with scrambles of symbols and numbers. After verifying the password our password will be changed. We can see it on the following screenshot:&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-74jpnp_s-T4/YRUY3MLS4xI/AAAAAAAAFyA/YOlYyISH3H87Gcyhq_FEy-sHt-d9greNACLcBGAsYHQ/s350/password%2Bchange%2Bin%2BKali.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;password change in Kali&quot; border=&quot;0&quot; data-original-height=&quot;108&quot; data-original-width=&quot;350&quot; height=&quot;124&quot; src=&quot;https://1.bp.blogspot.com/-74jpnp_s-T4/YRUY3MLS4xI/AAAAAAAAFyA/YOlYyISH3H87Gcyhq_FEy-sHt-d9greNACLcBGAsYHQ/w400-h124/password%2Bchange%2Bin%2BKali.png&quot; title=&quot;password change in Kali&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;We need to remember that our typed password will not displayed for security reasons.&lt;/p&gt;&lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Unprivileged User Account&lt;/span&gt;&lt;/h1&gt;&lt;p&gt;Previously root user was Kali&#39;s default user. Now things are changed after Kali Linux 2020.1 update. Now Kali&#39;s default user is non-root user account.&lt;/p&gt;&lt;p&gt;An unprivileged user stands directly below the main admin user which have all the root permissions. Similarly to family and parental accounts.&lt;/p&gt;&lt;p&gt;We can even use a root user directly on our system, but it will not good for security reasons. We must not use root user always.&lt;/p&gt;&lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Updating Kali Linux Frequently&lt;/span&gt;&lt;/h1&gt;&lt;p&gt;There are lots of versions of Kali Linux. Kali Developers releases a new version in every quarter. Updated versions of Kali comes with upgraded kernels. For being a rolling distro Kali Linux doesn&#39;t need to be download ISO image and again install it during update. We just need to apply some commands to install the update. Follow us to get notified when the update comes.&lt;/p&gt;&lt;p&gt;Also we must update and upgrade our Kali Linux after some days by using following command:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code class=&quot;ns&quot; style=&quot;outline: currentcolor none 0px; transition: all 0.3s ease 0s;&quot;&gt;sudo apt update -y &amp;amp;&amp;amp; sudo apt upgrade -y&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;The conclusion is we need to update &amp;amp; upgrade Kali Linux frequently and update the distribution whenever it release.&lt;/p&gt;&lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Changing the Default SSH Keys&lt;/span&gt;&lt;/h1&gt;&lt;p&gt;Secure Shell or SSH is a network protocol. It uses to communicate computers securely. As we&#39;re on this page via web, we are already using some kind of SSH. There are no way around it but to fix present or upcoming security issues. Even for distros we use, there are SSH keys that let us verify authentic files from a source.&lt;/p&gt;&lt;p&gt;It may looks everything is fine and cool but the problem is for everyone there are the same keys. Let&#39;s understand it on this way. If we download a software from a website, it is the same distribution copy that everyone downloads it. Later we use our accounts with the software for a personalized way, and the service provider gives adequate power according to the subscription under those accounts. SSH keys have quite same fundamentals but those are used to verify files.&lt;/p&gt;&lt;p&gt;If a bad guy did a Man-in-the-middle (MITM) attack or a social engineering campaign it may drain our security.&lt;/p&gt;&lt;p&gt;SSH gives us capability to authenticate without inputting passwords every single time. There are two types of SSH keys. One is public and the other one is private. We need to change the our public SSH keys, because every distro have the same, and generate a private key will make sure only authenticated users can access it.&lt;/p&gt;&lt;p&gt;SSH keys are located in /etc/ssh directory by default. This list view will shows all the keys inside. Instead of deleting them from the database, we are going to store them some secure place. We use following commands to do this:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code class=&quot;ns&quot; style=&quot;outline: currentcolor none 0px; transition: all 0.3s ease 0s;&quot;&gt;cd /etc/ssh&lt;/code&gt;&lt;/pre&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code class=&quot;ns&quot; style=&quot;outline: currentcolor none 0px; transition: all 0.3s ease 0s;&quot;&gt;sudo mkdir old_keys&lt;/code&gt;&lt;/pre&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code class=&quot;ns&quot; style=&quot;outline: currentcolor none 0px; transition: all 0.3s ease 0s;&quot;&gt;sudo mv ssh_host_* old_keys&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;Now our all old SSH keys moved to a directory named old_keys.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-9Dw6S6rZN6U/YRYHVhXp62I/AAAAAAAAFyI/uXYT9mexco8aM3jkEA-sdBfl8JmD79KqQCLcBGAsYHQ/s606/backup%2Bof%2B%2Bssh%2Bkeys.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;backup of ssh keys on old_keys directory&quot; border=&quot;0&quot; data-original-height=&quot;251&quot; data-original-width=&quot;606&quot; height=&quot;166&quot; src=&quot;https://1.bp.blogspot.com/-9Dw6S6rZN6U/YRYHVhXp62I/AAAAAAAAFyI/uXYT9mexco8aM3jkEA-sdBfl8JmD79KqQCLcBGAsYHQ/w400-h166/backup%2Bof%2B%2Bssh%2Bkeys.png&quot; title=&quot;backup of ssh keys on old_keys directory&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&amp;nbsp;Now we generate new keys by using following command:&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code class=&quot;ns&quot; style=&quot;outline: currentcolor none 0px; transition: all 0.3s ease 0s;&quot;&gt;sudo dpkg-reconfigure openssh-server&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;This command will generate new SSH keys for us. As we can see in the following screenshot.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-Ce50UkNZAU0/YRYIGEUzKhI/AAAAAAAAFyQ/Ef1cxByyNa4fv-rL_tAmq1KSWJwBtjC-QCLcBGAsYHQ/s607/new%2Bssh%2Bkeys%2Bgenerated.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;New SSH keys are generated&quot; border=&quot;0&quot; data-original-height=&quot;306&quot; data-original-width=&quot;607&quot; height=&quot;201&quot; src=&quot;https://1.bp.blogspot.com/-Ce50UkNZAU0/YRYIGEUzKhI/AAAAAAAAFyQ/Ef1cxByyNa4fv-rL_tAmq1KSWJwBtjC-QCLcBGAsYHQ/w400-h201/new%2Bssh%2Bkeys%2Bgenerated.png&quot; title=&quot;New SSH keys are generated&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;If we faced any problem then we can use our backed up SSH keys.&lt;/p&gt;&lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Save our Identity&lt;/span&gt;&lt;/h1&gt;&lt;p&gt;During surfing the internet with a Kali Linux machine, we can use the &quot;&lt;a href=&quot;https://www.kalilinux.in/2020/11/nipe-fully-anonymize-total-kali-linux.html&quot; target=&quot;_blank&quot;&gt;NIPE&lt;/a&gt;&quot; or &quot;kalitorify&quot; tools to browse safely and anonymously. Even though &quot;&lt;a href=&quot;https://www.kalilinux.in/2019/04/change-mac-address.html&quot; target=&quot;_blank&quot;&gt;macchanger&lt;/a&gt;&quot; is recommended to spoof our Mac address. We also advice to change our hostname from Kali to a nameserver, and add a host similar to 8.8.8.8.&lt;/p&gt;&lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Monitoring Logs&lt;/span&gt;&lt;/h1&gt;&lt;p&gt;Analyzing the logcheck program can be a real life saver. It can send logged messages directly to admin&#39;s email. Log files are locally stored inside &quot;/var/log&quot; by default.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-ra4jOQXpvjs/YRYLo3F7T_I/AAAAAAAAFyY/3j2bUva2MMQB8E-5b2GAjucwuwEZiPLbgCLcBGAsYHQ/s912/logs%2Bin%2BKali%2BLinux.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;logs in Kali Linux&quot; border=&quot;0&quot; data-original-height=&quot;418&quot; data-original-width=&quot;912&quot; height=&quot;184&quot; src=&quot;https://1.bp.blogspot.com/-ra4jOQXpvjs/YRYLo3F7T_I/AAAAAAAAFyY/3j2bUva2MMQB8E-5b2GAjucwuwEZiPLbgCLcBGAsYHQ/w400-h184/logs%2Bin%2BKali%2BLinux.png&quot; title=&quot;logs in Kali Linux&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Using &lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;top&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt; (built right into the system) or &lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;htop&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt; (&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;sudo apt install htop&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;) tool shows us real-time monitoring activity. Even the &lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;xfce4-taskmanager&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt; graphical tool can perform similar actions.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-CMj0NHxB83g/YRYMD_XljmI/AAAAAAAAFyg/_6bCkPN-6ooJJyc-QZneF7eUs72s2Y15QCLcBGAsYHQ/s1036/htop.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;htop on Kali Linux&quot; border=&quot;0&quot; data-original-height=&quot;543&quot; data-original-width=&quot;1036&quot; height=&quot;210&quot; src=&quot;https://1.bp.blogspot.com/-CMj0NHxB83g/YRYMD_XljmI/AAAAAAAAFyg/_6bCkPN-6ooJJyc-QZneF7eUs72s2Y15QCLcBGAsYHQ/w400-h210/htop.png&quot; title=&quot;htop on Kali Linux&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Scanning for Malware and Rootkits&lt;/p&gt;&lt;p&gt;We also need to scan our system frequently for malwares and rootkits. We can run the scan by using &quot;Chkrootkit&quot; or &quot;Rkhunter&quot; tool kits. We have discussed about this topic some days ago in details (&lt;a href=&quot;https://www.kalilinux.in/2021/07/chkrootkit-rkhunter-removes-rootkis-on-linux.html&quot; target=&quot;_blank&quot;&gt;Find &amp;amp; remove rootkits from Linux&lt;/a&gt;). So we don&#39;t think we have to repeat it. These tools are like anti-malwares for Linux systems.&lt;/p&gt;&lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Extra Talks&lt;/span&gt;&lt;/h1&gt;&lt;p&gt;Although Kali Linux is created for attacking purpose it is quite secure environment itself. But advanced users goes above and beyond for daily tasks and it is necessary to follow proper procedures. New users coming from other operating systems like Windows may think just running Kali Linux inside VMWare or VirtualBox is the safest process. It is quite true but certain steps must be taken.&lt;/p&gt;&lt;p&gt;Hope this article helps our fellow Kali Linux users. Love our articles? Make sure to &lt;b&gt;follow us&lt;/b&gt; on &lt;a class=&quot;d-link&quot; href=&quot;https://twitter.com/KaliLinux_in&quot; target=&quot;_blank&quot;&gt;Twitter&lt;/a&gt; and &lt;a class=&quot;d-link&quot; href=&quot;https://github.com/jaykali&quot; target=&quot;_blank&quot;&gt;GitHub&lt;/a&gt;, we post article updates there. To join our &lt;b&gt;KaliLinuxIn&lt;/b&gt; family, join our &lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;a class=&quot;d-link&quot; href=&quot;https://t.me/kalilinuxin&quot; target=&quot;_blank&quot;&gt;Telegram Group&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;. We are trying to build a community for Linux and Cybersecurity. For anything we always happy to help everyone on the &lt;span style=&quot;color: red;&quot;&gt;comment section&lt;/span&gt;. As we know our comment section is always open to everyone. We read each and every comment and &lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;we always reply&lt;/span&gt;&lt;/b&gt;. &lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='https://www.kalilinux.in/feeds/501562291209321274/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.kalilinux.in/2021/08/how-to-secure-our-kali-linux-system.html#comment-form' title='4 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/501562291209321274'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/501562291209321274'/><link rel='alternate' type='text/html' href='https://www.kalilinux.in/2021/08/how-to-secure-our-kali-linux-system.html' title='How To Secure Our Kali Linux System To Ensure Our Protection'/><author><name>Kali Linux</name><uri>http://www.blogger.com/profile/07345541575706459646</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//3.bp.blogspot.com/-Mb3EvSYi1Yg/YOL_LNs2xhI/AAAAAAAAFk4/aghHydKfmagtjPYLvn-SVVNEIJW10TdLACK4BGAYYCw/s113/kali%2Bdragon.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-9uvWA5GqQmU/YRi1YPu2cZI/AAAAAAAAFyo/WWhFbm7LqRkZR47RbdLoJt8Ov7Ce3FrYwCLcBGAsYHQ/s72-w320-h194-c/Keep%2Bsafe%2BKali%2BLinux%2BSystem%2BThumbnail.webp" height="72" width="72"/><thr:total>4</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6091241131056531264.post-9020365297654313204</id><published>2021-09-01T16:00:00.030+05:30</published><updated>2021-09-04T18:21:27.545+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Configure"/><title type='text'>How to change Lock Screen Background on Kali Linux XFCE</title><content type='html'>&lt;p&gt;Linux is powerful and open-source and build for customization. It means we can change everything on Linux as per our need. In this article we are going to &lt;b&gt;change our Kali Linux (XFCE4) lock screen background&lt;/b&gt; and give it a personal touch. This will be very interesting so stay with us to the end.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-61kL6EJiQ4M/YQfuVo8zvDI/AAAAAAAAFxc/y022lTiP8EMy0L2kzp8LQPzbuRUz0g4HQCLcBGAsYHQ/s1000/Kali%2BLock%2Bscreen%2Bbackground%2Bthumbnail.webp&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Change login screen of Kali Linux&quot; border=&quot;0&quot; data-original-height=&quot;505&quot; data-original-width=&quot;1000&quot; height=&quot;162&quot; src=&quot;https://1.bp.blogspot.com/-61kL6EJiQ4M/YQfuVo8zvDI/AAAAAAAAFxc/y022lTiP8EMy0L2kzp8LQPzbuRUz0g4HQCLcBGAsYHQ/w320-h162/Kali%2BLock%2Bscreen%2Bbackground%2Bthumbnail.webp&quot; title=&quot;Customized lock screen backgound on Kali Linux&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;First we need to know what is our display resolution. Various PC have various resolutions. We can easily find ours by navigating in the &lt;b&gt;&lt;i&gt;App Menu &amp;gt; Settings &amp;gt; Display&lt;/i&gt;&lt;/b&gt;.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-lZOPOIzkZT0/YQeHGfkpt6I/AAAAAAAAFwU/w9ujnGJhkggeRgVXn2YW-PSQL1HJIKbiQCLcBGAsYHQ/s1366/Settings%2Bdisplay.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Display Settings on Kali Linux Menu&quot; border=&quot;0&quot; data-original-height=&quot;768&quot; data-original-width=&quot;1366&quot; height=&quot;360&quot; src=&quot;https://1.bp.blogspot.com/-lZOPOIzkZT0/YQeHGfkpt6I/AAAAAAAAFwU/w9ujnGJhkggeRgVXn2YW-PSQL1HJIKbiQCLcBGAsYHQ/w640-h360/Settings%2Bdisplay.png&quot; title=&quot;Display Settings on Kali Linux Menu&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;After opening the display settings we can easily see resolution of our display. As we can see in the following screenshot:&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-ypVFS0hx-GU/YQeHVoUJqOI/AAAAAAAAFwY/fEu4WWbuhuAMRmeUmOPHK6ObeEZCDpnlgCLcBGAsYHQ/s703/display%2Bsettings.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Display resolution on settings&quot; border=&quot;0&quot; data-original-height=&quot;461&quot; data-original-width=&quot;703&quot; height=&quot;420&quot; src=&quot;https://1.bp.blogspot.com/-ypVFS0hx-GU/YQeHVoUJqOI/AAAAAAAAFwY/fEu4WWbuhuAMRmeUmOPHK6ObeEZCDpnlgCLcBGAsYHQ/w640-h420/display%2Bsettings.png&quot; title=&quot;Display resolution on settings&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;We can see that our display resolution is 1366x768 pixels. So our background screen also need to be in the same resolution.&lt;br /&gt;&lt;/p&gt;&lt;p&gt;Here we need to create an image with 1366x768 size. Or We can find it on Google, or other websites.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-pbcuQpGrIdU/YQeKAKymuHI/AAAAAAAAFwk/38Co1tpdNog0k5NnBxh-TVbjV13U084mgCLcBGAsYHQ/s1286/google%2B1366x768.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;1366x768 images on Google&quot; border=&quot;0&quot; data-original-height=&quot;618&quot; data-original-width=&quot;1286&quot; height=&quot;308&quot; src=&quot;https://1.bp.blogspot.com/-pbcuQpGrIdU/YQeKAKymuHI/AAAAAAAAFwk/38Co1tpdNog0k5NnBxh-TVbjV13U084mgCLcBGAsYHQ/w640-h308/google%2B1366x768.png&quot; title=&quot;1366x768 images on Google&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;We can choose one from them as our lock screen background. We always check the property of image by right clicking on it and check it&#39;s resolution.&lt;br /&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-3NYzYbRrwck/YQeLA9tlIjI/AAAAAAAAFws/QnYDVq8dX6oPPOCY23DjZ1jBQoHn4LIzQCLcBGAsYHQ/s525/image%2Bproperties.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;image properties&quot; border=&quot;0&quot; data-original-height=&quot;261&quot; data-original-width=&quot;525&quot; height=&quot;199&quot; src=&quot;https://1.bp.blogspot.com/-3NYzYbRrwck/YQeLA9tlIjI/AAAAAAAAFws/QnYDVq8dX6oPPOCY23DjZ1jBQoHn4LIzQCLcBGAsYHQ/w400-h199/image%2Bproperties.png&quot; title=&quot;image properties&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;For making it more attractive and personalized we added a text on the image by using GIMP image editor (Photoshop alternative for Linux, &lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;sudo apt install gimp&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;), Shown in the following screenshot:&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-zBK25sQySWQ/YQeMtvxOl6I/AAAAAAAAFw0/sLTGNZQgiUUFBmymskJXE6uh34xb2UbjwCLcBGAsYHQ/s924/customized%2Bimage%2Bfor%2Block%2Bscreen%2Bbackground.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;customized image for lock screen background&quot; border=&quot;0&quot; data-original-height=&quot;578&quot; data-original-width=&quot;924&quot; height=&quot;400&quot; src=&quot;https://1.bp.blogspot.com/-zBK25sQySWQ/YQeMtvxOl6I/AAAAAAAAFw0/sLTGNZQgiUUFBmymskJXE6uh34xb2UbjwCLcBGAsYHQ/w640-h400/customized%2Bimage%2Bfor%2Block%2Bscreen%2Bbackground.png&quot; title=&quot;customized image for lock screen background&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;All set now we need to set this 1366x768 image as our Kali Linux background. Here we need to know the location of this image, means the full path of the image. We can see it on image properties again.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-GUnCgafFrlY/YQeORa4lxhI/AAAAAAAAFxE/JT5uJsaOPDUBltzoxgwH16LO5fnl4ojggCLcBGAsYHQ/s630/image%2Bpath.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;path of the image&quot; border=&quot;0&quot; data-original-height=&quot;416&quot; data-original-width=&quot;630&quot; height=&quot;264&quot; src=&quot;https://1.bp.blogspot.com/-GUnCgafFrlY/YQeORa4lxhI/AAAAAAAAFxE/JT5uJsaOPDUBltzoxgwH16LO5fnl4ojggCLcBGAsYHQ/w400-h264/image%2Bpath.png&quot; title=&quot;path of the image&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;We can see the location of the image is &lt;u&gt;&lt;i&gt;/home/kali/Desktop&lt;/i&gt;&lt;/u&gt; (We stored it on Desktop for example we can choose any location to save it). So the images full path will be &lt;u&gt;&lt;i&gt;/home/kali/Desktop/custom-bg.jpg&lt;/i&gt;&lt;/u&gt; . Now we need to open our terminal window and type following command to save our previous background image in a different name:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code class=&quot;ns&quot; style=&quot;outline: currentcolor none 0px; transition: all 0.3s ease 0s;&quot;&gt;sudo mv /usr/share/desktop-base/kali-theme/login/background /usr/share/desktop-base/kali-theme/login/backgroundcopy&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;This command will rename our current lock screen background. Then we can set our customized image as a lock screen image by applying following command:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code class=&quot;ns&quot; style=&quot;outline: currentcolor none 0px; transition: all 0.3s ease 0s;&quot;&gt;sudo ln -s &amp;lt;image_full_path&amp;gt; /usr/share/desktop-base/kali-theme/login/background&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;In our case our &amp;lt;image_full_path&amp;gt; is &lt;u&gt;&lt;i&gt;/home/kali/Desktop/custom-bg.jpg&lt;/i&gt;&lt;/u&gt;, so we use this on our terminal, as we can see in the following screenshot:&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-ULOC6Xxv5FE/YQeQ5_fORwI/AAAAAAAAFxM/dDAVLwiDUcwzY2xtQ-7eUOwU-TH5DXBrACLcBGAsYHQ/s1006/Kali%2BLinux%2BLockscreen%2Bbackground%2Bchanged.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Kali Linux Lockscreen background changed&quot; border=&quot;0&quot; data-original-height=&quot;189&quot; data-original-width=&quot;1006&quot; height=&quot;120&quot; src=&quot;https://1.bp.blogspot.com/-ULOC6Xxv5FE/YQeQ5_fORwI/AAAAAAAAFxM/dDAVLwiDUcwzY2xtQ-7eUOwU-TH5DXBrACLcBGAsYHQ/w640-h120/Kali%2BLinux%2BLockscreen%2Bbackground%2Bchanged.png&quot; title=&quot;Kali Linux Lockscreen background changed&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;span style=&quot;color: #800180;&quot;&gt;&lt;b&gt;That&#39;s it 🌝&lt;/b&gt;&lt;/span&gt;. We had successfully changed our lockscreen image or locj screen background on our Kali Linux system, we can do the same for any XFCE based Linux distro. To see the effect we just need a reboot or log out. In the lock screen we can see our edited and customized login screen image in the background.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-dI0qfI79qoM/YQfpdyGRtpI/AAAAAAAAFxU/iKIUxRkNL0QN3VWjYOYbNI4H6xohV3XZQCLcBGAsYHQ/s1366/kali%2Blogin%2Bscreen.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Kali Linux customized Login Screen&quot; border=&quot;0&quot; data-original-height=&quot;768&quot; data-original-width=&quot;1366&quot; height=&quot;360&quot; src=&quot;https://1.bp.blogspot.com/-dI0qfI79qoM/YQfpdyGRtpI/AAAAAAAAFxU/iKIUxRkNL0QN3VWjYOYbNI4H6xohV3XZQCLcBGAsYHQ/w640-h360/kali%2Blogin%2Bscreen.jpg&quot; title=&quot;Kali Linux customized Login Screen&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Here we got our customized login screen. We can do anything if we have a little image editing knowledge, we just need to keep in mind that our background screen must need to be in our Display Size (1366x768 in our case).&lt;/p&gt;&lt;p&gt;Here if we want then we can change the user image (Kali Linux logo on above screenshot). To do this we need to go to Kali Linux settings.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-Rj2M76pTMEk/YRtJT6bNhEI/AAAAAAAAFzM/yzbryqAGpfwgKuBrMyBHnG65v4iZIQO-ACLcBGAsYHQ/s752/kali%2Blinux%2Bsettings.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Kali Linux settings&quot; border=&quot;0&quot; data-original-height=&quot;499&quot; data-original-width=&quot;752&quot; height=&quot;265&quot; src=&quot;https://1.bp.blogspot.com/-Rj2M76pTMEk/YRtJT6bNhEI/AAAAAAAAFzM/yzbryqAGpfwgKuBrMyBHnG65v4iZIQO-ACLcBGAsYHQ/w400-h265/kali%2Blinux%2Bsettings.png&quot; title=&quot;Kali settings&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Then we need to navigate into LightDM GTK+ Greeter Settings options (marked in above screenshot). Then in the next window we can change our user image, shown in the following screenshot:&lt;/p&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-YLmht5HLISw/YRtKUebZ0fI/AAAAAAAAFzY/E6oI4YLngmQtdiDFvCBDarWvnDY5rm5dQCLcBGAsYHQ/s749/select%2Buser%2Bpic.png&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;Changing User Image&quot; border=&quot;0&quot; data-original-height=&quot;530&quot; data-original-width=&quot;749&quot; height=&quot;283&quot; src=&quot;https://1.bp.blogspot.com/-YLmht5HLISw/YRtKUebZ0fI/AAAAAAAAFzY/E6oI4YLngmQtdiDFvCBDarWvnDY5rm5dQCLcBGAsYHQ/w400-h283/select%2Buser%2Bpic.png&quot; title=&quot;Changing User Image&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;For better results we should use a square PNG image&lt;/span&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;This is how we can change the login screen background on our Kali Linux or any other XFCE based Linux Distro.&lt;/p&gt;&lt;p&gt;&lt;u&gt;&lt;b&gt;This article is written by &lt;a href=&quot;https://www.koushikpal.com&quot; target=&quot;_blank&quot;&gt;Koushik Pal&lt;/a&gt;.&lt;/b&gt;&lt;/u&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Love our articles?&lt;/b&gt; Make sure to &lt;span style=&quot;color: #ff00fe;&quot;&gt;&lt;b&gt;follow us&lt;/b&gt; on &lt;a class=&quot;d-link&quot; href=&quot;https://twitter.com/KaliLinux_in&quot; target=&quot;_blank&quot;&gt;Twitter&lt;/a&gt; and &lt;a class=&quot;d-link&quot; href=&quot;https://github.com/jaykali&quot; target=&quot;_blank&quot;&gt;GitHub&lt;/a&gt;,&lt;/span&gt; we post article updates there. To join our &lt;b&gt;KaliLinuxIn&lt;/b&gt; family, join our &lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;a class=&quot;d-link&quot; href=&quot;https://t.me/kalilinuxin&quot; target=&quot;_blank&quot;&gt;Telegram Group&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;. We are trying to build a community for Linux and Cybersecurity. For anything we always happy to help everyone on the &lt;span style=&quot;color: red;&quot;&gt;comment section&lt;/span&gt;. As we know our comment section is always open to everyone. We read each and every comment and &lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;we always reply&lt;/span&gt;&lt;/b&gt;.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='https://www.kalilinux.in/feeds/9020365297654313204/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.kalilinux.in/2021/08/chnage-login-background-Kali-Linux-XFCE.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/9020365297654313204'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/9020365297654313204'/><link rel='alternate' type='text/html' href='https://www.kalilinux.in/2021/08/chnage-login-background-Kali-Linux-XFCE.html' title='How to change Lock Screen Background on Kali Linux XFCE'/><author><name>Kali Linux</name><uri>http://www.blogger.com/profile/07345541575706459646</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//3.bp.blogspot.com/-Mb3EvSYi1Yg/YOL_LNs2xhI/AAAAAAAAFk4/aghHydKfmagtjPYLvn-SVVNEIJW10TdLACK4BGAYYCw/s113/kali%2Bdragon.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-61kL6EJiQ4M/YQfuVo8zvDI/AAAAAAAAFxc/y022lTiP8EMy0L2kzp8LQPzbuRUz0g4HQCLcBGAsYHQ/s72-w320-h162-c/Kali%2BLock%2Bscreen%2Bbackground%2Bthumbnail.webp" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6091241131056531264.post-1826427852471393413</id><published>2021-08-29T12:54:00.000+05:30</published><updated>2021-08-29T12:54:12.432+05:30</updated><title type='text'>The Most Used Online Video Chat Applications In 2021?</title><content type='html'>&lt;p&gt; &lt;/p&gt;&lt;p style=&quot;margin-bottom: 0.14in;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-kcDsnSyF-l4/YSs1nHBS2bI/AAAAAAAAF1Y/9fYFXkTJK-E2Ywlr3B_TvaSBaErnjqwiwCLcBGAsYHQ/s1236/online-talk.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;The Most Used Online Video Chat Applications In 2021&quot; border=&quot;0&quot; data-original-height=&quot;1000&quot; data-original-width=&quot;1236&quot; height=&quot;162&quot; src=&quot;https://1.bp.blogspot.com/-kcDsnSyF-l4/YSs1nHBS2bI/AAAAAAAAF1Y/9fYFXkTJK-E2Ywlr3B_TvaSBaErnjqwiwCLcBGAsYHQ/w200-h162/online-talk.jpg&quot; title=&quot;The Most Used Online Video Chat Applications In 2021&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Online video chat with random is one of the trading topics in recent years. Platforms like Omegle, YouNow, Ome tv, etc. are some of the most famous and first preferences of the users. The popularity of these platforms has been at another level since 2020 after the covid-19 pandemic hit the world. Millions of new users were registered by platforms. And these haven&#39;t been stopped even after the pandemic is nearly over. So many platforms like Omegle and YouNow still receiving the same number of new and genuine users. Let&#39;s talk about some of the most used platforms of 2021.&lt;p&gt;&lt;/p&gt;&lt;p style=&quot;margin-bottom: 0.14in;&quot;&gt;&lt;/p&gt;&lt;h2 style=&quot;margin-bottom: 0.14in; text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;1. Omegle&lt;/span&gt;&lt;/h2&gt;&lt;p style=&quot;margin-bottom: 0.14in;&quot;&gt;&lt;a href=&quot;https://omegle.site/&quot; rel=&quot;sponsored&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;u&gt;Omegle website&lt;/u&gt;&lt;/span&gt;&lt;/a&gt; is considered one of the most popular and best platforms in the online random video chat market. Since its launch in 2009, it has been ruling the internet. In recent years especially during the pandemic in 2020, it has been successfully held its number 1 position in terms of the number of users. &lt;/p&gt;&lt;p style=&quot;margin-bottom: 0.14in;&quot;&gt;It has an average of 55M monthly users of which 31% alone are from the united states while 6%,4%,3% are from India, Brazil, United Kingdom respectively. Omegle also has many competitors like Ome tv, Chatroulette, etc. still it has been successfully held its position. King of Online random video chat platforms for a reason. &lt;/p&gt;&lt;h2 style=&quot;margin-bottom: 0.14in; text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;2. YouNow&lt;/span&gt;&lt;/h2&gt;&lt;p style=&quot;margin-bottom: 0.14in;&quot;&gt;&lt;a name=&quot;_GoBack&quot;&gt;&lt;/a&gt;YouNow is more of broadcasting and live-streaming platform and less of an &lt;a href=&quot;https://omegle.site/online/&quot; rel=&quot;sponsored&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;u&gt;online talk&lt;/u&gt;&lt;/span&gt;&lt;/a&gt; platform. The platform has been mostly used for content creators and the best one for talented people who want to show their talent to the world. Basically, you have to create your account and start live-streaming and broadcasting. it also allows following your favorite streamer and allows you to comment to and like. Omegle and YouNow have not similarities but it defiantly challenging everyone in the market. &lt;/p&gt;&lt;p style=&quot;margin-bottom: 0.14in;&quot;&gt;The platform also provides an in-purchase facility by which can improve your profile do so many things. So many other platforms like Facebook, Instagram, etc. are available and also provide a wide range of users to attract but it is specially made for live-streaming and broadcasting which is why is so famous. So many people thought that YouNow is dead but it&#39;s totally wrong. It still has over 2M monthly users.&lt;/p&gt;&lt;h2 style=&quot;margin-bottom: 0.14in; text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;3. Tinychat&lt;/span&gt;&lt;/h2&gt;&lt;p style=&quot;margin-bottom: 0.14in;&quot;&gt;Tinychat known as the king of chat rooms platforms. As per stats, the platform has 200M live air minutes every week and it has over 1.3M active users every month. You can either join an ongoing chatroom or can create one. The best thing about this platform is it provides different types of chatrooms. There is a chatroom categories option on the platform. it allows you to create a maximum of 12 chatrooms at the same time. It considers among the biggest competitor of Omegle.&lt;/p&gt;&lt;h2 style=&quot;margin-bottom: 0.14in; text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;4. Emerald chat&lt;/span&gt;&lt;/h2&gt;&lt;p style=&quot;margin-bottom: 0.14in;&quot;&gt;Emerald chat is another fastest-growing online video chat platform of 2021. It has some new and unique features which are admired by many of its users. It’s the perfect combination of online video chat and social media platforms. You can chat with your friends and with random people from all around the world. &lt;/p&gt;&lt;p style=&quot;margin-bottom: 0.14in;&quot;&gt;You can add people to your friend list and can chat with them anytime. Also, providers of Emerald chat claim that the platform is totally bot-free so you will not find any malicious users on the platform. Some people also refer to it as an advanced version of Omegle. It has monthly 700k active users and continuously growing.&lt;/p&gt; &lt;p&gt;&lt;style type=&quot;text/css&quot;&gt;p { margin-bottom: 0.1in; direction: ltr; line-height: 115%; text-align: left; orphans: 2; widows: 2; background: transparent }a:link { color: #0000ff; text-decoration: underline }&lt;/style&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='https://www.kalilinux.in/feeds/1826427852471393413/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.kalilinux.in/2021/08/the-most-used-online-video-chat-applications-in-2021.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/1826427852471393413'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/1826427852471393413'/><link rel='alternate' type='text/html' href='https://www.kalilinux.in/2021/08/the-most-used-online-video-chat-applications-in-2021.html' title='The Most Used Online Video Chat Applications In 2021?'/><author><name>Kali Linux</name><uri>http://www.blogger.com/profile/07345541575706459646</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//3.bp.blogspot.com/-Mb3EvSYi1Yg/YOL_LNs2xhI/AAAAAAAAFk4/aghHydKfmagtjPYLvn-SVVNEIJW10TdLACK4BGAYYCw/s113/kali%2Bdragon.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-kcDsnSyF-l4/YSs1nHBS2bI/AAAAAAAAF1Y/9fYFXkTJK-E2Ywlr3B_TvaSBaErnjqwiwCLcBGAsYHQ/s72-w200-h162-c/online-talk.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6091241131056531264.post-2109709720913509084</id><published>2021-08-28T16:00:00.005+05:30</published><updated>2021-08-28T16:00:00.139+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Forensic"/><title type='text'>Searching for Rootkits on Kali Linux using Chrootkit &amp; Rkhunter</title><content type='html'>&lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;What is Rootkit ?&lt;/span&gt;&lt;/h1&gt;&lt;p&gt;Rootkit is a malicious software that allows an unauthorized user (read attacker) to get access to a system and to its restricted software. Basically, rootkits are a type of malware that designed to be hidden on our computer. We didn&#39;t notice it, but it will be active. Rootkits give the ability to remotely control our computer to cyber criminals.&lt;/p&gt;&lt;p&gt;Rootkits may contain a number of tools, malicious programs that allow attackers to steal our passwords to modules that make it easy for them to get our credit card information or online banking information or even our secretly stored data. It also contain keyloggers, credential stealers etc.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-EToEB39Bb3c/YQT_gCehkqI/AAAAAAAAFwE/fTsmTVff08QwNlyrfmZe_Ysxq2L14oCggCLcBGAsYHQ/s500/rootkits%2Bon%2BKali%2BLinux.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;remove rootkits using rkhunter and chkrootkit on Kali Linux&quot; border=&quot;0&quot; data-original-height=&quot;303&quot; data-original-width=&quot;500&quot; height=&quot;194&quot; src=&quot;https://1.bp.blogspot.com/-EToEB39Bb3c/YQT_gCehkqI/AAAAAAAAFwE/fTsmTVff08QwNlyrfmZe_Ysxq2L14oCggCLcBGAsYHQ/w320-h194/rootkits%2Bon%2BKali%2BLinux.png&quot; title=&quot;remove rootkits using rkhunter and chkrootkit on Kali Linux&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&quot;Rootkit&quot; is combined from of two words - &quot;root&quot; and &quot;kit&quot;. Here &quot;root&quot; refers to the administrative account with full privileges on the computer system and &quot;kit&quot; refers to the program/code that allows the attacker to obtain unauthorized access.&lt;/p&gt;&lt;p&gt;In our Kali Linux, we can install various open-source tools to avert our systems from rootkits. Here we talk about two most famous open-source software &quot;chkrootkit&quot; and &quot;rkhunter&quot;. We can install them our our Kali Linux or any other Linux distro and checks for rootkits on our computer (If we are working on Virtual environment on Linux then it only can detect rootkits only in the virtual system).&lt;/p&gt;&lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Chkrootkit&lt;/span&gt;&lt;/h1&gt;&lt;p&gt;Chkrootkit can be run on Linux systems to determine if rootkits exist on the system, based on signatures and processes. Think of it as antivirus or anti-malware for Linux systems.&lt;/p&gt;&lt;p&gt;Chkrootkit is a simple program that can ensure our Kali Linux has not been infected. We can also run chkrootkit on other Linux distributions by installing it on those systems, it usually comes with almost every Linux distributions including Kali Linux. On our Kali Linux system we need to run following command to start the chkrootkit and scan for rootkits.&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code class=&quot;ns&quot; style=&quot;outline: currentcolor none 0px; transition: all 0.3s ease 0s;&quot;&gt;sudo chkrootkit&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;It will prompt for our sudo password then will start scan on our system, as we can see in the following screenshot:&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-JgukMyYyfto/YQOaYLYD3fI/AAAAAAAAFvU/b3Jlwp2ZEzU1xWX_pGS4_liB-Nh3e14qgCLcBGAsYHQ/s1366/chkrootkit.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;chkrootkit&quot; border=&quot;0&quot; data-original-height=&quot;768&quot; data-original-width=&quot;1366&quot; height=&quot;360&quot; src=&quot;https://1.bp.blogspot.com/-JgukMyYyfto/YQOaYLYD3fI/AAAAAAAAFvU/b3Jlwp2ZEzU1xWX_pGS4_liB-Nh3e14qgCLcBGAsYHQ/w640-h360/chkrootkit.png&quot; title=&quot;chkrootkit&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;We can see it scans permissions of programs (most specifically third party programs), and we can see the infection status on the left table.&lt;/p&gt;&lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Rkhunter (Rootkit Hunter)&lt;/span&gt;&lt;br /&gt;&lt;/h1&gt;&lt;p class=&quot;hj hk fo hl b hm hn ho hp hq hr hs ht hu hv hw hx hy hz ia ib ic id ie if ig dn gk&quot; data-selectable-paragraph=&quot;&quot; id=&quot;59f9&quot;&gt;Rkhunter (Rootkit Hunter) is a Linux/Unix based tool to scan possible rootkits, backdoors and local exploits.&lt;/p&gt;&lt;p class=&quot;hj hk fo hl b hm hn ho hp hq hr hs ht hu hv hw hx hy hz ia ib ic id ie if ig dn gk&quot; data-selectable-paragraph=&quot;&quot; id=&quot;e00e&quot;&gt;It does this by comparing SHA-1 hashes of important files with known good ones in online databases, searching for default directories (of rootkits), wrong permissions, hidden files, suspicious strings in kernel modules, and special tests for Linux. (&lt;a class=&quot;dt kz&quot; href=&quot;https://en.wikipedia.org/wiki/Rkhunter&quot; rel=&quot;noopener nofollow&quot;&gt;Wikipedia)&lt;/a&gt;.&lt;/p&gt;&lt;p class=&quot;hj hk fo hl b hm hn ho hp hq hr hs ht hu hv hw hx hy hz ia ib ic id ie if ig dn gk&quot; data-selectable-paragraph=&quot;&quot; id=&quot;e00e&quot;&gt;According to our team members &quot;rkhunter&quot; is the best open-source rootkit checker for Linux, because of it&#39;s additional functionality and also the other tools like chkrootkit is an old tool so there are many known exploits for that.&lt;/p&gt;&lt;p class=&quot;hj hk fo hl b hm hn ho hp hq hr hs ht hu hv hw hx hy hz ia ib ic id ie if ig dn gk&quot; data-selectable-paragraph=&quot;&quot; id=&quot;e00e&quot;&gt;It doesn&#39;t comes pre-installed with Kali Linux but we can install it by applying simple following command:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code class=&quot;ns&quot; style=&quot;outline: currentcolor none 0px; transition: all 0.3s ease 0s;&quot;&gt;sudo apt install &lt;/code&gt;rkhunter -y&lt;/pre&gt;&lt;p&gt;The following screenshot shows the output of the above command;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-cjvJ5GWD6kw/YQT1rslKVmI/AAAAAAAAFvc/i6RYbIxXtBEXb1wY8bTU2dKpumjHBD5fACLcBGAsYHQ/s1047/installing%2Brkhunter.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;installing rkhunter on kali linux&quot; border=&quot;0&quot; data-original-height=&quot;608&quot; data-original-width=&quot;1047&quot; height=&quot;372&quot; src=&quot;https://1.bp.blogspot.com/-cjvJ5GWD6kw/YQT1rslKVmI/AAAAAAAAFvc/i6RYbIxXtBEXb1wY8bTU2dKpumjHBD5fACLcBGAsYHQ/w640-h372/installing%2Brkhunter.png&quot; title=&quot;installing rkhunter on kali linux&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;After the installation process is complete we can run it to scan our entire system by using following command:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code class=&quot;ns&quot; style=&quot;outline: currentcolor none 0px; transition: all 0.3s ease 0s;&quot;&gt;sudo rkhunter -c&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;After this it will scan our entire system in some categories, like various malware scan, known rootkit scan, suspicious port scans etc. Also, it will go through all the system files as well as third party programs in order to look for the rootkits, we can see following screenshot:&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-vgSTmT1KYzY/YQT3jVS4U6I/AAAAAAAAFvk/MxjhP4ER68M1DeNd6EMgRg2vbxOd0VXQACLcBGAsYHQ/s876/rkhunter%2Bscan%2Bon%2BKali%2BLinux.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;rkhunter scan on Kali Linux&quot; border=&quot;0&quot; data-original-height=&quot;608&quot; data-original-width=&quot;876&quot; height=&quot;444&quot; src=&quot;https://1.bp.blogspot.com/-vgSTmT1KYzY/YQT3jVS4U6I/AAAAAAAAFvk/MxjhP4ER68M1DeNd6EMgRg2vbxOd0VXQACLcBGAsYHQ/w640-h444/rkhunter%2Bscan%2Bon%2BKali%2BLinux.png&quot; title=&quot;rkhunter scan on Kali Linux&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;We need to type &quot;Enter&quot;⤶ to scan next category. It will also summarize the report at the end of scanning. Also saves the output log file in &lt;i&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;/var/log/rkhunter.log&lt;/span&gt;&lt;/i&gt;.&lt;/p&gt;&lt;p&gt;We can see the log file by entering following command:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code class=&quot;ns&quot; style=&quot;outline: currentcolor none 0px; transition: all 0.3s ease 0s;&quot;&gt;sudo mousepad /var/log/rkhunter.log&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;In the following screenshot we can see the log file on mousepad text editor (we can use cat, nano, vim also to view/edit this file).&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-O3DSNd2ss9g/YQT5K_UqjsI/AAAAAAAAFvs/kJIHn76O2-whltjXK9tX22cBV64H1Ty-ACLcBGAsYHQ/s1366/rootkit%2Bhunter%2Blog%2Bfile.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;rkhunter log file on Kali Linux&quot; border=&quot;0&quot; data-original-height=&quot;768&quot; data-original-width=&quot;1366&quot; height=&quot;225&quot; src=&quot;https://1.bp.blogspot.com/-O3DSNd2ss9g/YQT5K_UqjsI/AAAAAAAAFvs/kJIHn76O2-whltjXK9tX22cBV64H1Ty-ACLcBGAsYHQ/w400-h225/rootkit%2Bhunter%2Blog%2Bfile.png&quot; title=&quot;rkhunter log file on Kali Linux&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;This is how we can check for rootkits on our Linux system. It is very easier to scan for it.&lt;p&gt;&lt;/p&gt;&lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;How to Remove Rootkits / Security Warings from Linux&lt;/span&gt;&lt;/h1&gt;&lt;p&gt;Well, we know that how we can check for rootkits on our Linux (Kali Linux) system. But what if we got a rootkit inside our system? How we can remove it?&lt;/p&gt;&lt;p&gt;There are different methods to fix different warnings. So it is impossible cover all in one place. Here search engines can easily help us. In the following screenshot we got an warning we had copied the line.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-Uq6W4NC_RO0/YQT7kBW-sVI/AAAAAAAAFv0/I8MABS6M8zkEKn8CcewapW_o6jFcUa81wCLcBGAsYHQ/s756/waring%2Brkhunter.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;warning on rkhunter&quot; border=&quot;0&quot; data-original-height=&quot;356&quot; data-original-width=&quot;756&quot; height=&quot;302&quot; src=&quot;https://1.bp.blogspot.com/-Uq6W4NC_RO0/YQT7kBW-sVI/AAAAAAAAFv0/I8MABS6M8zkEKn8CcewapW_o6jFcUa81wCLcBGAsYHQ/w640-h302/waring%2Brkhunter.png&quot; title=&quot;warning on rkhunter&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;We just select the line and copy it. Then just press it on search engine and search it. In the following screenshot we can see that we need got some articles and forums we got about our warning. This will help us to improve our security on Linux system.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-QqeRPq2r3yc/YQT8e6kVYXI/AAAAAAAAFv8/KKx6DpDxr-wXDNwAxP6dbzbsjwJ-N-BhACLcBGAsYHQ/s1165/rkhunter%2Bwarning%2Bremove.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;rkhunter warning remove&quot; border=&quot;0&quot; data-original-height=&quot;641&quot; data-original-width=&quot;1165&quot; height=&quot;352&quot; src=&quot;https://1.bp.blogspot.com/-QqeRPq2r3yc/YQT8e6kVYXI/AAAAAAAAFv8/KKx6DpDxr-wXDNwAxP6dbzbsjwJ-N-BhACLcBGAsYHQ/w640-h352/rkhunter%2Bwarning%2Bremove.png&quot; title=&quot;rkhunter warning remove&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;That&#39;s it for today. Hope our Linux system will be more stronger now.&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Love our articles?&lt;/b&gt; Make sure to &lt;b&gt;follow us&lt;/b&gt; on &lt;a class=&quot;d-link&quot; href=&quot;https://twitter.com/KaliLinux_in&quot; target=&quot;_blank&quot;&gt;Twitter&lt;/a&gt; and &lt;a class=&quot;d-link&quot; href=&quot;https://github.com/jaykali&quot; target=&quot;_blank&quot;&gt;GitHub&lt;/a&gt;, we post article updates there. To join our &lt;b&gt;KaliLinuxIn&lt;/b&gt; family, join our &lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;a class=&quot;d-link&quot; href=&quot;https://t.me/kalilinuxin&quot; target=&quot;_blank&quot;&gt;Telegram Group&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;. We are trying to build a community for Linux and Cybersecurity. For anything we always happy to help everyone on the &lt;span style=&quot;color: red;&quot;&gt;comment section&lt;/span&gt;. As we know our comment section is always open to everyone. We read each and every comment and &lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;we always reply&lt;/span&gt;&lt;/b&gt;.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='https://www.kalilinux.in/feeds/2109709720913509084/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.kalilinux.in/2021/07/chkrootkit-rkhunter-removes-rootkis-on-linux.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/2109709720913509084'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/2109709720913509084'/><link rel='alternate' type='text/html' href='https://www.kalilinux.in/2021/07/chkrootkit-rkhunter-removes-rootkis-on-linux.html' title='Searching for Rootkits on Kali Linux using Chrootkit &amp; Rkhunter'/><author><name>Kali Linux</name><uri>http://www.blogger.com/profile/07345541575706459646</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//3.bp.blogspot.com/-Mb3EvSYi1Yg/YOL_LNs2xhI/AAAAAAAAFk4/aghHydKfmagtjPYLvn-SVVNEIJW10TdLACK4BGAYYCw/s113/kali%2Bdragon.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-EToEB39Bb3c/YQT_gCehkqI/AAAAAAAAFwE/fTsmTVff08QwNlyrfmZe_Ysxq2L14oCggCLcBGAsYHQ/s72-w320-h194-c/rootkits%2Bon%2BKali%2BLinux.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6091241131056531264.post-2810320520740138982</id><published>2021-08-26T11:38:00.000+05:30</published><updated>2021-08-26T11:38:18.239+05:30</updated><title type='text'>How Do I Sign a PDF in Windows 10 for Free</title><content type='html'>&lt;p&gt;A larger number of businesses approach different software applications that help them replace paperwork with digital documents or PDFs. To make this possible, they generally embrace well-known digital signature software. By doing this, many businesses can group their legal documents, sign records, digital documents, or PDFs on an online platform such as the cloud.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-6DcqfGcynIc/YScuamtA82I/AAAAAAAAFz4/sP7L_Ujvo_gHpEq8qYnzZNgIoQrq8zSlgCLcBGAsYHQ/s1000/how%2Bto%2Bsign%2Bpdf%2Bfile%2Bon%2Bwindows%2B10.webp&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;606&quot; data-original-width=&quot;1000&quot; height=&quot;194&quot; src=&quot;https://1.bp.blogspot.com/-6DcqfGcynIc/YScuamtA82I/AAAAAAAAFz4/sP7L_Ujvo_gHpEq8qYnzZNgIoQrq8zSlgCLcBGAsYHQ/s320/how%2Bto%2Bsign%2Bpdf%2Bfile%2Bon%2Bwindows%2B10.webp&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;You can say that digital signatures are like a text, sound, or a symbol that converts your PDF into a digital format. Moreover, it is the most convenient way to secure your documents legally and cost-effectively. Further in this article, we will introduce you to the best signing tool and ways for how you could sign a PDF in Windows for free.&lt;p&gt;&lt;/p&gt;&lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Introducing the Best Tool to Sign a PDF in Windows 10&lt;/span&gt;&lt;/h1&gt;&lt;p&gt;CocoSign is known as one of the best signature generator tools with incredible features. It helps you batch sign forms and digital signatures and store your data with high-level encryption on the cloud. It also offers 14-days free trial for new users and helps them get along with the best signature tool. Using CocoSign, you can easily sign your PDFs in Windows 10.&lt;/p&gt;&lt;p&gt;This efficient signature tool helps you in running your business by automatizing the critical digital signature workflow. After &lt;a href=&quot;https://cocosign.com/contract-templates/photo-release-form/&quot; target=&quot;_blank&quot;&gt;completing the contract format&lt;/a&gt; and signature fields, CocoSign allows you to sign your PDF files online and convert them into secure digital PDF. You can do this on any computer, mobile phone, Mac, or tablet from anywhere.&lt;/p&gt;&lt;p&gt;CocoSign provides you with the easiest, safest, and quickest way to send, sign and track digital documents. You can also accumulate signatures with the help of the legally binding and secure digital signature software of CocoSign. This tool makes document management easy by providing unlimited cloud storage space and allowance to access your documents anywhere.&lt;/p&gt;&lt;p&gt;CocoSign’s compliance with several industry security standards like PCI DSS, HIPAA, GDPR, etc., assures you that your critical data is in layers of protection. Even when you are going to share, sign or store your documents, you can be sure of their security due to these security measures. These security standards are for all your personal or business information.&lt;/p&gt;&lt;h2 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;What Makes CocoSign the Best Signature Tool in the Market?&lt;/span&gt;&lt;/h2&gt;&lt;p&gt;Several features that CocoSign offers to its employees, customers, and partners from all over the firm make it the best signature tool in the market. Unlike the quality attributes of other signature tools or software, &lt;a href=&quot;https://cocosign.com/&quot; target=&quot;_blank&quot;&gt;CocoSign provides more security&lt;/a&gt; to all kinds of information of their customers.&lt;/p&gt;&lt;p&gt;There are numerous reasons why you have to use CocoSign to secure your data by converting the data into digital documents and PDFs. We have come to know that it is the most convenient way to sign, transfer and secure your data on any device. The other reasons why you need to use CocoSign for automating your complex business workflow are given below:&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;u&gt;&lt;b&gt;Time Stamp&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;A feature like a time-stamp is beneficial when you need to find your important documents by date and time when the files were signed. That is why time-stamp counts as an authentic way to explore your data to get information.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;&lt;u&gt;&lt;b&gt;Easy To Access&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;CocoSign is famous as a platform of the independent digital signature generator. It is the same for all the devices like computer, Mac, laptop or mobile phone that you can access them from every web dashboard or web browser.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;&lt;u&gt;&lt;b&gt;Safe and Secure&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;This signature tool is compliant with HTTPS protocol and PCI DSS certified; that is why it checks all essential security boxes. Your signatures are highly protected and can&#39;t be leaked through any source.&lt;/li&gt;&lt;br /&gt;&lt;li&gt;&lt;u&gt;&lt;b&gt;Maintain Privacy&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;About 180 countries around the whole world are using digital signatures as they are legally valid. Your data is secure on CocoSign servers, and they assure you to protect your privacy by not sharing your data with anyone.&lt;/li&gt;&lt;/ul&gt;&lt;h2 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Steps to Sign PDF on Windows 10 for Free&lt;/span&gt;&lt;/h2&gt;&lt;p&gt;CocoSign is a professional signature tool that is now used by millions of people around the whole world for generating their digital signatures. By doing this, you can also convert your PDF into a digital formatted PDF on Windows 10 for free. For this purpose, you need to follow the steps that are given below so that you can create your digital formatted PDFs.&lt;/p&gt;&lt;p&gt;&lt;u&gt;&lt;b&gt;Step 1: Visit CocoSign Website&lt;/b&gt;&lt;/u&gt;&lt;/p&gt;&lt;p&gt;To create your own digital formatted PDF files, you first need to visit the official website of CocoSign on any mobile, laptop, computer, or Mac device.&lt;/p&gt;&lt;p&gt;&lt;u&gt;&lt;b&gt;Step 2: Select Your PDF File&lt;/b&gt;&lt;/u&gt;&lt;/p&gt;&lt;p&gt;You are now required to select a PDF file from your device, or you could drag the file and drop it into the interface. You can also choose a PDF file from Dropbox, OneDrive, Google Drive, and Box.&lt;/p&gt;&lt;p&gt;&lt;u&gt;&lt;b&gt;Step 3: Sign Your PDF File&lt;/b&gt;&lt;/u&gt;&lt;/p&gt;&lt;p&gt;When you are done with the selection of the PDF file, a new screen will appear. For signing the file, drag the signature option from the panel on the right side and place it to the place where you want to sign. Now choose a sign for yourself and save it on the file.&lt;/p&gt;&lt;p&gt;&lt;u&gt;&lt;b&gt;Step 4: Download your Digital Formatted PDF file&lt;/b&gt;&lt;/u&gt;&lt;/p&gt;&lt;p&gt;Now you can download the file by clicking on the “Download” link from the interface. By doing this, the PDF file with digital signature will download on your device in no time.&lt;/p&gt;&lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Wrapping Up&lt;/span&gt;&lt;/h1&gt;&lt;p&gt;Signing a PDF file with signature tools and making it a digitally formatted PDF file is now applied in every business-related workplace. Converting a simple document into a digital document means it is end-to-end secure as all your stored data is now encrypted on the servers. Unlike CocoSign, other signature tools don&#39;t provide their customers with such security and privacy.&lt;/p&gt;&lt;p&gt;CocoSign is an independent signature tool with incredible features that can secure, track or share your data from anywhere at any time.&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='https://www.kalilinux.in/feeds/2810320520740138982/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.kalilinux.in/2021/08/how-do-i-sign-pdf-in-windows-10-for-free.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/2810320520740138982'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/2810320520740138982'/><link rel='alternate' type='text/html' href='https://www.kalilinux.in/2021/08/how-do-i-sign-pdf-in-windows-10-for-free.html' title='How Do I Sign a PDF in Windows 10 for Free'/><author><name>Kali Linux</name><uri>http://www.blogger.com/profile/07345541575706459646</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//3.bp.blogspot.com/-Mb3EvSYi1Yg/YOL_LNs2xhI/AAAAAAAAFk4/aghHydKfmagtjPYLvn-SVVNEIJW10TdLACK4BGAYYCw/s113/kali%2Bdragon.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-6DcqfGcynIc/YScuamtA82I/AAAAAAAAFz4/sP7L_Ujvo_gHpEq8qYnzZNgIoQrq8zSlgCLcBGAsYHQ/s72-c/how%2Bto%2Bsign%2Bpdf%2Bfile%2Bon%2Bwindows%2B10.webp" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6091241131056531264.post-952645924201247599</id><published>2021-08-26T10:59:00.001+05:30</published><updated>2021-08-26T10:59:35.897+05:30</updated><title type='text'>Signature Generator Reviews: 10+ Free Email Signature Templates You Can Use</title><content type='html'>&lt;p&gt;If you are searching for free email signature templates, the good news is that you don&#39;t need any HTML knowledge. Also, all the templates are dark mode friendly. So, you can efficiently pick any template without fretting about them.&lt;/p&gt;&lt;p&gt;Your email signature is a crucial part of your branding. Therefore, it could be seen by everyone, starting from suppliers to potential customers. While considering this, your email signature must attract the target audience&#39;s eyes.&lt;/p&gt;&lt;p&gt;The article has summed up the top 10+ free &lt;a href=&quot;https://signature-generator.com/email-signature-template/&quot; target=&quot;_blank&quot;&gt;email signature templates&lt;/a&gt; in email signature management if you think about how to do it. Let&#39;s get started.&lt;/p&gt;&lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;10+ Free Email Signature Templates&lt;/span&gt;&lt;/h1&gt;&lt;p&gt;Download these ready-to-use email signature templates of your choice for both private and business purposes. It&#39;s also possible to customize the chosen templates with the help of a built-in &lt;a href=&quot;https://signature-generator.com/&quot; target=&quot;_blank&quot;&gt;signature generator&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/--H_6cXoOFtw/YScmju60tSI/AAAAAAAAFzw/ZuWjxXW0RlkXYL4A9e1TmkK30Hiz9eE-ACLcBGAsYHQ/s548/mail%2Bsignature.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;274&quot; data-original-width=&quot;548&quot; height=&quot;160&quot; src=&quot;https://1.bp.blogspot.com/--H_6cXoOFtw/YScmju60tSI/AAAAAAAAFzw/ZuWjxXW0RlkXYL4A9e1TmkK30Hiz9eE-ACLcBGAsYHQ/s320/mail%2Bsignature.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;The below-mentioned signature template design ideas incorporate both fundamental and advanced projects with logos, graphics, marketing banners, and user photos. Let&#39;s have a look at the top 10+ templates:&lt;p&gt;&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;1. Mobile-friendly Email Signature&lt;/span&gt;&lt;/h3&gt;&lt;p&gt;It&#39;s essential to take a glance at your email signature, which should look incredible on smartphones along with computers. With the advent of using smartphones for emailing instead of PCs, the signature should be mobile-friendly.&lt;/p&gt;&lt;p&gt;Therefore, such an email signature proves that you mustn&#39;t use various vivacious colors or moving images to stand out from the crowd. Moreover, in a mobile-friendly email signature template, you can utilize the space to ask them for feedback.&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;2. Incorporating a Promotional Banner into an Email Signature&lt;/span&gt;&lt;/h3&gt;&lt;p&gt;Do you want to send a promotional email to your customers? The addition of a powerful banner in an email signature will help you do that. If you are well-acquainted with a website banner, you shouldn&#39;t be concerned about an email signature banner.&lt;/p&gt;&lt;p&gt;More precisely, it means a strip of graphical details, which highlights a call-to-action and a top-notch offer. Preparing one is simple and also free of cost with Canva.&lt;/p&gt;&lt;p&gt;On the other hand, all you have to do is implant it into your email signature. Such banners are commonly situated above the disclaimer but underneath the contact details.&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;3. Developing Social Media Interaction through Your Email Signature&lt;/span&gt;&lt;/h3&gt;&lt;p style=&quot;text-align: left;&quot;&gt;Incorporating necessary social media links into the email signatures is undoubtedly a good practice. All you need to ensure that the personal social media must showcase correct content. However, numerous ways are there for using social media icons. All of these are immensely identifiable logos. So, it would be best if you ensure they don&#39;t subdue your own.&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;4. Feedback Requirement in Your Email Signature&lt;/span&gt;&lt;/h3&gt;&lt;p style=&quot;text-align: left;&quot;&gt;Such type of email signature template is useful for innumerable reasons. This is because:&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Due to the addition of scintillating colors, your signature is lauded mostly.&lt;/li&gt;&lt;li&gt;Customers will understand the organization is really inclined to know their experience and, therefore, seeking feedback.&lt;/li&gt;&lt;li&gt;A feedback email thermometer can easily be implanted using a customer thermometer.&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;text-align: left;&quot;&gt;So, you see, no HTML is needed to prepare your email signature template for your business.&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;5. GIF Email Signature&lt;/span&gt;&lt;/h3&gt;&lt;p style=&quot;text-align: left;&quot;&gt;When it comes to an email signature, the predilection for using GIFs has become highly popular nowadays. This is because the GIFs are really captivating and draw people&#39;s attention more quickly.&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;It&#39;s agreeable that nothing could be more enchanting than seeing a moving picture. Therefore, it&#39;s hassle-free to make your own GIFs utilizing a service like GIPHY. After that, you can gradually incorporate it into your email signature utilizing a robust HTML editor.&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;6. Legal Email Signature Template&lt;/span&gt;&lt;/h3&gt;&lt;p style=&quot;text-align: left;&quot;&gt;An email disclaimer is incorporated into emails for controlling liability. It is usually placed isolated from the email signature and body text. Countless examples are there for legal disclaimers. Also, there will be so many factors, which would dictate the length of your legal disclaimer.&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;7. Providing More HTML Images in an Email Signature&lt;/span&gt;&lt;/h3&gt;&lt;p style=&quot;text-align: left;&quot;&gt;Numerous ways are there for ensuring your email signatures get featured from the rest of the competition. Utilizing HTML icons and pictures is the standardized way to add these into an email signature.&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;However, they don&#39;t emerge as they should come forth. A top-notch example will be not using animated GIFs as these often get restricted by the email filters. The subsequent considerable issue is picture sizing.&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;8. Call-to-action&lt;/span&gt;&lt;/h3&gt;&lt;p style=&quot;text-align: left;&quot;&gt;In your email signature template, you should utilize a powerful CTA to improve sales and leads quickly. Don&#39;t be pushy or over the top while adding this CTA. However, the remaining email signature portion will be pretty simple, and the most captivating option will be adding the &quot;Apply Now&quot; button. Therefore, all you need to embed in your HTML editor, and there you go. &lt;br /&gt;&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;9. Make It Pop&lt;/span&gt;&lt;/h3&gt;&lt;p style=&quot;text-align: left;&quot;&gt;Does your brand love to play with vivid colors? Using pop-colored templates will be the most alluring email signature template option, which you must adopt for your branding purposes.&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;The colorful template will also work miraculously on smartphones, as there will never be too many effects for slowing down your device. In brief, using those pop-colored templates on your email signature will grab the target audience&#39;s attention.&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;10. Straightforward Email Signatures&lt;/span&gt;&lt;/h3&gt;&lt;p&gt;If you prefer simple yet catchy email signature templates, nothing could beat the simplicity of text-based email signatures. These premium email signatures are the amalgamation of minimal graphical imagery and text. All you need to do is keep the layout as simple as possible.&lt;/p&gt;&lt;p&gt;Always make sure to utilize the remarkable fonts, graphics, and colors. These shouldn&#39;t violate the brand guidelines.&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;11. Try &quot;Sent From my iPhone&quot;&lt;/span&gt;&lt;/h3&gt;&lt;p&gt;Utilizing this &quot;sent from my iPhone&quot; signature helps ameliorate your image. Also, a study has revealed that such an email signature template attributes higher authenticity to the sender. Therefore, an email with such a signature helps get more clients irrespective of writing from a PC or a phone.&lt;/p&gt;&lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Concluding Words&lt;/span&gt;&lt;/h1&gt;&lt;p&gt;With these top 10+ free email signature templates in mind, you can attract your relevant customer. Whatever you opt for, you must have understood the necessity of embedding the email signature feedback button. &lt;br /&gt;&lt;br /&gt;Go through the article carefully and pick anyone, which inspires you. All these templates will help you garner real-time customer satisfaction feedback to develop your business.&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='https://www.kalilinux.in/feeds/952645924201247599/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.kalilinux.in/2021/08/signature-generator-reviews-10-free.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/952645924201247599'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/952645924201247599'/><link rel='alternate' type='text/html' href='https://www.kalilinux.in/2021/08/signature-generator-reviews-10-free.html' title='Signature Generator Reviews: 10+ Free Email Signature Templates You Can Use'/><author><name>Kali Linux</name><uri>http://www.blogger.com/profile/07345541575706459646</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//3.bp.blogspot.com/-Mb3EvSYi1Yg/YOL_LNs2xhI/AAAAAAAAFk4/aghHydKfmagtjPYLvn-SVVNEIJW10TdLACK4BGAYYCw/s113/kali%2Bdragon.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/--H_6cXoOFtw/YScmju60tSI/AAAAAAAAFzw/ZuWjxXW0RlkXYL4A9e1TmkK30Hiz9eE-ACLcBGAsYHQ/s72-c/mail%2Bsignature.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6091241131056531264.post-5784633331924869841</id><published>2021-08-24T16:00:00.000+05:30</published><updated>2021-08-24T16:00:00.144+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Information Gathering Tools"/><title type='text'>Profil3r -- Search Anyone on the Internet</title><content type='html'>&lt;p&gt;We are living in digital era. We are penetration testers, we need to protect the world. We need to be digital Sherlock Holmes. For that we need to find a criminal from a small clue. If we get a bad guy&#39;s username or mail then we don&#39;t need to manually search it on the internet. There are some OSINT (Open-Source Intelligence) tools to reduce our effort. Today we are going to talk about a tool called &lt;b&gt;&lt;a href=&quot;https://github.com/Rog3rSm1th/Profil3r&quot; target=&quot;_blank&quot;&gt;Profil3r&lt;/a&gt; on our Kali Linux&lt;/b&gt;. Not only for security experts even govt and law enforcement also can use the OSINT tools to gather information about some individuals or organizations from the ocean of internet.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-oZCcJKa5S0A/YPkV6w-iktI/AAAAAAAAFto/BojufCkR30Y9-_Y0-Ks_idG-uWjdvhi1wCLcBGAsYHQ/s1000/Profil3r%2Bthumbnail.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Profil3r -- Search Anyone on the Internet Kali Linux&quot; border=&quot;0&quot; data-original-height=&quot;606&quot; data-original-width=&quot;1000&quot; height=&quot;194&quot; src=&quot;https://1.bp.blogspot.com/-oZCcJKa5S0A/YPkV6w-iktI/AAAAAAAAFto/BojufCkR30Y9-_Y0-Ks_idG-uWjdvhi1wCLcBGAsYHQ/w320-h194/Profil3r%2Bthumbnail.png&quot; title=&quot;Profil3r -- Search Anyone on the Internet Kali Linux&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Previously we already talked about &lt;a href=&quot;https://www.kalilinux.in/2020/06/sherlock-kali-linux.html&quot; target=&quot;_blank&quot;&gt;Sherlock&lt;/a&gt; and &lt;a href=&quot;https://www.kalilinux.in/2019/04/trape-people-tracker.html&quot; target=&quot;_blank&quot;&gt;Trape&lt;/a&gt;, we can use them to find someone on internet with some basic details, in our this article we are going to do the same using Profil3r in a very effective way.&lt;/p&gt;&lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Install Profil3r on Kali Linux&lt;/span&gt;&lt;/h1&gt;&lt;p&gt;&lt;a href=&quot;https://github.com/Rog3rSm1th/Profil3r&quot; target=&quot;_blank&quot;&gt;Profil3r&lt;/a&gt; is an OSINT tool that allows us to find potential profiles of a person on social networks, as well as their email addresses. This program also alerts us to the presence of a data leak for the found emails.&lt;/p&gt;&lt;p&gt;Installing is very easy, we need to just apply following command on our Kali Linux terminal to install &lt;b&gt;Profil3r&lt;/b&gt; on our updated (latest python3 and pip3) system:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;pip3 install profil3r&lt;/pre&gt;&lt;p&gt;In the following screenshot we can see that Profil3r installation is started on our system, it will install the script and some dependencies to run it:&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-vTxANjrij28/YPkDu863ByI/AAAAAAAAFso/5-jfGllflFEpfB_Fo__VVE0vE5yxtjU6wCLcBGAsYHQ/s1006/profi.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;profil3r installation&quot; border=&quot;0&quot; data-original-height=&quot;411&quot; data-original-width=&quot;1006&quot; height=&quot;262&quot; src=&quot;https://1.bp.blogspot.com/-vTxANjrij28/YPkDu863ByI/AAAAAAAAFso/5-jfGllflFEpfB_Fo__VVE0vE5yxtjU6wCLcBGAsYHQ/w640-h262/profi.png&quot; title=&quot;profil3r installation&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Now we can check it&#39;s help by applying following command:&lt;p&gt;&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code class=&quot;ns&quot; style=&quot;outline: currentcolor none 0px; transition: all 0.3s ease 0s;&quot;&gt;profil3r -h&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;In the following screenshot we can see the help options of this profil3r tool.&lt;br /&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-r37KKXOJYX4/YPkF__YAo2I/AAAAAAAAFsw/yY5zmKgr6w481d7SE9RSTwU009YaTvKXQCLcBGAsYHQ/s1037/profil3r%2Bhelp.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;profil3r help options&quot; border=&quot;0&quot; data-original-height=&quot;480&quot; data-original-width=&quot;1037&quot; height=&quot;296&quot; src=&quot;https://1.bp.blogspot.com/-r37KKXOJYX4/YPkF__YAo2I/AAAAAAAAFsw/yY5zmKgr6w481d7SE9RSTwU009YaTvKXQCLcBGAsYHQ/w640-h296/profil3r%2Bhelp.png&quot; title=&quot;profil3r help options&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;We can see there are nothing much here, we can use &lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;-p&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt; flag to set the username or name of we are looking for. We can save the report output in HTML, JSON and CSV format using &lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;-r&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt; flag followed by directory location.&lt;/p&gt;&lt;h1 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #2b00fe;&quot;&gt;Running Profil3r on Kali Linux &lt;/span&gt;&lt;br /&gt;&lt;/h1&gt;&lt;p&gt;For an example we are looking for Jhon Doe, so we use following command on our terminal:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code class=&quot;ns&quot; style=&quot;outline: currentcolor none 0px; transition: all 0.3s ease 0s;&quot;&gt;profil3r -p john doe -r /home/kali&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;After pressing Enter ↲ , Profil3r will prompt suggesting some possible usernames, as we can see in the following screenshot:&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-5gywgGilI5Q/YPkI2OKaIdI/AAAAAAAAFs4/PgzWg6hhxNwmUaXhnvLw18fvK9NMrmjAgCLcBGAsYHQ/s793/profil3r%2Brunning.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;profil3r on kali linux&quot; border=&quot;0&quot; data-original-height=&quot;389&quot; data-original-width=&quot;793&quot; height=&quot;314&quot; src=&quot;https://1.bp.blogspot.com/-5gywgGilI5Q/YPkI2OKaIdI/AAAAAAAAFs4/PgzWg6hhxNwmUaXhnvLw18fvK9NMrmjAgCLcBGAsYHQ/w640-h314/profil3r%2Brunning.png&quot; title=&quot;profil3r on kali linux&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Here in the above screenshot we can see the suggested usernames, we can use &lt;b&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;UP&lt;/span&gt;&lt;/b&gt;⬆ and &lt;b&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;DOWN&lt;/span&gt;&lt;/b&gt;⬇ key to move our cursor, to select we need to use &lt;b&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;SPACE&lt;/span&gt;&lt;/b&gt; button (we can select multiple), also we can invert them by using &lt;b&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;I&lt;/span&gt;&lt;/b&gt; key, and toogle using &lt;b&gt;&lt;span style=&quot;font-family: verdana;&quot;&gt;A&lt;/span&gt;&lt;/b&gt; key. We need to press &lt;span style=&quot;font-family: verdana;&quot;&gt;&lt;b&gt;ENTER&lt;/b&gt;&lt;/span&gt;&lt;b&gt;↲&lt;/b&gt; after our selection to continue.&lt;br /&gt;&lt;/p&gt;&lt;p&gt;For an example we are going with john.doe username, Then we got a list of various type of sites, as we can see in the following screenshot:&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-0aK_ddCSXzM/YPkKvMOM1hI/AAAAAAAAFtA/zjmvddY2I10B2CIffzYKHiUzfA7iuqCKQCLcBGAsYHQ/s851/profil3r%2Bservices%2Blist.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;profil3r services list&quot; border=&quot;0&quot; data-original-height=&quot;415&quot; data-original-width=&quot;851&quot; height=&quot;312&quot; src=&quot;https://1.bp.blogspot.com/-0aK_ddCSXzM/YPkKvMOM1hI/AAAAAAAAFtA/zjmvddY2I10B2CIffzYKHiUzfA7iuqCKQCLcBGAsYHQ/w640-h312/profil3r%2Bservices%2Blist.png&quot; title=&quot;profil3r services list&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Here also we need to select things we need to search (shown in following screenshot), because we are showing an example here so we are going with just few things. For a better search we need to select everythinng, but that is really time consuming.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-oa7ON3h9puw/YPkLlDGo6aI/AAAAAAAAFtI/-PfjjKTHgGY9XY5fDVUhk3TICleKHv57gCLcBGAsYHQ/s851/profil3r%2Bservices%2Blist.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;profil3r places to search&quot; border=&quot;0&quot; data-original-height=&quot;415&quot; data-original-width=&quot;851&quot; height=&quot;312&quot; src=&quot;https://1.bp.blogspot.com/-oa7ON3h9puw/YPkLlDGo6aI/AAAAAAAAFtI/-PfjjKTHgGY9XY5fDVUhk3TICleKHv57gCLcBGAsYHQ/w640-h312/profil3r%2Bservices%2Blist.png&quot; title=&quot;profil3r places to search&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;After the selection we need to press Enter, it will take some time to complete the scans. In the following screenshot we can see how profil3r is working:&lt;/p&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-9ZQAOcK1mOo/YPkML0sJQPI/AAAAAAAAFtQ/IR4CTfFUwpkadRNw3etK_mfPML917FvGwCLcBGAsYHQ/s1366/profil3r%2Bat%2Bwork.png&quot;&gt;&lt;img alt=&quot;Profil3r works&quot; border=&quot;0&quot; data-original-height=&quot;768&quot; data-original-width=&quot;1366&quot; height=&quot;360&quot; src=&quot;https://1.bp.blogspot.com/-9ZQAOcK1mOo/YPkML0sJQPI/AAAAAAAAFtQ/IR4CTfFUwpkadRNw3etK_mfPML917FvGwCLcBGAsYHQ/w640-h360/profil3r%2Bat%2Bwork.png&quot; title=&quot;Profil3r works&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;We can see that if founds some mail ids in data leak which may related to our target. After the scanning is complete is will generate a full report on our given path&amp;nbsp; as we can see in the following screenshot:&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-4YHp90vxr6E/YPkM1jhqnUI/AAAAAAAAFtY/sQrHRGWB78UiQfu3ylOtuzNf-zpGmRj7gCLcBGAsYHQ/s669/profil3r%2Bgenerated%2Breports.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;profil3r saved output results&quot; border=&quot;0&quot; data-original-height=&quot;194&quot; data-original-width=&quot;669&quot; height=&quot;186&quot; src=&quot;https://1.bp.blogspot.com/-4YHp90vxr6E/YPkM1jhqnUI/AAAAAAAAFtY/sQrHRGWB78UiQfu3ylOtuzNf-zpGmRj7gCLcBGAsYHQ/w640-h186/profil3r%2Bgenerated%2Breports.png&quot; title=&quot;profil3r saved output results&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;We can open this reports to see everything in a very organized way. In the following screenshot we have opened the HTML report output on browser.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-iGW2btBFawM/YPkOLeFq_mI/AAAAAAAAFtg/PRZ3DrUvDnsXZXPrztQMdoiEXKdC6wJTQCLcBGAsYHQ/s1366/profil3r%2Breport%2Bhtml%2Bopen.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;profil3r report html open&quot; border=&quot;0&quot; data-original-height=&quot;768&quot; data-original-width=&quot;1366&quot; height=&quot;360&quot; src=&quot;https://1.bp.blogspot.com/-iGW2btBFawM/YPkOLeFq_mI/AAAAAAAAFtg/PRZ3DrUvDnsXZXPrztQMdoiEXKdC6wJTQCLcBGAsYHQ/w640-h360/profil3r%2Breport%2Bhtml%2Bopen.png&quot; title=&quot;profil3r report html open&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;This is how we can use &lt;u&gt;&lt;i&gt;&lt;b&gt;Profil3r&lt;/b&gt;&lt;/i&gt;&lt;/u&gt; tool on our &lt;u&gt;&lt;i&gt;&lt;b&gt;Kali Linux&lt;/b&gt;&lt;/i&gt;&lt;/u&gt; and easily get information about a human or organizations &lt;u&gt;&lt;i&gt;&lt;b&gt;using the usernames&lt;/b&gt;&lt;/i&gt;&lt;/u&gt;. This &lt;u&gt;&lt;i&gt;&lt;b&gt;OSINT&lt;/b&gt;&lt;/i&gt;&lt;/u&gt; tool is very important for &lt;u&gt;&lt;i&gt;&lt;b&gt;finding someone on the internet&lt;/b&gt;&lt;/i&gt;&lt;/u&gt;.&lt;/p&gt;&lt;p&gt;&lt;b&gt;Love our articles?&lt;/b&gt; Make sure to &lt;b&gt;follow us&lt;/b&gt; on &lt;a class=&quot;d-link&quot; href=&quot;https://twitter.com/KaliLinux_in&quot; target=&quot;_blank&quot;&gt;Twitter&lt;/a&gt; and &lt;a class=&quot;d-link&quot; href=&quot;https://github.com/jaykali&quot; target=&quot;_blank&quot;&gt;GitHub&lt;/a&gt;, we post updates there. To join our &lt;b&gt;KaliLinuxIn&lt;/b&gt; family, join our &lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;a class=&quot;d-link&quot; href=&quot;https://t.me/kalilinuxin&quot; target=&quot;_blank&quot;&gt;Telegram Group&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;. We are trying to build a community for Linux and Cybersecurity. For anything we always happy to help everyone on the &lt;span style=&quot;color: red;&quot;&gt;comment section&lt;/span&gt;. As we know our comment section is always open to everyone. We read each and every comment and &lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;we always reply&lt;/span&gt;&lt;/b&gt;.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='https://www.kalilinux.in/feeds/5784633331924869841/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.kalilinux.in/2021/07/profil3r-find-anyone-on-internet.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/5784633331924869841'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/5784633331924869841'/><link rel='alternate' type='text/html' href='https://www.kalilinux.in/2021/07/profil3r-find-anyone-on-internet.html' title='Profil3r -- Search Anyone on the Internet'/><author><name>Kali Linux</name><uri>http://www.blogger.com/profile/07345541575706459646</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//3.bp.blogspot.com/-Mb3EvSYi1Yg/YOL_LNs2xhI/AAAAAAAAFk4/aghHydKfmagtjPYLvn-SVVNEIJW10TdLACK4BGAYYCw/s113/kali%2Bdragon.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-oZCcJKa5S0A/YPkV6w-iktI/AAAAAAAAFto/BojufCkR30Y9-_Y0-Ks_idG-uWjdvhi1wCLcBGAsYHQ/s72-w320-h194-c/Profil3r%2Bthumbnail.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6091241131056531264.post-6993806566058993238</id><published>2021-08-20T19:33:00.000+05:30</published><updated>2021-08-20T19:33:00.149+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Information Gathering Tools"/><title type='text'>Metagoofil -- Extract Information using Google</title><content type='html'>&lt;p&gt;&lt;b&gt;Metagoofil&lt;/b&gt; is an awesome &lt;b&gt;Information gathering tool&lt;/b&gt; that can be used for extracting lots of information from Word Documents, Presentation files, PDF’s, Excel Sheets, .jpg images and lots of other formats. Metagoofil also can provide a lots of constructive information during the penetration testing just by scanning the gathered files. Lets learn how to extract information from documents, images using Metagoofil on our &lt;b&gt;Kali Linux&lt;/b&gt;.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-EdIzvjgB7S4/YPe3QEmfu4I/AAAAAAAAFsQ/oZ9Phej1N_EzbGoVmvFsP8iQy3ZwnaO-gCLcBGAsYHQ/s1000/Metagoofil%2Bthumbnail.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;metagoofil collect information from google metadata on kali linux&quot; border=&quot;0&quot; data-original-height=&quot;606&quot; data-original-width=&quot;1000&quot; height=&quot;194&quot; src=&quot;https://1.bp.blogspot.com/-EdIzvjgB7S4/YPe3QEmfu4I/AAAAAAAAFsQ/oZ9Phej1N_EzbGoVmvFsP8iQy3ZwnaO-gCLcBGAsYHQ/w320-h194/Metagoofil%2Bthumbnail.png&quot; title=&quot;metagoofil collect information from google metadata on kali linux&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;b&gt;Metagoofil&lt;/b&gt; utilizes the &lt;b&gt;Google search engine&lt;/b&gt; to get &lt;b&gt;metadata&lt;/b&gt; from the documents available in the target domain. Currently, it supports the following document types:&lt;/p&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Word documents (.docx , .doc)&lt;/li&gt;&lt;li&gt;Spreadsheet documents (.xlsx , .xls , .ods)&lt;/li&gt;&lt;li&gt;Presentation files (.pptx , .ppt , .odp)&lt;/li&gt;&lt;li&gt;PDF files (.pdf)&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;Metagoofil works by executing following actions:&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;It searches for all of the preceding file types in the target domain using the Google search engine.&lt;/li&gt;&lt;li&gt;Then it downloads all of the documents found and saving them to the local disk.&lt;/li&gt;&lt;li&gt;It extracts the metadata from the downloaded documents.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;The metadata that can be found includes the following:&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Usernames&lt;/li&gt;&lt;li&gt;Server or machine names&lt;/li&gt;&lt;li&gt;Software versions &lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;This information may be valuable and used later during the penetration testing phase. &lt;b&gt;Metagoofil comes pre-installed with the full version of Kali Linux&lt;/b&gt;, if not then we can easily install it from the repository by using &lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;&lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;sudo apt-get install metagoofil&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt; command.&lt;/p&gt;&lt;p&gt;We can see the help (options) of Metagoofil by using following command on our terminal:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code class=&quot;ns&quot;&gt;metagoofil -h&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;Then we can see the help options as in the following screenshot:&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-oODl41UEIrc/YPbAPM6Z_xI/AAAAAAAAFrw/N7C5PpjOkeoNCNfTQmZAb6DlIsp8aAuZACLcBGAsYHQ/s1070/metagoofil%2Bhelp.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;metagoofil help&quot; border=&quot;0&quot; data-original-height=&quot;484&quot; data-original-width=&quot;1070&quot; height=&quot;290&quot; src=&quot;https://1.bp.blogspot.com/-oODl41UEIrc/YPbAPM6Z_xI/AAAAAAAAFrw/N7C5PpjOkeoNCNfTQmZAb6DlIsp8aAuZACLcBGAsYHQ/w640-h290/metagoofil%2Bhelp.png&quot; title=&quot;metagoofil help&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Let&#39;s use it and know how to use Metagoofil. First of all we need a target, we took the domain example.com as our target and runs Metagoofil aginst it by using following command:&lt;/p&gt;&lt;pre style=&quot;background-attachment: scroll; background-color: black; background-image: none; background-position: 0% 0%; background-repeat: repeat; border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-color: rgb(225, 225, 225) rgb(240, 240, 240) rgb(240, 240, 240) rgb(225, 225, 225); border-radius: 2px; border-style: solid; border-top-left-radius: 2px; border-top-right-radius: 2px; border-width: 1px; box-sizing: border-box; clear: both; color: lime; font-family: monospace, monospace; font-size: 20px; font-stretch: normal; line-height: 19px; list-style: outside none none; margin-bottom: 1em; outline: currentcolor none medium; overflow: auto hidden; padding: 1em; text-align: left; transition: all 0.3s ease 0s;&quot;&gt;&lt;code class=&quot;ns&quot;&gt;metagoofil -d example.com -l 20 -t doc,pdf -n 5&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;Here we specify our domain using &lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;-d&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt; flag, and uses &lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;-t&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt; flag to specify file types we are looking for, &lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;-l&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt; to limit the search for every file types (20 in our case), using &lt;span style=&quot;background-color: black;&quot;&gt;&lt;span style=&quot;color: #04ff00;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: courier;&quot;&gt;-n&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt; flag we specified that we want to download only 5 files. We can changes the values used in this command as per our requirement.&lt;/p&gt;&lt;p&gt;Now we run the command on our terminal and after sometime (Metagoofil take some time to scan) it will show us the results, as we can see in the following screenshot:&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-P6iuAYxiUg4/YPbXluJvEPI/AAAAAAAAFsA/-no7xk8clPAUC01mYVeggTMBBlIhk_t9ACLcBGAsYHQ/s621/metagoofil.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;metagoofil results&quot; border=&quot;0&quot; data-original-height=&quot;160&quot; data-original-width=&quot;621&quot; height=&quot;164&quot; src=&quot;https://1.bp.blogspot.com/-P6iuAYxiUg4/YPbXluJvEPI/AAAAAAAAFsA/-no7xk8clPAUC01mYVeggTMBBlIhk_t9ACLcBGAsYHQ/w640-h164/metagoofil.png&quot; title=&quot;metagoofil results&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Here our target website is a blank website, so it can&#39;t find anything on this website. But if we provide a healthy target then it can gather a lot of information.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-GJ5QuEV6-q4/YPesqO3ZxeI/AAAAAAAAFsI/Ik9t27zO020Neo8ZJWthNdvQPHSt5sb5wCLcBGAsYHQ/s1138/metagoofil%2Bresults.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;metagoofil results&quot; border=&quot;0&quot; data-original-height=&quot;312&quot; data-original-width=&quot;1138&quot; height=&quot;176&quot; src=&quot;https://1.bp.blogspot.com/-GJ5QuEV6-q4/YPesqO3ZxeI/AAAAAAAAFsI/Ik9t27zO020Neo8ZJWthNdvQPHSt5sb5wCLcBGAsYHQ/w640-h176/metagoofil%2Bresults.png&quot; title=&quot;metagoofil results&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;This is how we can gather information using metadata from Google search engine using &lt;b&gt;Metagoofil on our Kali Linux&lt;/b&gt;. We should always remember that information gathering is the most crucial part of penetration testing.&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Love our articles?&lt;/b&gt; Make sure to &lt;b&gt;follow us&lt;/b&gt; on &lt;a class=&quot;d-link&quot; href=&quot;https://twitter.com/KaliLinux_in&quot; target=&quot;_blank&quot;&gt;Twitter&lt;/a&gt; and &lt;a class=&quot;d-link&quot; href=&quot;https://github.com/jaykali&quot; target=&quot;_blank&quot;&gt;GitHub&lt;/a&gt;, we post updates there. To join our &lt;b&gt;KaliLinuxIn&lt;/b&gt; family, join our &lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;a class=&quot;d-link&quot; href=&quot;https://t.me/kalilinuxin&quot; target=&quot;_blank&quot;&gt;Telegram Group&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;. We are trying to build a community for Linux and Cybersecurity. For anything we always happy to help everyone on the &lt;span style=&quot;color: red;&quot;&gt;comment section&lt;/span&gt;. As we know our comment section is always open to everyone. We read each and every comment and &lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;we always reply&lt;/span&gt;&lt;/b&gt;.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='https://www.kalilinux.in/feeds/6993806566058993238/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.kalilinux.in/2021/07/metagoofil.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/6993806566058993238'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/6993806566058993238'/><link rel='alternate' type='text/html' href='https://www.kalilinux.in/2021/07/metagoofil.html' title='Metagoofil -- Extract Information using Google'/><author><name>Kali Linux</name><uri>http://www.blogger.com/profile/07345541575706459646</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//3.bp.blogspot.com/-Mb3EvSYi1Yg/YOL_LNs2xhI/AAAAAAAAFk4/aghHydKfmagtjPYLvn-SVVNEIJW10TdLACK4BGAYYCw/s113/kali%2Bdragon.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-EdIzvjgB7S4/YPe3QEmfu4I/AAAAAAAAFsQ/oZ9Phej1N_EzbGoVmvFsP8iQy3ZwnaO-gCLcBGAsYHQ/s72-w320-h194-c/Metagoofil%2Bthumbnail.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6091241131056531264.post-1424541043283922636</id><published>2021-08-19T18:53:00.000+05:30</published><updated>2021-08-19T18:53:27.984+05:30</updated><title type='text'>How to Make a Boyfriend by Random Video Chat</title><content type='html'>&lt;p&gt;We are led by the tradition of thinking that we can meet suitable people offline only. When it comes to boys and men, we have our perceptions of finding the perfect one. Now, a new and better way of finding companionship has evolved over time.&lt;/p&gt;&lt;p&gt;This way is meeting people through &lt;a href=&quot;https://omegle.plus/camsurf.html&quot; target=&quot;_blank&quot;&gt;random video chat&lt;/a&gt;. To cater to this cause, a lot of online platforms have evolved. Amongst all the platforms allowing users to have online video interaction with each other, Camsurf has become a known name.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-cYtJ57vwgMg/YR5abRm7QoI/AAAAAAAAFzk/_HnpwpbAUt8EYzaURtbRSqm_poGi2if9ACLcBGAsYHQ/s612/boyfriend.jpg&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img alt=&quot;How to Make a Boyfriend by Random Video Chat&quot; border=&quot;0&quot; data-original-height=&quot;408&quot; data-original-width=&quot;612&quot; height=&quot;213&quot; src=&quot;https://1.bp.blogspot.com/-cYtJ57vwgMg/YR5abRm7QoI/AAAAAAAAFzk/_HnpwpbAUt8EYzaURtbRSqm_poGi2if9ACLcBGAsYHQ/w320-h213/boyfriend.jpg&quot; title=&quot;How to Make a Boyfriend by Random Video Chat&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Image credit iStockPhoto&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;p&gt;&lt;/p&gt;&lt;h2 style=&quot;text-align: center;&quot;&gt;Make Boyfriend through Camsurf&lt;/h2&gt;&lt;p&gt;Whatever your checklist is for the perfect boyfriend, Camsurf is the best platform to find someone who fits the list. Wondering how Camsurf works? Well, it is a website that allows you to get in touch through video randomly with strangers.&lt;/p&gt;&lt;p&gt;Yes, you can connect with strangers from all over the world and interact in an open manner. Camsurf attracts users on a global scale. This enables you to expand your territory. You don’t just have to stick to your location or geography as you can meet people from other parts of the globe too.&lt;/p&gt;&lt;p&gt;Honestly, the competition in this field is a lot. You will see hundreds of sites claiming to offer video chatting services. Most of the sites are either not safe or are full of malware. Even if they claim to be free initially, they will trick you into paying sooner or later.&lt;/p&gt;&lt;p&gt;Hence, do not fall prey to marketing gimmicks and search algorithms. When finding a boyfriend online, you need to take the integrity of your system and the genuineness of a platform into account. Camsurf is everything that you can need from a video chatting site.&lt;/p&gt;&lt;h2 style=&quot;text-align: center;&quot;&gt;How to get a boyfriend on Camsurf?&lt;/h2&gt;&lt;p&gt;It is super simple to make a boyfriend through Camsurf as you will find the right one for yourself in random video chatting. Similar &lt;a href=&quot;https://omegle.plus/&quot; target=&quot;_blank&quot;&gt;to Omegle Plus&lt;/a&gt;, the interface of Camsurf is very user-friendly. Even if it is your first-time video chatting with a stranger, you will be fine.&lt;/p&gt;&lt;p&gt;To start your journey with this Camsurf, there is bare minimum effort involved. You do not need to register yourself, you do not need to sign up or create a five-page long profile asking intimate questions about your likes and dislikes. The only thing you need to do is to provide access to your camera.&lt;/p&gt;&lt;p&gt;The moment you allow Camsurf access to the camera, you can begin chatting through videos. There are many ways you can interact with strangers- you can either join a chat room or you can have one on one conversations with strangers.&lt;/p&gt;&lt;p style=&quot;text-align: left;&quot;&gt;When you join a chat room, you can choose the area of your interest and then choose the topic that resonates with you. It is a good way to share your ideologies with others. When you opt for one-on-one conversations, you can have bilateral chats with people.&lt;br /&gt;&lt;/p&gt;&lt;h2 style=&quot;text-align: center;&quot;&gt;No Revelation of Identity&lt;/h2&gt;&lt;p style=&quot;text-align: left;&quot;&gt;&lt;/p&gt;&lt;p&gt;You get to chat using Camsurf without revealing your identity. As there is no signing up required from the very beginning, there is absolutely no scope of the revelation of your identity. You can chat with strangers in an absolutely anonymous manner.&lt;/p&gt;&lt;p&gt;While the identities are kept a secret, it is one of the most prominently famous platforms. There is no room for any bots or illegitimate users. Usually, on dating apps, people face a lot of misrepresentation. Some people even claim to be someone they are not.&lt;/p&gt;&lt;p&gt;Hence, on dating sites, there is always a lurking risk of the below:&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;When you trust someone’s profile based on their picture, you might not be interacting with the same person. A lot of users use someone else’s pictures or pretend to be someone they are not.&lt;/li&gt;&lt;li&gt;You cannot completely rely on someone’s profile information. Most people just write things that make them more acceptable and like-worthy. The reality can be different than what is seen.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;You can avoid all these pertinent hassles with dating sites when you use Camsurf. As you directly video chat with people, there is no risk of running into someone else. You would always be chatting with people being themselves.&lt;/p&gt;&lt;p&gt;Other dating apps are pretty shallow in their perceptions, i.e. always liking people for their pictures or ability to write the perfect profile. Camsurf, however, gives a fresh take on people.&lt;/p&gt;&lt;p&gt;On Camsurf the only criteria for you to keep talking to someone is how well do you find them. You run no risk of chatting with impostors. The feeling of companionship will be mutual and if not, you can skip the chat.&lt;/p&gt;&lt;h2 style=&quot;text-align: center;&quot;&gt;Meet new people&lt;/h2&gt;&lt;p&gt;The constant struggle in making a boyfriend is the paucity of options. You think just these many people exist who are willing to date. Camsurf makes you privy to so many people and options at once. It is literally like you picking who you want to talk to.&lt;/p&gt;&lt;p&gt;Camsurf brings speed dating to a new level. You can skip the people you do not like instantly. Hence, if there is someone you do not connect with well, you do not have to get stuck in formalities. You can move on instantly.&lt;/p&gt;&lt;p&gt;The benefit of moving on with Camsurf is that you will always find new people. You will not have to face the embarrassing situation of meeting someone you skipped in the past. There will always be new people and new men to consider as a potential boyfriend.&lt;/p&gt;&lt;h2 style=&quot;text-align: center;&quot;&gt;Conclusion&lt;/h2&gt;&lt;p&gt;Your random video chat on Camsurf could make you face to face with the one. Not all people find solace or companionship in traditional ways. Dating through other sites can take a toll on your patience, time, and even your money.&lt;/p&gt;&lt;p&gt;How long should you wait till you finally meet the one? With Camsurf, the distance is curbed in a way similar to Omegle Plus. You come to conclusions sooner and you can make a boyfriend sooner than any other platform. So, stop wandering around and find ‘him’ on Camsurf right now!&lt;br /&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='https://www.kalilinux.in/feeds/1424541043283922636/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://www.kalilinux.in/2021/08/how-to-make-boyfriend-by-random-video.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/1424541043283922636'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6091241131056531264/posts/default/1424541043283922636'/><link rel='alternate' type='text/html' href='https://www.kalilinux.in/2021/08/how-to-make-boyfriend-by-random-video.html' title='How to Make a Boyfriend by Random Video Chat'/><author><name>Kali Linux</name><uri>http://www.blogger.com/profile/07345541575706459646</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//3.bp.blogspot.com/-Mb3EvSYi1Yg/YOL_LNs2xhI/AAAAAAAAFk4/aghHydKfmagtjPYLvn-SVVNEIJW10TdLACK4BGAYYCw/s113/kali%2Bdragon.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-cYtJ57vwgMg/YR5abRm7QoI/AAAAAAAAFzk/_HnpwpbAUt8EYzaURtbRSqm_poGi2if9ACLcBGAsYHQ/s72-w320-h213-c/boyfriend.jpg" height="72" width="72"/><thr:total>0</thr:total></entry></feed>
Response: application/gopher-menu
Original URLgopher://codemadness.org/1/git/sfeed_tests/file/input/sfe...
Content-Typeapplication/gopher-menu; charset=utf-8