Installation Download the xfce4 installer with the following command: XFCE Link: wget https://kali.sh/xfce4.sh Run the installer and go through the installation process. Once the installation is complete, we need to start the xrdp server: sudo /etc/init.d/xrdp start Launch the remote desktop connection utility on Windows and use the localhost IP (127.0.0.1) with the port 3390. Voila!
What is CloneMast3r Link Cl0neMast3r is a Python script that was coded to make your life easier. Now you can easily choose your favorite tools from GitHub and install them on your system with one click. Even better you can ensure that you have the latest version of your favorite tools. All this and more you
What is Weevely? Weevely is a web shell designed for remote server administration and penetration testing that can be extended over the network at runtime with more than 30 modules. It executes remote code via an obfuscated PHP agent located on the compromised HTTP server. It fits both web administration and penetration
What Are Kali Repositories? The single most common causes of a broken Kali Linux installation are following unofficial advice, and particularly arbitrarily populating the system’s sources.list file with unofficial repositories. The following post aims to clarify what repositories should exist in sources.list, and when they should be used. The sources.list file can be found in
WordPress Hacking With WPScan What is WPScan? WPScan is a black box WordPress vulnerability scanner that can be used to scan remote WordPress installations to find security issues. WPScan Commands Basic WordPress Scan - wpscan <url/target> Enumerating Usernames - wpscan -u <url/target> -e u vp Using A Wordlist - wpscan -u <url/target> -e u --wordlist /root/wordlist.txt
Meltdown affects Intel processors and works by breaking through the barrier that prevents applications from accessing arbitrary locations in kernel memory. Segregating and protecting memory spaces prevents applications from accidentally interfering with one another’s data, or malicious software from being able to see and modify it at will. Meltdown makes
The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development. Metasploit is the world's leading exploitation framework. It is used, to some extent, by nearly every hacker/pentester. As such, you really need to become familiar with it if you want to enter and prosper in this burgeoning field. Metasploit
Download Link Capabilities ps View full process list Inspect process memory map & fetch memory strings easly Dump process memory in one click Automaticly search hash in public services VirusTotal AlienVault OTX users users list find Search for suspicious files by name/regex netstat Whois logs syslog auth.log(user authentication log) ufw.log(firewall log) bash history anti-rootkit chkrootkit yara Scan a
Kali Linux has over 600 preinstalled penetration-testing programs, including Armitage (a graphical cyber attack management tool), Nmap (a port scanner), Wireshark (a packet analyzer), John the Ripperpassword cracker, Aircrack-ng (a software suite for penetration-testing wireless LANs), Burp suite and OWASP ZAPweb application security scanners.Kali Linux can run natively when installed on a computer's hard disk, can be booted from a live CD or live USB, or it can run within a virtual machine.