Sunday, 22 June 2014

Videos With Tips And Tricks For Kali Linux!

Kali Linux, Kali tips and tricks, KAli Linux video tutorials, Kali Linux tips and tricks, tutorial videos on Kali Linux, Kali Linux tutorial videos, technology news, news, open source, Linux tutorials, Linux hacking Kali Linux is a relatively new Linux-based distro. But, the sixth edition of the famed hacking distro, Backtrack has already received much praise for its hacking and penetration testing abilities. These videos teach you some neat things that you can do using this powerful operating system!


1. How to Update Kali Linux After System Bootup or Restart

This is the first of a series of videos on Kali Linux Tips and Tricks. As the name suggests, this shows you how to update the new penetration testing Linux-based distro after system bootup or restart.

2.
Install VMware Tools in a Kali Linux


VMware tools can be really useful on Kali Linux. If you don’t know how to get them, then this video will help.

3. Kali Linux ( Install Desktop Cinnamon 2D )

Although Kali Linux uses the GNOME desktop environment by default, you can still install others on it. Watch this video and learn how to get the Cinnamon 2D desktop on Kali Linux.

4. Add Arabic language to Kali Linux

Tips and tricks are sometimes meant for fun only. Getting the Arabic language on your Kali Linux distro may not be very useful, but you can do it for fun!

5. Kali Linux - How to Hack WiFi Tutorial - Sniffing WiFi Networks & Capturing Packets (BackTrack 6)

This video teaches you how you can use Kali Linux to sniff out WiFi networks and capture packets without connecting to them.

6. Hack FB using set ettercap (kali linux)

Want to use Kali Linux to hack into Facebook? Watch this video to learn how to do it.

7. Kali How to Hack WPA WPA2 the Right Way

This is a video demonstration for how you can hack into WPA/WPA2 connections using the Kali Linux distribution.

8. Control remote computer with SET / Pirater un ordinateur (Kali Linux)

This tutorial video shows you how you can control a remote computer. The video is not in English so watch closely!

9. Kali Linux - Security by Penetration Testing Tutorial: Network Discovery with Scapy

This is a tutorial video that teaches you how to use Scapy on Kali Linux for packet formatting, sending and receiving packets etc. 

Author : Shivam Kotwalia , CodeKill

Sunday, 23 February 2014

Top 11 Security Tools In Kali Linux 1.0.6

Kali Linux, penetration testing, Aircrack, best security tools, Kali Linux security tools, tools in Kali Linux, Burp Suite, Nmap, WiFi Cracker, Hydra, Kali Linux 1.0.6When it comes to security and penetration testing, Kali Linux is the talk of the town. The new version recently arrived and here's what's happening. 

Kali Linux comes with over 300 security tools pre-installed. So, it is rather difficult to pick 10 odd as the best. But we gave it a shot and this is what we would come up with.
1. AirCrack

You already know what Aircrack does don't you? Just in case, it cracks WPA or WEP router passwords. In Kali Linux 1.0.6, you have a GUI for Aircrack in the Fern WiFi Cracker, through which you can avoid the command line and still use all the features of Aircrack.

2. Burp Suite

This is an integrated platform that can be put to use for testing the security of web applications. Kali Linux 1.0.6 comes with the free version, which can be upgraded to the professional edition by paying $299 per year.

3. Hydra

This free brute force password cracking tool allows you to attack multiple accounts with a single or a list of passwords.

4. John the Ripper

This password cracker is known for its speed and revered by many as the best in its segment. Well, the new version of Kali comes with Johnny, which is a GUI for this tool. Let's you escape the command line again.

5. Maltego

Find out what or who is connected to what or who. This is what the Maltego tool is used for. It explores links between various sources.

6. Metasploit Framework

Again with the GUI, this time it is Nexpose, which gives you a front end for this well known framework.

7. Armitage

If Metasploit is too complex for you, then Kali 1.0.6 comes with an alternative in Armitage. Try this one.

8. Nmap

This free and open source utility for network discovery and security auditing is famous for its usefulness. But, it is not easy to use this, as you would know if you've watched that hacking seen from the Matrix movies (yes, they really used Nmap). So, you can make use of Zenmap, your trusty sidekick, we mean GUI, for Nmap.

9. Zed Attack Proxy

This is a free and open source penetration testing tool that can be used for finding vulnerabilities in web applications. Just in case you don't want to pay for Burp Suite maybe.

10. Sqlmap

Want to detect any SQL Injection flaws? This is the tool that you would want to use for it.

11. Wireshark

You know what this is. This network protocol analyser features on almost all of our or anyone else's top security tools lists. Kali Linux 1.0.6 comes with this pre-installed.

Author : Shivam Kotwalia, CodeKill

Saturday, 15 February 2014

Kali Linux 1.0.6 Released

The release is really heavily laden with goodness, claim developers.

Developers have finally released Kali Linux 1.0.6, with the new version of the Debian-derived Linux distribution being richly laden with goodness. It's indeed been a very long time coming, but it's eventually here. The latest release comes with prominent add-on like a new 3.12 kernel, a LUKS nuke feature, new Kali ARM build scripts, Kali AMAZON AMI and Google Compute image generation scripts.


The LUKS nuke feature is perhaps one of the more prominent ones to come with the release. A couple of days back before the official release, one of the developers had an idea to add a 'nuke' feature that will destroy all data stored in the Kali system after putting in a boot password. The developers made use of an old cryptsetup patch created back in 2008 by Juergen Pabel adding a nuke password to cryptsetup which when used, deletes all keyslots and makes the data on the drive inaccessible.

However, the patch is non-invasive and will not change anything for anyone that does not want to use it. The updated cryptsetup package is present in Kali 1.0.6 by default.

Here's what's new in this release: Kali changelog

Author : Shivam Kotwalia, CodeKill
Kali Linux, developers, Kali Linux 1.0.6, Debian, Linux distribution, LUKS nuke , 3.12 kernel, Kali ARM build, Kali ARM build, Google Compute image generation scripts

Monday, 10 February 2014

6 Resources And Tutorials On Kali Linux

hacking, hacker, hacking tool, hacking distro, kali linux, back track, hacking distro, distribution for hacking, Linux, open sourceLearn, understand and prepare yourself to dive into the world of hacking through Kali Linux with these free resources. 

If you are someone who has interest in hacking, then 'Kali Linux' is a name that needs no introduction. The evolution of BackTrack, Kali Linux is indeed the most advanced penetration testing distribution, ever. So for aspirant hackers and Kali users, we bring 6 guides, tutorials and resources that you can make use of.
1. Kali Linux by Beginner Hacking - blog

A part of beginners hacking blog, the post is a complete and well explained guide atleast for beginners. So if you have just installed Kali Linux and willing to learn the basics, here's where you should head.

2. Hack with Kali Linux - blog

This is one blog that is completely dedicated to Kali Linux. The blog provides everything from hacker's news to hacker's tools to tutorial and hence is 'the' place to visit for both new and pro Kali users.

3. Web Penetration Testing with Kali Linux - eBook

Web Penetration Testing with Kali Linux is designed to be a guide for professional Penetration Testers looking to include Kali in a web application penetration engagement.

4. Kali Linux Cookbook - eBook

Kali Linux Cookbook will serve as an excellent source of information for the security professional and novice alike. The book offers detailed descriptions and example recipes that allow you to quickly get up to speed on both Kali Linux and its usage in the penetration testing field.

5. Introduction to Kali Linux – Official Documentation

This is the Official Kali Linux Documentation, that serves as a complete guide to understand and comprehend Kali Linux and its features.

6. Introduction to Kali - The Linux Operating System Built for Hacking - Video

If a picture says a thousand words, then we wonder how many a video will say! Well, jokes apart this is YouTube video by Eli the computer guy and is an awesome tutorial for Kali Linux. Although the tutorial does require you to have a strong foundation of Linux, networking and computer systems.


Shivam Kotwalia, CodeKill

Saturday, 1 February 2014

10 Video Tutorials On Kali Linux

10 Video Tutorials On Kali Linux 
The well known hacker's distribution based on the Linux Kernel has often been called the best of Backtrack. 
In the open source community, Kali Linux is known to be the most advanced and versatile penetration testing distributions ever created. The return of Backtrack, Kali Linux is a Debian-based Linux distribution, which has been designed for penetration testing and digital forensics. Here are some tutorials relating to the Linux-based hacker’s distro. Hope you enjoy them! Backtrack, Backtrack 6, Kali Linux, hacking, Linux, open source, tech news, open source, news, kali linux tutorials, linux tutorials, video tutorials, kali linux videos

- Introduction to Kali Linux - The Linux Operating System Built For Hacking



http://www.youtube.com/watch?v=cLQ8Yd0C7sM&feature=player_embedded

- Kali Linux - How to Hack WiFi Tutorial - Sniffing WiFi Networks & Capturing Packets (BackTrack 6)



http://www.youtube.com/watch?feature=player_embedded&v=-ab9nJTdM7g

- Control remote computer with SET / Pirater un ordinateur (Kali Linux)



http://www.youtube.com/watch?feature=player_embedded&v=BMtMZB4stS0

- How To Hack using Kali Linux Tutorial: DNS Enumeration with dnsdict6 - NS MX Subdomains SRV Records



http://www.youtube.com/watch?v=sSW-paL5_Wg&feature=player_embedded

- Kali-Linux Install (Linux for Beginners!)



http://www.youtube.com/watch?feature=player_embedded&v=oC_-8o2ZJSg

- Kali Linux How To Hack - Use SET to Create Backdoor EXE Meterpreter Session Persistence Keylogger



http://www.youtube.com/watch?v=aFfIXbOBPqs&feature=player_embedded

- How To Install Kali Linux on Raspberry Pi - Hacking and Pen Testing [write using Windows or Linux]



http://www.youtube.com/watch?v=IIbZq14IL90&feature=player_embedded

- Virtualise and Install Kali Linux on VMWare Player



http://www.youtube.com/watch?feature=player_embedded&v=kT-eqBa2pok

- Run Kali Linux on Android



http://www.youtube.com/watch?v=uZ2eDb9EjzE&feature=player_embedded


- How to Install Kali Linux (Backtrack 6): Full Tutorial with Tutorial of Subterfuge



http://www.youtube.com/watch?v=tvpDMZlqMjA&feature=player_embedded

Labels

Tutorial (129) Tech News (83) E-Books (55) Pdf (47) Hacking (46) Linux (32) Android (23) Programming (22) Tools (22) Video (21) Ethical Hacking (16) Electronics (12) Google (10) Hacked (9) Python (9) Facebook (8) Java (8) Software (8) PHP (7) Android App (6) C (6) Free Online Coureses (6) OpenSource (6) Ubuntu (6) Unix (6) Windows (6) C++ (5) Game Programming (5) Java Programming (5) Kali Linux (5) CodeKill (4) Cryptography (4) Firefox (4) JavaScript (4) Linux System Administrator (4) Mac (4) Penetration testing (4) Python Programming (4) Security (4) Top Distros (4) WhatsApp (4) CSS (3) Circuit (3) Cloud Computing (3) Game Devlopment (3) Hacking Tools (3) Malware (3) MicroController (3) Microsoft (3) Networking Tool (3) Perl (3) Source Code (3) WebSite (3) Windows 8.1 (3) C Programming (2) C Series (2) C# (2) CheetSheet (2) Computer (2) Computer Networking (2) Data Storage (2) Dual Boot (2) Eclipse (2) Edward Snowden (2) Exploit (2) Facts (2) Games On Linux (2) Google Chrome (2) HTML5 (2) Hacking Challenges (2) IDE's (2) Information Security (2) Lenovo (2) Linux Kernel (2) Malicious (2) Mobile (2) Motorola (2) Mozilla (2) MySQL (2) NoSQL (2) Raspberry Pi (2) Ruby (2) Security Tools (2) Syrian Electronic Army (2) Tricks and Tips (2) Valentine Day (2) Web Design (2) iOS (2) iPhone (2) jQwery (2) *nix (1) 2014 (1) 3D Modeling (1) Algorithm (1) Android Hacking (1) Android Pattern Lock Screen.. (1) Anonymous Mail (1) Anti-Spam (1) Apps (1) Arduino (1) Artificial Intelligance (1) Audio Software (1) BSD (1) BeAWARE (1) Bitcoin (1) Black Hat Hackers (1) BlackBerry (1) Buffer Overflow (1) C++ vs Java (1) CISO (1) Circuit Analysis (1) Circuit Design (1) Circuit Programming (1) Circuit Simulators (1) Codes (1) Crptology (1) Cryptanalysis (1) DDOS (1) Devlopers (1) Drupal (1) DuckDuckGo Search Engine (1) E-Card (1) E-Mails (1) Embedded System (1) Encryption Tools (1) Error (1) FTP (1) Famous Passwords (1) FileZilla (1) Flipkart (1) Forbes (1) Forgot Password (1) GCHQ (1) Genders (1) Gmail (1) Google Tricks and Trips (1) HTML (1) Hacking Distro (1) Hard Disk (1) Hash Encryption (1) Illegal (1) Internet (1) LAMP (1) Language Theory (1) LibreOffice (1) Linus Trovalds (1) Logic Gates (1) MATLAB (1) MOSFET (1) Mail (1) Mark Zuckerberg (1) Mathematical (1) MicroProcessor (1) Mind Mapping Tools (1) Myntra (1) NoSQL Database (1) Nobal Prize (1) Nokia (1) Object Oriented Programming (1) Office (1) Oldboot (1) Online (1) Paranoid Android (1) Passwords (1) Passwords Cracking Tools (1) PayPal (1) Perl Programming (1) Plugins (1) Prolog Programming (1) Python Basics (1) Remote (1) SEA (1) SQL Injection (1) Sans (1) Screencasts (1) Screenloggers (1) Server Load (1) Servers (1) Shell (1) Software Design (1) Software Developer (1) Software Testing (1) Sony (1) Spider.io (1) Statistical (1) Steve Jobs (1) TCP/IP (1) Timeline (1) Tor (1) Trojan (1) Ubuntu Phones (1) VAIO (1) Virus (1) Web Designers (1) Wi-Fi Hacking (1) Windows Tools (1) Windows XP (1) WordPress (1) XML (1) Yahoo (1) YouTube (1) cpp (1) eBay (1) iBanking (1)