Ethical hacking and penetration testing

InfoSec, IT, Kali Linux, BlackArch

Main Menu
  • Home
  • LocalBitcoins
  • Kali Wi-Fi
  • Site Tree
  • Kali Tools
  • Online tools
  • Donate
  • VDS

Kali Linux post-installation tips and settings

Table of contents 1. How to install VirtualBox Guest OS Add-ons for Kali Linux 2. How to use Windows drives in Kali Linux. How to solve the problem with the error ‘The disk contains an unclean file system (0, 0). Metadata kept in Windows cache, refused to mount’ 3. RegularRead More

How to connect to OpenVPN via proxy or Tor

Table of contents 1. Specifics of connecting to an OpenVPN server through an HTTP proxy 1.1 Use TCP protocol 1.2 Using a proxy will affect network performance 1.3 Configuring Squid 2. How to check that the connection to OpenVPN is actually going through a proxy 2.1 Client and server logs 2.2 TrafficRead More

OpenVPN advanced usage examples

Table of contents 1. Script to automate the creation of OpenVPN configuration files 1.1 Re-running the OpenVPNassistent script 2. How to use .ovpn files with OpenVPN server and clients 3. How to connect to OpenVPN from Android 4. How to use OpenVPN to access network services on computers behind NAT (with private IP) 5. HowRead More

How to make Kali Linux 2022 Live USB with Persistence and optional encryption (on Windows)

Table of contents 1. Download Kali Linux 2021 (Live) 2. Write Kali Linux 2021 Live ISO to USB 3. Boot into Kali Linux Live from USB 4. How to create a persistence partition 5. Persistent storage with encryption 6. How to localize Kali Linux This page provides a complete guideRead More

How to install Kali Linux with full disk encryption or encrypted user’s home folder

Table of contents 1. Full disk encryption, partition encryption, encryption of individual directives and files 2. How disks and partitions are encrypted in Linux 3. Disk encryption password and user account password 4. How to install Kali Linux with full disk encryption 5. How to install Kali Linux with encrypted user's home folder 5.1Read More

How to install Windows on a USB storage

Windows on USB HDD In this manual, I will show a trick with which you can get a portable Windows on an external USB drive. This drive is not tied to a computer and should boot on any other laptop or desktop PC. The main thing that it should beRead More

How to check open ports on my computer. What do 0.0.0.0, :*, [::], 127.0.0.1 mean. How to understand NETSTAT output

Why is it important to know which ports are open on the computer? An open port on your computer (unless a firewall is configured to deny incoming connections) means that ones can connect to your computer from outside. If your computer is infected with malware, such as a Trojan, aRead More

Active Directory comprehensive guide, from installation and configuration to security auditing. Part 7: Understanding the AD infrastructure

Table of contents 1. Introduction to Active Directory (concepts, usage, difference from Workgroup) 2. Install Windows Server 2022 and Windows Server Core 2022 3. Windows Server 2022 and Windows Server Core 2022 configuration tools 4. Install Active Directory Domain Services in Windows Server 2022 5. Join computers to Active Directory. Check and unjoinRead More

Active Directory comprehensive guide, from installation and configuration to security auditing. Part 6: Active Directory configuration tools and snap-ins

Table of contents 1. Introduction to Active Directory (concepts, usage, difference from Workgroup) 2. Install Windows Server 2022 and Windows Server Core 2022 3. Windows Server 2022 and Windows Server Core 2022 configuration tools 4. Install Active Directory Domain Services in Windows Server 2022 5. Join computers to Active Directory. Check and unjoinRead More

Analysis of a Linux virus written in Bash

Bash virus code In the article “How to find and remove malware from Linux”, we looked at typical examples of how a virus in Linux makes itself persistent (in order to persist and start after a reboot), and also collected examples of commands that will allow a system administrator toRead More

Posts navigation

OLDER ENTRIES
NEWER ENTRIES
© 2022: Ethical hacking and penetration testing | SnowFall Theme by: D5 Creation | Powered by: WordPress