Since Kali Linux 2016 came out (also known as Kali Rolling), it seems that Official VirtualBox guest addition doesn’t work well anymore. It also created lots of confusion and debate as when someone asks for help, they don’t always specify which version of Kali they are using and that leads …
Read More »Find Linux Exploits by Kernel version
Sometimes it’s really hard to find the correct exploit for the device that you are pentesting. I found two good references that may be helpful or least will give you a good starting point. Both of these resources can suggest Linux exploits based on kernel version. The first one is …
Read More »Steganography in Kali Linux – Hiding data in image
Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. Generally, the hidden messages appear to be (or be part of) something else: images, articles, shopping lists, or some other cover text. This post would cover Steganography in Kali Linux – …
Read More »Kali Linux Cheat Sheet for Penetration Testers
Penetration testing (also called pen testing) is the practice of testing a computer system, network or Web application to find vulnerabilities that an attacker could exploit. Kali Linux Cheat Sheet for Penetration testers is a high level overview for typical penetration testing environment ranging from nmap, sqlmap, ipv4, enumeration, fingerprinting …
Read More »Browse anonymously in Kali Linux with Anonsurf
anonsurf allows you push your whole system via TOR network. It’s very easy to configure and possibly less hassle than setting up a VPN. Of course you will have slower connection speed than VPN as you are using TOR network. Anonsurf works in the background (you can close the terminal), …
Read More »