Links: TECHNOLOGY
Rel: security
Tags: #public


ophcrack = a rainbow table tool - avail on this (Debian-derived) distro designed for digital forensics and penetration testing

dd if=kali-linux-2020.4-rpi.img of=/dev/disk2





#  {: id="" }
sudo rm /etc/ssh/ssh_host_*
sudo dpkg-reconfigure openssh-server
sudo service ssh restart


#  {: id="" }
sudo adduser alice
sudo usermod -aG sudo alice
sudo pkill -u kali
sudo deluser kali

#  {: id="" }
sudo nano /etc/ssh/sshd_config
# AllowUsers alice bob {: id="allowusers-alice-bob" }
sudo systemctl restart ssh

#  {: id="" }
sudo nano /etc/hostname
sudo nano /etc/hosts
# kali -> new_host_name {: id="kali-->-new-host-name" }

sudo reboot now
uname -a


############ network ?  {: id="network-?" }
iw dev
ip link show wlan0
sudo macchanger -s wlan0
sudo macchanger -r wlan0 # random {: id="random" }
sudo macchanger -s wlan0
iw wlan0 link # check if connected {: id="check-if-connected" }
sudo iw wlan0 scan | grep 'SSID:'
sudo -i
wpa_passphrase ssid_name >> /etc/wpa_supplicant.conf
# enter_psk_into_stdin {: id="enter-psk-into-stdin" }
wpa_supplicant -B -D wext -i wlan0 -c /etc/wpa_supplicant.conf
iw wlan0 up



#
sudo apt update {: id="sudo-apt-update" }
sudo apt upgrade


########## tight vnc ? {: id="tight-vnc-?" }
vncserver
netstat -tupln
vncserver -kill :1




kali_livepersist

docs

medium article