Showing posts with label kali. Show all posts
Showing posts with label kali. Show all posts

Wednesday, May 5, 2021

Kali Printer Spoofing Mac Address Changing

1- Oracle Virtual Boxed

2- Bridged Network Adapter

3- macchanger -m [printer mac address] eth0

4-ifconfig eth0 down

5-ifconfig eth0 up


Monday, November 25, 2019

kali update apt-get upgrade

apt-get update (gets the sources lists for packages)
apt-get upgrade (upgrade tools)
apt-get dist-upgrade (entire kali rolling)
apt-get autoremove (removes dependencies no longer needed)

Monday, February 4, 2019

Kali Linux New Install has No Internet NAT

If you have no internet access on a new install of Kali Linux

root@kali:~# ping www.google.com
ping: www.google.com: Name or service not known
root@kali:~# ping 8.8.8.8
connect: Network is unreachable

and ifconfig has no ip address

root@kali:~# ifconfig -a
eth0: flags=4098<BROADCAST,MULTICAST>  mtu 1500
        ether 00:0c:29:3c:6b:02  txqueuelen 1000  (Ethernet)
  

my fix was to run 

root@kali:~# dhclient eth0

And now I have an ip address

root@kali:~# ifconfig -a
eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet 199.188.229.135  netmask 255.255.255.0  broadcast 192.168.229.255

and i can hit google

root@kali:~# ping www.google.com
PING www.google.com (172.217.6.100) 56(84) bytes of data

Test Credential Spraying in Kali

msfconsole

use auxillary/smb/smb_login

set SMBDomain
set SMBUser
set SMBPass
set RHOSTS      <== cidr is an option
set USER_FILE   <== optional list of users
set USERPASS_FILE <== optional list of passwords

run

example usages


setting SMBPass = Summer2017 and trying a bunch of user ids

Windows RDP Remote Desktop from Kali

~# rdesktop SERVER -d DOMAIN -u USER -p PASSWORD

Friday, February 1, 2019

Kali apt-get fail (404 not found), apt-get update fail (not valid yet), Fix=old date


In Kali I was trying to install packages but kept getting this error

root@kali:~# apt-get install libssh-dev
Reading package lists... Done
Building dependency tree     
Reading state information... Done
The following packages were automatically installed and are no longer required:
  libgnutls-dane0 libunbound2
Use 'apt autoremove' to remove them.
The following additional packages will be installed:
  libssh-4 zlib1g-dev
Suggested packages:
  libssh-doc
The following NEW packages will be installed:
  libssh-dev zlib1g-dev
The following packages will be upgraded:
  libssh-4
1 upgraded, 2 newly installed, 0 to remove and 1472 not upgraded.
Need to get 435 kB/649 kB of archives.
After this operation, 1,651 kB of additional disk space will be used.
Do you want to continue? [Y/n] Y
Err:1 http://http.kali.org/kali kali-rolling/main amd64 libssh-4 amd64 0.8.5-1
  404  Not Found [IP: 192.99.200.113 80]
Err:2 http://http.kali.org/kali kali-rolling/main amd64 libssh-dev amd64 0.8.5-1
  404  Not Found [IP: 192.99.200.113 80]
E: Failed to fetch http://http.kali.org/kali/pool/main/libs/libssh/libssh-4_0.8.5-1_amd64.deb  404  Not Found [IP: 192.99.200.113 80]
E: Failed to fetch http://http.kali.org/kali/pool/main/libs/libssh/libssh-dev_0.8.5-1_amd64.deb  404  Not Found [IP: 192.99.200.113 80]
E: Unable to fetch some archives, maybe run apt-get update or try with --fix-missing?

When I tried the update I got this error

root@kali:~# apt-get update
Get:1 http://kali.download/kali kali-rolling InRelease [30.5 kB]
Reading package lists... Done     
E: Release file for http://http.kali.org/kali/dists/kali-rolling/InRelease is not valid yet (invalid for another 41d 16h 53min 30s). Updates for this repository will not be applied.

When I ran date I realized is was many days behind

root@kali:~# date

The fix was to install ntpdate and run it

root@kali:~# apt-get install ntpdate
root@kali:~# ntpdate in.pool.ntp.org

Now my date was correct

root@kali:~# date

And now my installs worked

root@kali:~# apt-get install libssh-dev

Clipboard BiDirectional in Kali Linux VirtualBox stopped working

This fixed it for me

~# ps -ef | grep VBoxClient | grep clip

~# kill -9 [PIDs]

~# VBoxClient --clipboard

!!!then both bidirectional clipboards worked again!!!!

Sunday, December 23, 2018

kali metasploit website auxillary modules



use auxiliary/scanner/http/dir_listing

use auxiliary/scanner/http/dir_scanner

use auxiliary/scanner/http/files_dir


vmware tools kali linux vmplayer

if you got kali linux and the vmware tools isn't working in vmplayer follow these instructions

http://www.vmwarearena.com/how-to-install-vmware-tools-on-kali-linux/

basically
1.) in vmplayer, manage -> install vmware tools
2.) open cd rom in kali
3.) copy .tar.gz to kali
4.) extract the .tar.gz
5.) run the vmware-install.pl
6.) choose all the defaults
7.) boom, vmware tools works again (like copy & paste to/from host)

Saturday, December 22, 2018

apt-get update fails on Kali KEYEXPIRED

if

apt-get update

fails on Kali 

with an error like this

Get:1 http://kali.download/kali kali-rolling InRelease [30.5 kB]
Err:1 http://kali.download/kali kali-rolling InRelease
  The following signatures were invalid: KEYEXPIRED 1517583136  KEYEXPIRED 1517583136  KEYEXPIRED 1517583136  KEYEXPIRED 1517583136  KEYEXPIRED 1517583136
Fetched 30.5 kB in 8s (3,483 B/s)
Reading package lists... Done
W: An error occurred during the signature verification. The repository is not updated and the previous index files will be used. GPG error: http://kali.download/kali kali-rolling InRelease: The following signatures were invalid: KEYEXPIRED 1517583136  KEYEXPIRED 1517583136  KEYEXPIRED 1517583136  KEYEXPIRED 1517583136  KEYEXPIRED 1517583136
W: Failed to fetch http://http.kali.org/kali/dists/kali-rolling/InRelease  The following signatures were invalid: KEYEXPIRED 1517583136  KEYEXPIRED 1517583136  KEYEXPIRED 1517583136  KEYEXPIRED 1517583136  KEYEXPIRED 1517583136
W: Some index files failed to download. They have been ignored, or old ones used instead.


The fix appears to be these 2 commands that get new keys


wget https://http.kali.org/kali/pool/main/k/kali-archive-keyring/kali-archive-keyring_2018.1_all.deb
apt install ./kali-archive-keyring_2018.1_all.deb

Wednesday, October 31, 2018

kali maltego footprint L1

In kali in maltego, under Run Machine




there is a machine called "Footprint L1"



Which when you enter a single malicious domain it shows you a nice looking graph of things like
- sub domains
- related IP addresses
- related email addresses
- physical cities/countries of IP addresses

Which can be useful when mapping out an attacker