Security of Information, Threat Intelligence, Hacking, Offensive Security, Pentest, Open Source, Hackers Tools, Leaks, Pr1v8, Premium Courses Free, etc

  • Penetration Testing Distribution - BackBox

    BackBox is a penetration test and security assessment oriented Ubuntu-based Linux distribution providing a network and informatic systems analysis toolkit. It includes a complete set of tools required for ethical hacking and security testing...
  • Pentest Distro Linux - Weakerth4n

    Weakerth4n is a penetration testing distribution which is built from Debian Squeeze.For the desktop environment it uses Fluxbox...
  • The Amnesic Incognito Live System - Tails

    Tails is a live system that aims to preserve your privacy and anonymity. It helps you to use the Internet anonymously and circumvent censorship...
  • Penetration Testing Distribution - BlackArch

    BlackArch is a penetration testing distribution based on Arch Linux that provides a large amount of cyber security tools. It is an open-source distro created specially for penetration testers and security researchers...
  • The Best Penetration Testing Distribution - Kali Linux

    Kali Linux is a Debian-based distribution for digital forensics and penetration testing, developed and maintained by Offensive Security. Mati Aharoni and Devon Kearns rewrote BackTrack...
  • Friendly OS designed for Pentesting - ParrotOS

    Parrot Security OS is a cloud friendly operating system designed for Pentesting, Computer Forensic, Reverse engineering, Hacking, Cloud pentesting...
Showing posts with label Os Sec. Show all posts
Showing posts with label Os Sec. Show all posts

Sunday, July 8, 2018

Security Onion - Linux Distro For IDS, NSM, And Log Management


Security Onion is a free and open source Linux distribution for intrusion detection, enterprise security monitoring, and log management. It includes Elasticsearch, Logstash, Kibana, Snort, Suricata, Bro, OSSEC, Sguil, Squert, NetworkMiner, and many other security tools. The easy-to-use Setup wizard allows you to build an army of distributed sensors for your enterprise in minutes!

Security-onion project
This repo contains the ISO image, Wiki, and Roadmap for Security Onion.

Looking for documentation?
Please proceed to the Wiki.

Screenshots








Share:

Thursday, January 25, 2018

Security Oriented GNU/Linux Distribution - Parrot Security 3.10


Security GNU/Linux distribution designed with cloud pentesting and IoT security in mind.

It includes a full portable laboratory for security and digital forensics experts, but it also includes all you need to develop your own softwares or protect your privacy with anonymity and crypto tools.

Details

Security

Parrot Security includes a full arsenal of security oriented tools to perform penetration tests, security audits and more. With a Parrot usb drive in your pocket you will always be sure to have all you need with you.

Privacy

Parrot includes by default TOR, I2P, anonsurf, gpg, tccf, zulucrypt, veracrypt, truecrypt, luks and many other tecnologies designed to defend your privacy and your identity.

Development

If you need a comfortable environment with updated frameworks and useful libraries already installed, Parrot will amaze you as it includes a full development-oriented environment with some powerful editors and IDEs pre-installed and many other tools installable from our repository.

Features

System Specs
  • Debian GNU/Linux 9 (stretch)
  • Custom hardened Linux 4.8 kernel
  • Rolling release updates
  • Powerful worldwide mirror servers
  • High hardware compatibility
  • Community-driven development
  • free(libre) and open source project

Cryptography

Parrot includes many cryptographic softwares which are extremely useful when it comes to protect your confidential data and defend your privacy.

Parrot includes several cryptographic front-ends to work both with symmetric and asymmetric encryption, infact it natively supports volumes encryption with LUKS, TrueCrypt, VeraCrypt and the hidden TrueCrypt/VeraCrypt volumes with nested algorythms support.

The whole system can be installed inside an encrypted partition to protect your computer in case of theft.

Another swiss army knife of your privacy is GPG, the GNU Privacy Guard, an extremely powerful PGP software that lets you create a private/public pair of keys to apply digital signatures to your messages and to allow other people to send you encrypted messages that only your private key can decrypt, in can also handle multiple identities and subkeys, and its power resides in its ring of trust as PGP users can sign each other's keys to make other people know if a digital identity is valid or not.

Even our software repository is digitally signed by GPG, and the system automatically verifies if an update was altered or compromised and it refuses to upgrade or to install new software if our digital signature is not found or not valid.

Privacy

Your privacy is the most valuable thing you have in your digital life and the whole Parrot Team is exaggeratedly paranoid when it comes to users privacy, infact our system doesn't contain tracking systems, and it is hardened in deep to protect users from prying eyes.

Parrot has developed and implemented several tricks and softwares to achieve this goal, and AnonSurf is one of the most important examples, it is a software designed to start TOR and hijack all the internet traffic made by the system through the TOR network, we have also modified the system to make it use DNS servers different from those offered by your internet provider.

Parrot also includes torbrowser, torchat and other anonymous services, like I2P, a powerful alternative to TOR.

Programming

The main goal of an environment designed by hackers for hackers is the possibility to change it, adapt it, transform it and use it as a development platform to create new things, this is why Parrot comes out of the box with several tools for developers such as compilers, disassemblers, IDEs, comfortable editors and powerful frameworks.

Parrot includes QTCreator as its main C, C++ and Qt framework. Another very useful tool is Geany, a lightweight and simple IDE which supports a huge amount of programming languages, while we also include Atom, the opensource editor of the future developed by GitHub, and many compilers and interpreters with their most important libraries are pre-installed and ready to use.


And of course many other editors, development softwares and libraries are available through our software repository where we keep all the development tools always updated to their most cutting edge but reliable version.

Changelog

The first big news is the introduction of a full firejail+apparmor sandboxing system to proactively protect the OS by isolating its components with the combination of different tecniques. The first experiments were already introduced in Parrot 3.9 with the inclusion of firejail.

In Parrot 3.10 also introduced the new Firefox 57 (Quantum) that landed on Parrot very naturally with a complete browser restyle.


The other big news is the introduction of the latest Linux 4.14 kernel, and it is a very important improvement for us because of the awesome features of this new kernel release and its improved hardware support.

Some pentest tools received some important upstream updates, like metasploit-framework, that reached its 4.21 version, or maltegoce and casefile that were merged into a unique launcher provided by the new maltego 4.1.

To upgrade the system, open a terminal window and type the following command
sudo apt update && sudo apt full-upgrade


Share:

Friday, April 28, 2017

Kali Linux 2017.1 Release



Kali Linux is a Debian-based distribution for digital forensics and penetration testing, developed and maintained by Offensive Security. Mati Aharoni and Devon Kearns rewrote BackTrack. Kali Linux is the most versatile and advanced penetration testing tool release operating system. Kali tools are often updated and can be used on other platforms, such as VMware and ARM.

Today, Offensive Security has been released Kali Linux 2017.1.

What’s new?

Support for RTL8812AU Wireless Card Injection
Streamlined Support for CUDA GPU Cracking
Amazon AWS and Micsosoft Azure Availability (GPU Support)
OpenVAS 9 Packaged in Kali Repositories
More info, please visit Kali Linux home page.

How to update to Kali Linux 2017.1

Open terminal and run command
apt update

apt dist-upgrade

reboot
If you want to download Kali Linux image for fresh installing, you can download Kali Linux 2017.1 here
Share:

Wednesday, December 7, 2016

BackBox Linux 4.7 released!




BackBox Linux 4.7 released!


The BackBox Team is pleased to announce the updated release of BackBox Linux, the version 4.7.

We thought to release a new minor version to give our users the opportunity to have a stable and up-to-date sytem till the next official major release, i.e. BackBox 5, stilll under development.

In this release we have fixed some minor bugs, updated the kernel stack, base system and tools.

The ISO images for 32bit & 64bit can be downloaded from the official web site download section:

BackBox

What's new

Updated Linux Kernel 4.4
Updated hacking tools: beef, metasploit, openvas, setoolkit, sqlmap, wpscan, etc.

System requirements

32-bit or 64-bit processor
1024 MB of system memory (RAM)
10 GB of disk space for installation
Graphics card capable of 800×600 resolution
DVD-ROM drive or USB port (3 GB)

Upgrade instructions

To upgrade from a previous version (BackBox 4.x) follow these instructions:



sudo apt-get update

sudo apt-get dist-upgrade

sudo apt-get install -f



sudo apt-get install --install-recommends linux-generic-lts-xenial xserver-xorg-core-lts-xenial xserver-xorg-lts-xenial xserver-xorg-video-all-lts-xenial xserver-xorg-input-all-lts-xenial libwayland-egl1-mesa-lts-xenial



sudo apt-get install ruby ruby-dev ruby2.1 ruby2.1-dev ruby2.2-dev ruby2.2 --reinstall

sudo apt-get purge ri1.9.1 ruby1.9.1 bundler libruby2.0 ruby2.0 ruby2.0-dev libruby1.9.1 ruby-full

sudo gem cleanup

sudo rm -rf /var/lib/gems/1.*

sudo rm -rf /var/lib/gems/2.0.*

sudo apt-get install backbox-default-settings backbox-desktop backbox-menu backbox-tools --reinstall

sudo apt-get install beef-project metasploit-framework whatweb wpscan setoolkit --reinstall

sudo apt-get autoremove --purge

sudo apt-get install openvas sqlite3

sudo openvas-launch sync

sudo openvas-launch start

sudo update-rc.d apache2 disable

sudo update-rc.d polipo disable

sudo update-rc.d openvas-gsa disable

sudo update-rc.d openvas-manager disable

sudo update-rc.d openvas-scanner disable



sudo apt-get autoremove --purge


Share:

Friday, November 18, 2016

Lightweight and Powerful Penetration Testing OS - DracOS



Dracos Linux ( www.dracos-linux.org ) is the Linux operating system from Indonesian , open source is built based on the Linux From Scratch under the protection of the GNU General Public License v3.0. This operating system is one variant of Linux distributions, which is used to perform security testing (penetration testing). Dracos linux in Arm by hundreds hydraulic pentest, forensics and reverse engineering. Does not use a GUI-based tools-tools and just have the software using the CLI (command line interface) to perform its operations. Now Dracos currently already up to version 2.0 with the code name "Leak".

Screenshot

Teaser

As the target of development

Education
Dracos Linux is purposed as an educational,especially to recognize the operation system of linux and we respect ethical hacking.

Build from source
had always been built from codes instead of installer,this will stimulate users in indonesia to stay creative and to build the spirit of opensource.

Repository
even though proportionally based on codes,Dracos Linux still intends to construct the repository to build up the processes Like Venomizer

Heavy Control
We need to recognize this operating system Very Dificult Because Dracos in build from source code, thus forcing us to compile when installing a package or software, which of course will arise the possibility of system failure and other system vulnerabilities.

Always from terminal
None of every singel tool that was installed inside the OS uses GUI. CLI will always consider to particularly openbox to ease the users in need of multi terminal in applying Penetration Testing

Penetration Tools List
Link : http://dev.dracos-linux.org/projects/dracoslinux/wiki/Penetration_Testing
  • Information Gathering
  • Vulnerability Assessment
  • Web Attack
  • Exploitation Testing
  • Privilege Escalation
  • Password Attack
  • Social Engineering
  • Man In The Middle Attack
  • Stress Testing
  • Wireless Attack
  • Maintaining Access
  • Forensics Tools
  • Reverse Engineering
  • Malware Analysis
  • Covering Track

Share:

Saturday, September 10, 2016

The Best Penetration Testing Distribution - Kali Linux 2016.2



This release brings a whole bunch of interesting news and updates into the world of Kali.

New KDE, MATE, LXDE, e17, and Xfce Builds

Although users are able to build and customize their Kali Linux ISOs however they wish, we often hear people comment about how they would love to see Kali with $desktop_environment instead of GNOME. We then engage with those people passionately, about how they can use live-build to customize not only their desktop environment but pretty much every aspect of their ISO, together with the ability to run scripted hooks at every stage of the ISO creation process – but more often than not, our argument is quickly lost in random conversation. As such, we’ve decided to expand our “full” 64bit releases with additional Desktop Environment flavored ISOs, specifically KDE, Mate, LXDE and Enlightenment. These can now be downloaded via our Kali Download page. For those curious to see what the various Desktop Environments look like, we’ve taken some screenshots for you:

Gnome

E17

KDE

LXDE

Mate

Xfce

Kali Linux Weekly ISOs

Constantly keeping Kali on the bleeding edge means frequent updates to packages on an ongoing basis. Since our last release several months ago, there’s a few hundred new or updated packages which have been pushed to the Kali repos. This means that anyone downloading an ISO even 3 months old has somewhat of a long “apt-get dist-upgrade” ahead of them. To help avoid this situation, from this release onwards, we’ll be publishing updated weekly builds of Kali that will be available to download via our mirrors. Speaking of mirrors, we are always in need of support in this area – if you’re capable of running a high-bandwidth mirror and would like to support our project, please check out our Kali Mirrors page.

Bug Fixes and OS Improvements

During these past few months, we’ve been busy adding new relevant tools to Kali as well as fixing various bugs and implementing OS enhancements. For example, something as simple as adding HTTPS support in busybox now allows us to preseed Kali installations securely over SSL. This is a quick and cool feature to speed up your installations and make them (almost) unattended, even if you don’t have a custom built ISO.


To set a preseed file during an install process, choose the “install” option, then hit “tab” and enter the preseed directive, together with a URL pointing to your actual preseed file.
preseed/url=https://www.kali.org/dojo/preseed.cfg

Read more here.


Share:

Saturday, July 30, 2016

Penetration Testing Operating system based on Ubuntu - LionSec Linux 5.0



LionSec Linux 5.0 is a Ubuntu based penetration testing distribution . It was built in order to perform Computer Forensics , Penetration Tests , Wireless Analysis . With the "Anonymous Mode" , you can browse the internet or send packets anonymously . There are lots of inbuilt tools like netool ,websploit , burpsuite , web analysis tools , social engineering tools and other pentesting tools . .

Minimum System Requirements

  • 1.7 GHz processor (for example Intel Celeron) or better.
  • 2.0 GB RAM (system memory).
  • 8 GB of free hard drive space for installation.
  • Either a CD/DVD drive or a USB port for the installer media.
  • Internet access is helpful (for installing updates during the installation process).
If you have an old machine, you may consider other alternative like LionSec Linux 3.1

 LionSec Linux 5.0 Teaser

Screenshots






Share:

Thursday, July 28, 2016

Pentest Security OS - ParrotOS 3.7



Parrot Security OS is a cloud friendly operating system designed for Pentesting, Computer Forensic, Reverse engineering, Hacking, Cloud pentesting, privacy/anonimity and cryptography. Based on Debian and developed by Frozenbox network.

Who can use it

Parrot is designed for everyone, from the Pro pentester to the newbie, because it provides the most professional tools combined in a easy to use, fast and lightweight pentesting environment, and it can be used also for an everyday use.

Features:

System Specs

  • Debian jessie core
  • Custom hardened linux 4.5 kernel
  • Rolling release upgrade line
  • MATE desktop environment
  • Lightdm Dislpay Manager
  • Custom themes, icons and wallpapers
    Cloud
    • Parrot Server Edition
    • Parrot Cloud Controller
    • Parrot VPS Service
    • Custom installation script for Debian VPS
    Digital Forensic
    • "Forensic" boot option to avoid boot automounts
    • Most famous Digital Forensic tools and frameworks out of the box
    • Reliable acquisition and imaging tools
    • Top class analysis softwares
    • Evidence management and reporting tools
    • Disabled automount
    • Software blockdev write protection system
    Cryptography
    • Custom Anti Forensic tools
    • Custom interfaces for GPG
    • Custom interfaces for cryptsetup
    • Support for LUKS, Truecrypt and VeraCrypt
    • NUKE patch for cryptsetup LUKS disks
    • Encrypted system installation
    Anonymity
    • AnonSurf
    • Entire system anonymization
    • TOR and I2P out of the box
    • DNS requests anonymization
    • "Change Identity" function for AnonSurf
    • BleachBit system cleaner
    • NoScript plugin
    • UserAgentOverrider plugin
    • Browser profile manager
    • RAM-only browser profile
    • Pandora's Box - RAM cleaner
    • Hardened system behaviour
    Programming
    • FALCON Programming Language (1.0)
    • System editor tuned for programming
    • Many compilers and debuggers available
    • Reverse Engineering Tools
    • Programming Template Files
    • Pre-installed most-used libs
    • Full Qt5 development framework
    • Full .net/mono development framework
    • Development frameworks for embedded devices


      Share:

      Friday, July 8, 2016

      Anonymous Operating System - Whonix 13



      Whonix is a desktop operating system designed for advanced security and privacy. It realistically addresses attacks while maintaining usability. It makes online anonymity possible via fail-safe, automatic, and desktop-wide use of the Tor network. A heavily reconfigured Debian base is run inside multiple virtual machines, providing a substantial layer of protection from malware and IP leaks. Pre-installed applications, pre-configured with safe defaults are ready for use. Additionally, installing custom applications or personalizing the desktop will in no way jeopardize the user. Whonix is the only actively developed OS designed to be run inside a VM and paired with Tor.

      Whonix consists of two parts: One solely runs Tor and acts as a gateway, which we call Whonix-Gateway. The other, which we call Whonix-Workstation, is on a completely isolated network. Only connections through Tor are possible. With Whonix, you can use applications and run servers anonymously over the internet. DNS leaks are impossible, and not even malware with root privileges can find out the user's real IP.



       Whonix benefits anyone who does sensitive work on their desktop or online. This includes:
      • Investigators and whistleblowers whose work threatens the powerful.
        • Within an isolated environment, research and evidence can be gathered without accidental exposure.
      • Researchers, government officials, or businesspeople who may be targets of espionage.
        • Anti-malware and anti-exploit modifications lower the threat of trojans and backdoors.
      • Journalists who endanger themselves and their families by reporting on organized crime.
        • Compartmentalized, anonymous internet use prevents identity correlation between social media (and other) logins.
      • Political activists under targeted surveillance and attack.
        • The usefulness of threatening the ISP in order to analyze a target's internet use will be severely limited. The cost of targeting a Whonix user is greatly increased.
      • Average computer users in a repressive or censored environment.
        • Easy Tor setup (and options for advanced setups) gives users in repressive countries full internet access desktop-wide, not just in their browser.
      • Average computer users who simply don’t want all or some aspect of their private lives uploaded, saved, and analyzed.
        • Whonix does not silently upload identifying information in the background.

      Qubes-Whonix:
      Either start with fresh templates. I.e. uninstall qubes-template-whonix-gw and qubes-template-whonix-ws. Then, to install, run in dom0:
      sudo qubes-dom0-update --enablerepo=qubes-tempates-community qubes-template-whonix-gw qubes-template-whonix-ws

      Or you can also upgrade from Whonix’s repository. Please refer to the following instructions:
      https://www.whonix.org/wiki/Upgrading_Whonix_12_to_Whonix_13


      Non-Qubes-Whonix:

      https://www.whonix.org/wiki/Download

      Or you can also upgrade from Whonix’s repository. Please refer to the following instructions:
      https://www.whonix.org/wiki/Upgrading_Whonix_12_to_Whonix_13

      Whonix 12 -> 13 changes:
      https://phabricator.whonix.org/maniphest/query/TfpGK0Sq8w1j/#R
      Share:

      Monday, June 27, 2016

      Security Layer for Arch Linux - ArchStrike




      An Arch Linux repository for security professionals and enthusiasts.

      Done the Arch Way and optimized for i686, x86_64, ARMv6, and ARMv7.

      ArchStrike is a penetration testing and security layer on top of Arch Linux. We follow the Arch Linux standards very closely in order to keep our packages clean, proper and easy to maintain.

      The team is working very hard to maintain the repository and give you the best ArchStrike experience.


      FAQ

      Q: What difference does ArchStrike have from other penetration distributions?
      A: We are a layer on top of ArchLinux that you can install and remove easily. We try and follow the Arch Linux standards when making our packages.
      Q: Do you have an ISO?
      A: As of yet, we do not have an ISO, although our team is working on an ISO to be released as you are reading this. Updates on the ISO will be made on twitter and our website.



      Share:

      The Amnesic Incognito Live System - Tails 2.4




      Tails is a live system that aims to preserve your privacy and anonymity. It helps you to use the Internet anonymously and circumvent censorship almost anywhere you go and on any computer but leaving no trace unless you ask it to explicitly.

      It is a complete operating system designed to be used from a DVD, USB stick, or SD card independently of the computer's original operating system. It is Free Software and based on Debian GNU/Linux.

      Tails comes with several built-in applications pre-configured with security in mind: web browser, instant messaging client, email client, office suite, image and sound editor, etc.


      New features

      • We enabled the automatic account configuration of Icedove which discovers the correct parameters to connect to your email provider based on your email address. We improved it to rely only on secure protocol and we are working on sharing these improvements with Mozilla so that users of Thunderbird outside Tails can benefit from them as well.

      Upgrades and changes

      • Update Tor Browser to 6.0.1, based on Firefox 45.
      • Remove the preconfigured #tails IRC channel. Join us on XMPP instead!
      • Always display minimize and maximize buttons in titlebars. (#11270)
      • Remove GNOME Tweak Tool and hledger. You can add them back using the Additional software packages persistence feature.
      • Use secure HKPS OpenPGP key server in Enigmail.
      • Harden our firewall by rejecting RELATED packets and restricting Tor to only send NEW TCP syn packets. (#11391)
      • Harden our kernel by:
        • Setting various security-related kernel options: slab_nomerge slub_debug=FZ mce=0 vsyscall=none. (#11143)
        • Removing the .map files of the kernel. (#10951)

      Fixed problems

      • Update the DRM and Mesa graphical libraries. This should fix recent problems with starting Tails on some hardware. (#11303)
      • Some printers that stopped working in Tails 2.0 should work again. (#10965)
      • Enable Packetization Layer Path MTU Discovery for IPv4. This should make the connections to obfs4 Tor bridges more reliable. (#9268)
      • Fix the translations of Tails Upgrader. (#10221)
      • Fix displaying the details of a circuit in Onion Circuits when using Tor bridges. (#11195)
      For more details, read our changelog.

      Known issues

      • The automatic account configuration of Icedove freezes when connecting to some email providers. (#11486)
      • In some cases sending an email with Icedove results in the error: "The message could not be sent using Outgoing server (SMTP) mail.riseup.net for an unknown reason." When this happens, simply click "Ok" and try again and it should work. (#10933)
      • The update of the Mesa graphical library introduce new problems at least on AMD HD 7770 and nVidia GT 930M.


      See the list of long-standing issues.




      Share:

      Sunday, June 26, 2016

      Advanced Pentest System - Parrot OS 3.0 (Lithium)



      Parrot Security OS is a cloud friendly operating system designed for Pentesting, Computer Forensic, Reverse engineering, Hacking, Cloud pentesting, privacy/anonimity and cryptography. Based on Debian and developed by Frozenbox network.

      Who can use it

      Parrot is designed for everyone, from the Pro pentester to the newbie, because it provides the most professional tools combined in a easy to use, fast and lightweight pentesting environment, and it can be used also for an everyday use.

      Features:

      System Specs
      • Debian jessie core
      • Custom hardened linux 4.5 kernel
      • Rolling release upgrade line
      • MATE desktop environment
      • Lightdm Dislpay Manager
      • Custom themes, icons and wallpapers
      System Requirements
      • CPU: at least 1Ghz dual core cpu
      • ARCH: 32bit, 64bit and ARMhf
      • RAM: 256Mb - 512Mb suggested
      • GPU: No graphic acceleration required
      • HDD Standard: 6Gb used - 8Gb suggested
      • HDD Full: 8Gb used - 16Gb suggested
      • BOOT: Legacy bios or UEFI (testing)
        Cloud
        • Parrot Server Edition
        • Parrot Cloud Controller
        • Parrot VPS Service
        • Custom installation script for Debian VPS
        Digital Forensic
        • "Forensic" boot option to avoid boot automounts
        • Most famous Digital Forensic tools and frameworks out of the box
        • Reliable acquisition and imaging tools
        • Top class analysis softwares
        • Evidence management and reporting tools
        • Disabled automount
        • Software blockdev write protection system
        Cryptography
        • Custom Anti Forensic tools
        • Custom interfaces for GPG
        • Custom interfaces for cryptsetup
        • Support for LUKS, Truecrypt and VeraCrypt
        • NUKE patch for cryptsetup LUKS disks
        • Encrypted system installation
        Anonymity
        • AnonSurf
        • Entire system anonymization
        • TOR and I2P out of the box
        • DNS requests anonymization
        • "Change Identity" function for AnonSurf
        • BleachBit system cleaner
        • NoScript plugin
        • UserAgentOverrider plugin
        • Browser profile manager
        • RAM-only browser profile
        • Pandora's Box - RAM cleaner
        • Hardened system behaviour
        Programming
        • FALCON Programming Language (1.0)
        • System editor tuned for programming
        • Many compilers and debuggers available
        • Reverse Engineering Tools
        • Programming Template Files
        • Pre-installed most-used libs
        • Full Qt5 development framework
        • Full .net/mono development framework
        • Development frameworks for embedded devices

          Share:

          Tuesday, May 10, 2016

          Penetration Testing Distribution - BlackArch Linux v2017.06.14




          BlackArch Linux is an Arch Linux-based distribution for penetration testers and security researchers. The repository contains 1410 tools. You can install tools individually or in groups. BlackArch Linux is compatible with existing Arch installs.

          ChangeLog:

          • added new (improved) BlackArch Linux installer
          • include linux kernel 4.5.1
          • added new blackarch linux installer
          • fixed an EFI boot issue
          • fixed the well-known i686 boot issue
          • added more than 80 new tools
          • updated all blackarch tools
          • updated all system packages
          • updated menu entries for window managers (awesome, fluxbox, openbox)

          Installing on top of ArchLinux

          BlackArch Linux is compatible with existing/normal Arch installations. It acts as an unofficial user repository. Below you will find instructions on how to install BlackArch in this manner.


          # Run https://blackarch.org/strap.sh as root and follow the instructions.
          $ curl -O https://blackarch.org/strap.sh
            
          # The SHA1 sum should match: 86eb4efb68918dbfdd1e22862a48fda20a8145ff
          $ sha1sum strap.sh
            
          # Set execute bit
          $ chmod +x strap.sh
            
          # Run strap.sh
          $ sudo ./strap.sh

          You may now install tools from the blackarch repository.

          # To list all of the available tools, run
          $ sudo pacman -Sgg | grep blackarch | cut -d' ' -f2 | sort -u
           
          # To install all of the tools, run
          $ sudo pacman -S blackarch
            
          # To install a category of tools, run
          $ sudo pacman -S blackarch-<category>
          
          # To see the blackarch categories, run
          $ sudo pacman -Sg | grep blackarch

          As part of an alternative method of installation, you can build the blackarch packages from source. You can find the PKGBUILDs on github. To build the entire repo, you can use the blackman tool.
          # First, you must install blackman.

          If the BlackArch package repository is setup on your machine,
          
          # you can install blackman like:
          $ sudo pacman -S blackman
          
          # Download, compile and install package:
          $ sudo blackman -i <package>
           
          # Download, compile and install whole category
          $ sudo blackman -g <group>
            
          # Download, compile and install all BlackArch tools
          $ sudo blackman -a
            
          # To list blackarch categories
          $ blackman -l
            
          # To list category tools
          $ blackman -p <category>                                 


          Installing from ISO

          You can install BlackArch Linux (packages AND environment) using the Live or Netinstall medium.



          # Install blackarch-install-scripts package
          $ sudo pacman -S blackarch-install-scripts
            
          # Now, you can run and follow the instructions
          $ sudo blackarch-install 


          Share:
          Copyright © Offensive Sec Blog | Powered by OffensiveSec
          Design by OffSec | Theme by Nasa Records | Distributed By Pirate Edition