Ghost Phisher - Kali Linux

Ghost Phisher – Kali Linux

Ghost Phisher - Kali Linux - solution rider
Ghost Phisher is a popular tool that helps to create fake wireless access points and then later to create Man-in-The-Middle-Attack.
Step 1 − To open it, click Applications → Wireless Attacks → “ghost phishing”.
Ghost Phisher - Kali Linux - solution rider

Step 2 − After opening it, we will set up the fake AP using the following details.
  • Wireless Interface Input: wlan0
  • SSID: wireless AP name
  • IP address: IP that the AP will have
  • WAP: Password that will have this SSID to connect
Ghost Phisher - Kali Linux - solution rider

Step 3 − Click the Start button.

from Blogger http://thesolutionrider.blogspot.com/2018/01/ghost-phisher-kali-linux.html

Armitage - Kali Linux

Armitage – Kali Linux

Armitage - Kali Linux - solution rider
Armitage GUI for metasploit is a complement tool for metasploit. It visualizes targets, recommends exploits, and exposes the advanced post-exploitation features.
Let’s open it, but firstly metasploit console should be opened and started. To open Armitage, go to Applications → Exploit Tools → Armitage.
Armitage - Kali Linux - the solution rider

Click the Connect button, as shown in the following screenshot.
Armitage - Kali Linux - solution rider

When it opens, you will see the following screen.
Armitage - Kali Linux - solutionrider

Armitage is user friendly. The area “Targets” lists all the machines that you have discovered and you are working with, the hacked targets are red in color with a thunderstorm on it.
After you have hacked the target, you can right-click on it and continue exploring with what you need to do such as exploring (browsing) the folders.
Armitage - Kali Linux - solutionrider

In the following GUI, you will see the view for the folders, which is called console. Just by clicking the folders, you can navigate through the folders without the need of metasploit commands.
On the right side of the GUI, is a section where the modules of vulnerabilities are listed.
Armitage - Kali Linux - thesolutionrider

from Blogger http://thesolutionrider.blogspot.com/2018/01/armitage-kali-linux.html

Wireshark - Sniffing & Spoofing - Kali Linux

Wireshark – Sniffing & Spoofing – Kali Linux

Wireshark - Sniffing & Spoofing - Kali Linux - solution rider
Wireshark is one of the best data packet analyzers. It analyzes deeply the packets in frame level. You can get more information on Wireshark from their official webpage: https://www.wireshark.org. In Kali, it is found using the following path – Applications → Sniffing & Spoofing → wireshark.
Wireshark - Sniffing & Spoofing - Kali Linux - solution rider

Once you click wireshark, the following GUI opens up.
Wireshark - Sniffing & Spoofing - Kali Linux - solution rider

Click “Start” and the packet capturing will start as shown in the following screen-shot.
Wireshark - Sniffing & Spoofing - Kali Linux - solution rider

from Blogger http://thesolutionrider.blogspot.com/2018/01/wireshark-sniffing-spoofing-kali-linux.html

ddrescue - Kali Linux

ddrescue – Kali Linux

ddrescue - Kali Linux -solution rider

It copies data from one file or block device (hard disc, cdrom, etc.) to another, trying to rescue the good parts first in case of read errors.

The basic operation of ddrescue is fully automatic. That is, you don’t have to wait for an error, stop the program, restart it from a new position, etc.
If you use the mapfile feature of ddrescue, the data is rescued very efficiently (only the needed blocks are read). Also, you can interrupt the rescue at any time and resume it later at the same point. The mapfile is an essential part of ddrescue’s effectiveness. Use it unless you know what you are doing.
The command line is −
dd_rescue infilepath  outfilepath
Parameter “–v” means verbose. “/dev/sdb” is the folder to be rescued. The img file is the recovered image.
ddrescue - Kali Linux solution rider

from Blogger http://thesolutionrider.blogspot.com/2018/01/ddrescue-kali-linux.html

Dumpzilla - Kali Linux

Dumpzilla – Kali Linux

Dumpzilla - Kali Linux - solution rider

Dumpzilla application is developed in Python 3.x and has as purpose extract all forensic interesting information of Firefox, Iceweasel and Seamonkey browsers to be analyzed. Due to its Python 3.x developement, might not work properly in old Python versions, mainly with certain characters. Works under Unix and Windows 32/64 bits systems. Works in command line interface, so information dumps could be redirected by pipes with tools such as grep, awk, cut, sed… Dumpzilla allows to visualize following sections, search customization and extract certain content.
Cookies + DOM Storage (HTML 5).

  • User preferences (Domain permissions, Proxy settings…).
  • Downloads.
  • Web forms (Searches, emails, comments..).
  • Historial.
  • Bookmarks.
  • Cache HTML5 Visualization / Extraction (Offline cache).
  • visited sites “thumbnails” Visualization / Extraction .
  • Addons / Extensions and used paths or urls.
  • Browser saved passwords.
  • SSL Certificates added as a exception.
  • Session data (Webs, reference URLs and text used in forms).
  • Visualize live user surfing, Url used in each tab / window and use of forms.

Dumpzilla will show SHA256 hash of each file to extract the information and finally a summary with totals.
Sections which date filter is not possible: DOM Storage, Permissions / Preferences, Addons, Extensions, Passwords/Exceptions, Thumbnails and Session

Source: http://www.dumpzilla.org/Manual_dumpzilla_en.txt
Dumpzilla Homepage | Kali Dumpzilla Repo

from Blogger http://thesolutionrider.blogspot.com/2018/01/dumpzilla-kali-linux.html