Skip to main content

Posts

A brief tutorial on GRUB boot loader

A boot loader is a software program that runs when a computer boot. It's responsible for loading and transferring control to an operating system kernel software. The kernel, in turn, initializes the rest of the operating system.  GRUB  ( GR and U nified B oot-loader) or GNU GRUB is a very powerful multi-boot loader, which can load a wide variety of free operating systems, as well as proprietary operating systems with chain-loading. GRUB is designed to address the complexity of booting a personal computer. One of the important features in GRUB is flexibility; GRUB understands filesystems and kernel executable formats, so you can load an arbitrary operating system the way you like, without recording the physical position of your kernel on the disk. Thus you can load the kernel just by specifying its file name and the drive and partition where the kernel resides. When booting with GRUB, you can use either a command-line interface or a menu interface . Using the command-line in...

Kali Linux's Penetration Testing Tools

Kali Linux is an advanced Penetration Testing and Security Auditing Linux distribution. It is the most advanced and versatile penetration testing distribution ever created. Kali Linux comes with bundles of penetration testing tools. In GUI, you can find these tools in drop-down menu list, i.e. Applications --> Kali Linux. The Top 10 Security Tools are in top list. Other tools are categorized according to their functionality.

What is SET?

SET stands for   Social Engineering Toolkit , primarily written by David Kennedy ( ReL1K ). The Social-Engineer Toolkit (SET) is specifically designed to perform advanced attacks against the human element. SET was designed to be released with the http://www.social-engineer.org launch and has quickly became a standard tool in a penetration testers arsenal. The attacks built into the toolkit are designed to be targeted and focused attacks against a person or organization used during a penetration test. To start SET , either you goto Applications --> Kali Linux --> Exploitation Tools --> Social Engineering Toolkit --> se-toolkit . (This command was valid till Kali Linux ver. 1.0.4, now it changed to setoolkit  in Kali Linux ver 1.0.5 and 1.0.6 ). or else, open terminal window and type se-toolkit ( for Kali Linux ver. 1.0.4 ) or setoolkit ( for Kali Linux ver. 1.0.5 and 1.0.6 ) . When you type this root terminal window, following are steps SET  perform...

FHS (File-system Hierarchy Standard) in Kali Linux

Filesystem Hierarchy Standard (FHS) defines the directory structure and directory contents in Linux operating systems. Based on Debian-package compliance, Kali Linux follows FHS . This means it allows all Linux users to easily locate binaries, support files, libraries, etc. Kali Linux has more than 300 penetration testing tools and you will be able to call any tool from anywhere on the system as every application is included in the system path. Unlike Backtrack, you do not have to navigate, just type the command name of the tool in root terminal and you are set to go.

WPScan in Kali Linux

WPScan is a WordPress vulnerability scanner written in ruby, which is capable of detecting common security vulnerabilities as well as listing all plugins used by a website hosting WordPress. WPScan is pre-installed in Kali Linux.  WPscan is a nice tool if you want to find out how to exploit a WordPress site as it does all of this: Username enumeration (Checks the ‘author’ query-string and the location header). Weak password cracking (This can be multi-threaded and supplied a password list of your choosing). Version enumeration (Finds what version of WordPress they are running by checking meta tags and client side files). Vulneralbility enumeration (Based on what version they are running). Timbthumb file enumeration (Checks for Timthumb exploit). Plugin enumeration (See what plugins they are running). Plugin vulneralbility enumeration (Tells you which, if any, plugins are vulnerable to exploits). Theme enumeration (What theme are they running. Sometimes you can find exploits in the...