Since Kali Linux 2016 came out (also known as Kali Rolling), it seems that Official VirtualBox guest addition doesn’t work well anymore. It also created lots of confusion and debate as when someone asks for help, they don’t always specify which version of Kali they are using and that leads …
Read More »Find Linux Exploits by Kernel version
Sometimes it’s really hard to find the correct exploit for the device that you are pentesting. I found two good references that may be helpful or least will give you a good starting point. Both of these resources can suggest Linux exploits based on kernel version. The first one is …
Read More »Steganography in Kali Linux – Hiding data in image
Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. Generally, the hidden messages appear to be (or be part of) something else: images, articles, shopping lists, or some other cover text. This post would cover Steganography in Kali Linux – …
Read More »Steam boasts a total of 2155 Linux Games in 2016
Back in 1994 Dave D. Taylor ported the game Doom to Linux and new era started. Since then development studio Crack dot Com released Abuse, and later Quake was ported to Linux in 1996, once again by Dave D. Taylor working in his free time. The next big one was …
Read More »Kali Linux Cheat Sheet for Penetration Testers
Penetration testing (also called pen testing) is the practice of testing a computer system, network or Web application to find vulnerabilities that an attacker could exploit. Kali Linux Cheat Sheet for Penetration testers is a high level overview for typical penetration testing environment ranging from nmap, sqlmap, ipv4, enumeration, fingerprinting …
Read More »