Hardening Kali Linux for Advanced Penetration Testing and Cyber Security Work

Kali Linux, a powerful penetration testing and security auditing platform, is widely used by professionals in the field of cybersecurity. To ensure a secure and reliable environment, it is essential to harden Kali Linux, fortifying it against potential vulnerabilities and attacks. In this blog post, we will discuss effective techniques and best practices to harden Kali Linux for advanced penetration testing and cyber security work.

Continue reading “Hardening Kali Linux for Advanced Penetration Testing and Cyber Security Work”

How to install Kali Linux on an UBS Stick for Having a Mobile and Robust System in our Pockets?

Kali Linux is a popular operating system for penetration testing and ethical hacking. It comes with a variety of tools and features that can help you perform security assessments, vulnerability scans, network analysis, and more. But what if you want to have Kali Linux with you wherever you go, without carrying a laptop or installing it on your main machine? The solution is to install Kali Linux on an UBS stick and boot from it whenever you need it. This way, you can have a mobile and robust system in your pockets that can run on any compatible computer.

Continue reading “How to install Kali Linux on an UBS Stick for Having a Mobile and Robust System in our Pockets?”

How to install and manage VMWare Workstation Pro virtual machines?

If we want a cool personal lab environment, then we have to use cool tools and technology. Virtual machines are one of the best inventions for learning and practicing IT in isolated environments. We can simulate and test Operating System changes, kernel modifications and even network configurations from our chair on our PC or notebook. Let’s build a basic test lab!

Continue reading “How to install and manage VMWare Workstation Pro virtual machines?”

How to crack passwords with John the Ripper? Password hacking in real practice as an Ethical Hacker!

In the first part of this series we found out a user’s password with Hydra with simply attacking his account via SSH. It is a so called “dictionary attack”, and because of the lack of security measurements we could get into the remote system.

In this exercise we continue our Ethical Hacking journey and we will find a way to get root privileges on the remote machine. This is called privilege escalation.

Important note: cracking passwords in the wild is illegal! Do NOT do it out of the lab, unless you are a penetration tester with a signed contract!

Continue reading “How to crack passwords with John the Ripper? Password hacking in real practice as an Ethical Hacker!”

Fixing the “Error connecting…” issue in Kali KeX on WSL (updated: 2023. 01. 12.)

Requirements:

  • Kali distro is installed
  • KeX is installed
  • Kali is WSL version 2
  • Coffee is ready for consumption


Time to time the Kali desktop on WSL stops working and spits out the following message:

Error connecting to the KeX server.
Please try "kex start" to start the service.
If the server fails to start, please try "kex kill" or restart your WSL2 session and try again.

Of course the “solution” from the error message does not work.

Continue reading “Fixing the “Error connecting…” issue in Kali KeX on WSL (updated: 2023. 01. 12.)”

How to install a Debian Linux Penetration Testing machine?

There are excellent Linux distributions for Cyber Security professionals like Kali. They ship all the the bells and whistles that is needed for the tasks. If we want to learn how to put together our own Penetration Testing system we can use a fresh Debian Linux box. I created a small setup from the NetInstall iso starting from the defaults.

Continue reading “How to install a Debian Linux Penetration Testing machine?”