• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
kalitut

kalitut

KaliTut Where you learn about Kali Linux tips and Linux system

  • Home
  • Raspberry Pi
  • About us
  • Privacy Policy

Setting up your hacking attempt – information gathering

July 1, 2018 by Kalitut 1 Comment

information gathering is the most important part and where every hacker should start, Many beginners thought that there was a special, premeditated way to ‘hack’ everything or ‘something’.

information gathering

The reality is slightly more complicated. There is no ‘how should I hack’ that is prescribed on forums. You have to figure it out yourself as a hacker, and the tools and skills to figure out how to hack something you can find online. After all, if there was a known Facebook hack, Facebook would have ensured that the leak was closed.

[Read more…] about Setting up your hacking attempt – information gathering

Filed Under: Tutorials

Fix This this kernel requires an x86-64 cpu but only detected an i686 cpu

July 10, 2016 by Kalitut 19 Comments

this kernel requires an x86-64 cpu, but only detected an i686 CPU.
Trying to install kali Linux or Ubuntu on Oracle VirtualBox or VMware?
but when running the virtual machine you got this message ” This kernel requires an x86-64 CPU, but only detected an i686 CPU. Unable to boot – please use a kernel appropriate for your CPU “.

this kernel requires an x86-64 cpu but only detected an i686 cpu

Case one There is many case you are receiving this message for but the most common one can be fixed from your bios settings on intel CPU you have to enable ” Intel Virtualization Technology ” and on AMD CPU you have to enable “AMD V” this will simply fix this error

[Read more…] about Fix This this kernel requires an x86-64 cpu but only detected an i686 cpu

Filed Under: Tutorials

infernal twin Automated Evil Twin Attack

January 4, 2016 by Kalitut 3 Comments

Automated Evil Twin Attack: infernal-twin

What is evil twin attack?
Evil twin is a term for a fake WiFi access point, it appears to be a legitimate one offered on the premises, but it has been set up to snoop “spy” on your wireless communications.
An evil twin is also called wifiphisher it’s the wireless version of the phishing scam that hackers use to hack online accounts
The attacker fools wireless users to make them connect to a tainted hotspot by posing as a legitimate provider.

evil twin attack kali

This type of fake wifi attack may be used to steal the passwords of the users by either snooping the communication link or by phishing, which involves setting up a fraudulent web site and luring people there in a simple word it’s wifi phisher

[Read more…] about infernal twin Automated Evil Twin Attack

Filed Under: Tutorials Tagged With: infernal twin

Password dictionary where to download and how to make them

December 18, 2015 by Kalitut 72 Comments

One of the types of attacks used by Atomic password recovery programs is dictionary attack . In this case, the program sequentially checks all possible passwords stored in special files called password dictionary. Typically, dictionaries store frequently used passwords and familiar words, such as names and place names. Password Dictionaries may contain words from various languages ​​of the world. Password crackers check them one by one in search of a suitable one.

rockyou password list

If you decide to use dictionary attack, you will need some basic dictionaries.

[Read more…] about Password dictionary where to download and how to make them

Filed Under: Tutorials Tagged With: Password dictionary

How To View Block Devices And File System Under RHEL7

December 29, 2014 by Kalitut Leave a Comment

Under RHEL7 view block devices filesystem is more or less same as we used to do it under RHEL6. Lets understand some interesting commands to view block devices and filesystem under RHEL7.

viewblockdevicesrhel7-4672435

lsblk:
lsblk command allows you to display a list of available block devices.

selection_195-300x143-8591423

lsblk command displays the device name (NAME), major and minor device number (MAJ:MIN), if the device is removable (RM), what is its size (SIZE), if the device is read-only (RO), what type is it (T YPE), and where the device is mounted (MOUNT POINT ). Reember, by default lsblk command shows ouput in tree format. To display the information as an ordinary list, add the -l command line option.
blkid

blkid command, as was under RHEL6, in RHEL7 is used to view information about available block devices.

1-8167342


 Be default, the blkid command displays available attributes such as its universally unique identifier (UUID), file system type (T YPE), or volume label (LABEL), as in command one, in above snapshot.

You can also use blkid to display information about a particular device only, specify the device name on the command line – blkid /dev/sda1, as in command two, above snapshot.

Further, you can also use the above command with the -p and -o udev command line options to obtain more detailed information. You need to have root privileges to run the third command in above snapshot.
findmnt

findmnt command allows you to display a list of currently mounted file systems. findmnt command displays the target mount point (TARGET ), source device (SOURCE), file system type (FSTYPE), and relevant mount options (OPT IONS).

3-1966621

Like lsblk command, findmnt lists file systems in a tree-like format. T o display the information as an ordinary list, add the -l command line option.

4-8969976

 df

Exactly like in RHEL6, here in RHEL7 df command allows you to display a detailed report on the system’s disk space usage. df command displays its name (Filesystem ), size (1K-blocks or Size), how much space is used (Used), how much space is still available (Available), the percentage of space usage (Use%), and where is the file system mounted (Mounted on).

Similar like in RHEL6, the df command in RHEL7 shows the partition size in 1 kilobyte blocks and the amount of used and available disk space in kilobytes. To view the information in megabytes and gigabytes, supply the -h command line option, human-readable format.

5-4923394

du

du command allows you to displays the amount of space that is being used by files in a directory. Like df, du command displays the disk usage in kilobytes. T o view the information in megabytes and gigabytes, supply the -h command line option and to get the summary information only use -s option.

6-4107403

And lastly, you have the gnome-system-monitor tool in rhel7 viewing block devices & filesystem.

7-7920267

Filed Under: Tutorials

  • Go to page 1
  • Go to page 2
  • Go to Next Page »

Follow us

  • Facebook
  • Twitter
  • YouTube

Categories

  • Android pentesting tools
  • Arduino
  • Books
  • Darknet
  • database
  • General
  • Kali Linux
  • Linux
  • Linux Commands
  • Network Administrator
  • Penetration Testing
  • Penetration Testing Tools
  • Raspberry Pi
  • resources
  • Review
  • Termux
  • Tutorials
  • Ubuntu
  • Uncategorized
  • Video Tutorials
  • vmware
  • WiFi Adapter
  • WiFi Pentesting
  • Wireless Router
  • Wireshark

Recent Posts

  • Introduction to Security Penetration using Linux
  • Install Kali Linux
  • Exploit development resources
  • Zoomeye hacker search engine
  • The only Penetration testing resources you need

Latest from WiFi Adapter

alfa network awus036h Review

Alfa AWUS036H USB WiFi adapter, supports Monitor mode AWUS036H operates in the 2.4GHz frequency range, with 802.11b/g communication standards

  • Home
  • About us
  • Privacy Policy
  • Affiliate disclaimer

Copyright © 2021