• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
KaliTut

KaliTut

Kali Linux tutorial and Linux system tips

  • Home
  • Raspberry Pi
  • Privacy Policy
  • About us

Fix This this kernel requires an x86-64 cpu but only detected an i686 cpu

Last Updated on May 9, 2020 by Kalitut 20 Comments

this kernel requires an x86-64 cpu, but only detected an i686 CPU.
Trying to install kali Linux or Ubuntu on Oracle VirtualBox or VMware?
but when running the virtual machine you got this message ” This kernel requires an x86-64 CPU, but only detected an i686 CPU. Unable to boot – please use a kernel appropriate for your CPU “.

this kernel requires an x86-64 cpu but only detected an i686 cpu

Case one There is many case you are receiving this message for but the most common one can be fixed from your bios settings on intel CPU you have to enable ” Intel Virtualization Technology ” and on AMD CPU you have to enable “AMD V” this will simply fix this error

[Read more…] about Fix This this kernel requires an x86-64 cpu but only detected an i686 cpu

Filed Under: Tutorials

infernal twin Automated Evil Twin Attack

Last Updated on May 20, 2021 by Kalitut 3 Comments

Automated Evil Twin Attack: infernal-twin

What is evil twin attack?
Evil twin is a term for a fake WiFi access point, it appears to be a legitimate one offered on the premises, but it has been set up to snoop “spy” on your wireless communications.
An evil twin is also called wifiphisher it’s the wireless version of the phishing scam that hackers use to hack online accounts
The attacker fools wireless users to make them connect to a tainted hotspot by posing as a legitimate provider.

evil twin attack kali

This type of fake wifi attack may be used to steal the passwords of the users by either snooping the communication link or by phishing, which involves setting up a fraudulent web site and luring people there in a simple word it’s wifi phisher

[Read more…] about infernal twin Automated Evil Twin Attack

Filed Under: Tutorials Tagged With: infernal twin

Password Dictionary where to download and how to make them

Last Updated on June 12, 2021 by Walid Salame 79 Comments

One of the most used password pentesting method is password dictionary attack. In this case, the cracking tool sequentially checks all possible passwords stored in special files called password dictionary.

Typically, password dictionary store frequently used passwords and familiar words, such as names and place names.

Password Dictionaries may contain words from various languages ​​of the world. Password crackers check them one by one in search of a suitable one.

rockyou password list

If you decide to use password dictionary attack, you will need some basic dictionaries or whats called password list.

[Read more…] about Password Dictionary where to download and how to make them

Filed Under: Tutorials Tagged With: Password dictionary

How To View Block Devices And File System Under RHEL7

Last Updated on May 20, 2021 by Walid Salame Leave a Comment

Under RHEL7 view block devices filesystem is more or less same as we used to do it under RHEL6. Lets understand some interesting commands to view block devices and filesystem under RHEL7.

viewblockdevicesrhel7-4672435

lsblk:
lsblk command allows you to display a list of available block devices.

selection_195-300x143-8591423

lsblk command displays the device name (NAME), major and minor device number (MAJ:MIN), if the device is removable (RM), what is its size (SIZE), if the device is read-only (RO), what type is it (T YPE), and where the device is mounted (MOUNT POINT ). Reember, by default lsblk command shows ouput in tree format. To display the information as an ordinary list, add the -l command line option.
blkid

blkid command, as was under RHEL6, in RHEL7 is used to view information about available block devices.

1-8167342


Be default, the blkid command displays available attributes such as its universally unique identifier (UUID), file system type (T YPE), or volume label (LABEL), as in command one, in above snapshot.

You can also use blkid to display information about a particular device only, specify the device name on the command line – blkid /dev/sda1, as in command two, above snapshot.

Further, you can also use the above command with the -p and -o udev command line options to obtain more detailed information. You need to have root privileges to run the third command in above snapshot.
findmnt

findmnt command allows you to display a list of currently mounted file systems. findmnt command displays the target mount point (TARGET ), source device (SOURCE), file system type (FSTYPE), and relevant mount options (OPT IONS).

3-1966621

Like lsblk command, findmnt lists file systems in a tree-like format. T o display the information as an ordinary list, add the -l command line option.

4-8969976

df

Exactly like in RHEL6, here in RHEL7 df command allows you to display a detailed report on the system’s disk space usage. df command displays its name (Filesystem ), size (1K-blocks or Size), how much space is used (Used), how much space is still available (Available), the percentage of space usage (Use%), and where is the file system mounted (Mounted on).

Similar like in RHEL6, the df command in RHEL7 shows the partition size in 1 kilobyte blocks and the amount of used and available disk space in kilobytes. To view the information in megabytes and gigabytes, supply the -h command line option, human-readable format.

5-4923394

du

du command allows you to displays the amount of space that is being used by files in a directory. Like df, du command displays the disk usage in kilobytes. T o view the information in megabytes and gigabytes, supply the -h command line option and to get the summary information only use -s option.

6-4107403

And lastly, you have the gnome-system-monitor tool in rhel7 viewing block devices & filesystem.

7-7920267

Filed Under: Tutorials

Set Your WiFi Card TX Power Higher Than 30 dBm

Last Updated on May 20, 2021 by Walid Salame Leave a Comment

Do you have an Alfa AWUS036NH Wi-Fi adapter that claims it can go to 2000 mWs, or some card that can supposedly transmit power over 1000 mW? If so, you may have run into problems setting your card’s TXPOWER higher than 30 dBm, which is about 1000 mW. Well, I will show you how to break that barrier and go as high as you want!
WARNING Removing all restrictions is illegal in the United States. This tutorial is only for educational reasons, and if you choose to apply it and break the law, then that is your choice and not mine. Please be careful putting this into action.

  • Changing Your WiFi apadter TX Power
  • Step 1: Install Packages
  • Step 2: The Files
  • Step 3: I Make My Own Rules
  • Step 4: Swap
  • Step 5: Validating
  • Step 6: The Final Step
  • Step 7: KALI Users
  • Step 8: Changes
  • Step 9: Changes
  • Step 10: Changes
  • HOORAY! It’s Finally Finished!

Changing Your WiFi apadter TX Power

i will showed you how to set your TXPOWER all the way to 30 dBm, or 1 full watt, or 1000 mW.
I’m going to quickly review the commands to do so:

  • iw reg set BO
  • iwconfig wlan0 txpower 30

If you try to go over 30, though, you will get an error.
What happens is that the iw reg set command reads the regulatory database for the country that you specified (BO) and comes back with the rules for that country. In Bolivia, the rules are that you can set your txpower to 30 dBm and no more, but if we were to change those rules, we could change how much we can increase it to.
So without further delay, let’s get into how to change that!
NOTE: KALI users have to do it just a tad bit differently. Go to Step 7 to learn what the differences are. The differences occur in Steps 4 through 6.

[Read more…] about Set Your WiFi Card TX Power Higher Than 30 dBm

Filed Under: Tutorials

  • « Go to Previous Page
  • Go to page 1
  • Go to page 2

Follow us

  • Facebook
  • Twitter
  • YouTube

Categories

  • Android pentesting tools
  • Arduino
  • Books
  • Darknet
  • database
  • General
  • Github Tools
  • Hacking
  • Kali Linux
  • Linux
  • Linux Commands
  • Network Administrator
  • Penetration Testing
  • Penetration Testing Tools
  • PowerShell
  • Raspberry Pi
  • resources
  • Review
  • Termux
  • Tutorials
  • Ubuntu
  • Uncategorized
  • Video Tutorials
  • vmware
  • WiFi Adapter
  • WiFi Pentesting
  • Wireless Router
  • Wireshark

Recent Posts

  • Hijacked Wi-Fi? Thorough explanation of hacking techniques
  • Windows PowerShell tutorial for beginners
  • Learn to Hack Steps from Beginner to Hacker
  • PowerShell Tutorial – GUIDE introduction with basics
  • Top Hacking Tools
  • Home
  • About us
  • Privacy Policy
  • Affiliate disclaimer

Copyright © 2023