-
Notifications
You must be signed in to change notification settings - Fork 0
/
kali.html
146 lines (138 loc) · 5.34 KB
/
kali.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
<!DOCTYPE HTML>
<html>
<head>
<title>EisW-kali</title>
<meta charset="utf-8" />
<meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=no" />
<!--[if lte IE 8]><script src="assets/js/ie/html5shiv.js"></script><![endif]-->
<link rel="stylesheet" href="assets/css/main.css" />
<!--[if lte IE 9]><link rel="stylesheet" href="assets/css/ie9.css" /><![endif]-->
<!--[if lte IE 8]><link rel="stylesheet" href="assets/css/ie8.css" /><![endif]-->
</head>
<body>
<!-- Wrapper -->
<div id="wrapper">
<!-- Main -->
<div id="main">
<div class="inner">
<section>
<div class="content">
<header>
<h2>Kali Linux</h2>
<p>OS for Hackers and pentesters</p>
</header>
<p>Kali Linux is a debian linux based distribution designed for info_security professionals. It offers an easier and smoother experience with vulnerablity findings and security examination. Kali contain hundreds of tools for various security tasks such as penetration testing, reverse engineering and social engineering. Kali Linux is developed, funded and maintained by Offensive Security.</p>
<ul class="actions">
<li><a href="https://www.kali.org/" class="button">Learn More</a></li>
</ul>
</div>
<div class="row">
<div class="6u 12u$(small)">
<h4>Features:</h4>
<ul class="alt">
<li>> 600+ penetration testing tools</li>
<li>> Free!</li>
<li>> Open Source</li>
<li>> Custom Kernal</li>
<li>> ARMEL and ARMHF support</li>
</ul>
</div>
</div>
</section>
<section>
<div class="content">
<h3>Virtual machine</h3>
<h4>Requirements</h4>
<ol>
<li>Have a recent version of vmware or virtual box. (<a href="https://www.virtualbox.org/">Virtual box</a>, <a href="https://my.vmware.com/web/vmware/free#desktop_end_user_computing/vmware_workstation_player/12_0">Vmware</a>)</li>
<li>Have at least 8Gb of free storage in hard-drive.</li>
<li>Download the suitable kali image for your virtual box <a href="https://www.offensive-security.com/kali-linux-vmware-virtualbox-image-download/">here</a>.</li>
</ol>
<h4>Installation Process [Vmware]</h4>
<ol>
<li>Extract and open the image folder you just downloaded.</li>
<li>Click on the <b>.vmx</b> file.</li>
<li>Choose <b>"I copied it"</b> if vmware ask weither if you copied or moved it.</li>
<li>Default username: <b>root</b> Default password: <b>toor</b></li>
</ol>
<h4>Installation Process [Virtualbox]</h4>
<ol>
<li>Open the <b>.ova</b> file you just downloaded.</li>
<li>Click on import.</li>
<li>Start up Kali linux</li>
<li>Default username: <b>root</b> Default password: <b>toor</b></li>
</ol>
</div>
</section>
<hr class="major" style="margin-top: 0px">
</div>
</div>
<!-- Sidebar -->
<div id="sidebar">
<div class="inner">
<!-- Menu -->
<nav id="menu">
<header class="major">
<h2>Content</h2>
</header>
<ul>
<li><a href="index.html">Homepage</a></li>
<li><a href="generic.html">Generic</a></li>
<li><a href="about.html">About</a></li>
<li><a href="#">Kali Linux</a></li>
<li>
<span class="opener">CTF</span>
<ul>
<li><a href="#">Mr. Robot</a></li>
<li><a href="#">Info_institude</a></li>
<li><a href="#">Maze</a></li>
<li><a href="#">Behemoth</a></li>
<li><a href="#">Breach_1</a></li>
<li><a href="#">Breach_2</a></li>
</ul>
</li>
<li><a href="#">Project_1</a></li>
<li><a href="#">Project_2</a></li>
<li><a href="#">Project_3</a></li>
<li><a href="#">Project_4</a></li>
<li>
<span class="opener">ARM</span>
<ul>
<li><a href="compiler_setup.html">Compiler_setup</a></li>
<li><a href="bash_compiling.html">Bash_compiling</a></li>
<li><a href="shell_shock.html">Shell_shock</a></li>
</ul>
</li>
<li>
<span class="opener">Network_Sec</span>
<ul>
<li><a href="#">Nmap</a></li>
<li><a href="#">Uniscan</a></li>
<li><a href="#">Malicious_Network</a></li>
<li><a href="#">WPA2_Bruteforce</a></li>
<li><a href="#">Free_Wifi</a></li>
<li><a href="#">beEF</a></li>
</ul>
</li>
<li>
<span class="opener">Metasploit</span>
<ul>
<li><a href="#">Armitage</a></li>
<li><a href="#">Veil_Evasion</a></li>
<li><a href="#">Meterpreter</a></li>
<li><a href="#">Post_Exploitation</a></li>
</ul>
</li>
</ul>
</nav>
</div>
</div>
</div>
<!-- Scripts -->
<script src="assets/js/jquery.min.js"></script>
<script src="assets/js/skel.min.js"></script>
<script src="assets/js/util.js"></script>
<!--[if lte IE 8]><script src="assets/js/ie/respond.min.js"></script><![endif]-->
<script src="assets/js/main.js"></script>
</body>
</html>