Second try :
Kali can be found directly on the windows store. This version is much more stable than the one i tried to patch from ubuntu with the git repo in my first try.
Some usefull tweeks can be found here : https://www.kali.org/news/kali-linux-in-the-windows-app-store/
Everything is working well for now.
Edit 1 )
To make nmap work, install it on windows and make an alias :
alias nmap='"/mnt/c/Program Files (x86)/Nmap/nmap.exe"'
FIRST TRY :
This version is not stable.
WSL stand for windows subsystem for linux
its a kindof native port for linux inside windows. not like emulation, it share the ressources directly from windows to run linux binaries.
To repare fuckedup things at first do those :
To fix error of expired cert. when trying to use apt-get command just do this :
apt install ./kali-archive-keyring_2018.1_all.deb
To fix error when you are not able to resolve address (aka dns is fuckedup)
just edit /etc/resolv.conf and add your favorite dns aka 22.214.171.124 or 126.96.36.199
after do an apt update && apt upgrade
Kali Linux on Windows Subsystem for Linux
we find a file that was created by the maker in the process of creation ie : flag.txt.
Flag.txt was created 22 august 2017
find / -type f -newermt 2017-08-20 ! -newermt 2017-08-24 -ls 2>/dev/null
We see all files that have changed between 20-08 and 24-08 (if needed we can change the range)
With that we can see interesting changes inside the boxes
Intended for personal use, i use many websites and pages from my blog, i just want to have all those things into one cozy page.
Read more “WIP – Linux pentest cheatsheet”
I did root many windows rig in the last week. You can practice your skill too, just go to hackthebox.eu. Here i will not tell you how specificity root those vulnerable windows os, i just want to keep some of the basics that i learned from this.
As expected the info gathering is the same nmap nikto dirb etc.
The windows command line, as i am used to unix bash this command line was like Korean to me.
Here are the basic commands that are useful : Read more “A journey into Windows pentesting.”
It has been a wile since i solved a CTF. I decided to try to crack the analougepond from @knightmare2600.
First you need to put an appropriate soundtrack for this VM. Read more “CTF Analougepond from @knightmare2600 (VulnHub)”
Hello guys, it’s my third Vulnerable VM by @ViperBlackSkull if you need more information you can reach me on twitter at @marghost. You can get the virtual machine HERE. So lets get started. Read more “CTF Orcus from Viper (hackfest 2016)”
Hi everyone, I did the first Vuln VM from hackfest 2016 not long ago and i want to try this one now. It’s the second one by @ViperBlackSkull and it is the second walkthrough for me so if you need more information you can reach me on twitter at @marghost. You can get the virtual machine HERE. So lets get started.
Read more “CTF Sedna from Viper (hackfest 2016)”