INSTALACIÓN HABILITAR EL AUTOLOGIN PARA KALI ARM, EN UN RASPBERRY PI 4 edited this file and change root user by the user to use./etc/lightdm/lightdm.conf After uncommenting and changing the other 2 rows under section [Seat:*] now KALI XFCE autologins to… Read more ›
wget http://old.kali.org/kali/pool/main/i/icu/libicu57_57.1-9_amd64.debsudo dpkg -i libicu57_57.1-9_amd64.debsudo apt-get install -y curl gnupg apt-transport-httpscurl https://packages.microsoft.com/keys/microsoft.asc | apt-key add –sudo echo “deb [arch=amd64] https://packages.microsoft.com/repos/microsoft-debian-stretch-prod stretch main” | tee /etc/apt/sources.list.d/powershell.listsudo apt updatesudo apt install gss-ntlmsspsudo apt install powershellpwsh Nota: Es importante usar el repo de… Read more ›
Si en algun momento te salió este error al conectarte por ssh a algun sistema, se debe a que falló la negociación del diffie-hellman. “Unable to negotiate with 1.1.1.1 port 22: no matching key exchange method found. Their offer: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1”… Read more ›
https://www.cyberciti.biz/faq/linux-unix-bind9-named-configure-views/
En versiones de Kali Linux 2019 y 2020, empecé a tener problemas descargando las gems de en ruby Revisando en algunos sitios, si tienes este problema de conexión, aconsejan deshabilitar el stack de IPv6:https://wiki.archlinux.org/index.php/Rubyhttps://wiki.archlinux.org/index.php/IPv6#Disable_IPv6 Sin embargo si necesitas IPv6 para… Read more ›
Instalar:– apt install neo4j– apt install bloodhound Antes de iniciar neo4j:Para el problema del limite seguir esta guía: WARNING: Max 1024 open files allowed, minimum of 40000 recommended. See the Neo4j manual.https://neo4j.com/developer/kb/number-of-open-files-on-linux/https://www.appservgrid.com/paw92/index.php/2019/03/26/how-to-increase-number-of-open-files-limit-in-linux/ ## /etc/security/limits.conf ## Es importante especificar el usuario… Read more ›
https://medium.com/schkn/linux-privilege-escalation-using-text-editors-and-files-part-1-a8373396708d
http://rungga.blogspot.com/2014/08/vulnerability-exploit-fingerprint-zem560.html https://medium.com/bugbountywriteup/pentesting-an-iot-based-biometric-attendance-device-10c0efd69392 https://blog.infobytesec.com/2014/07/perverting-embedded-devices-zksoftware_2920.html