![]() ![]() New users coming from other operating systems like Windows may think just running Kali Linux inside VMWare or VirtualBox is the safest process. But advanced users goes above and beyond for daily tasks and it is necessary to follow proper procedures. Extra TalksĪlthough Kali Linux is created for attacking purpose it is quite secure environment itself. These tools are like anti-malwares for Linux systems. ![]() We have discussed about this topic some days ago in details ( Find & remove rootkits from Linux). We can run the scan by using "Chkrootkit" or "Rkhunter" tool kits. We also need to scan our system frequently for malwares and rootkits. Even the xfce4-taskmanager graphical tool can perform similar actions. Using top (built right into the system) or htop ( sudo apt install htop) tool shows us real-time monitoring activity. Now our all old SSH keys moved to a directory named old_keys. ![]() We use following commands to do this: cd /etc/ssh sudo mkdir old_keys sudo mv ssh_host_* old_keys Instead of deleting them from the database, we are going to store them some secure place. This list view will shows all the keys inside. SSH keys are located in /etc/ssh directory by default. We need to change the our public SSH keys, because every distro have the same, and generate a private key will make sure only authenticated users can access it. One is public and the other one is private. SSH gives us capability to authenticate without inputting passwords every single time. If a bad guy did a Man-in-the-middle (MITM) attack or a social engineering campaign it may drain our security. SSH keys have quite same fundamentals but those are used to verify files. Later we use our accounts with the software for a personalized way, and the service provider gives adequate power according to the subscription under those accounts. If we download a software from a website, it is the same distribution copy that everyone downloads it. It may looks everything is fine and cool but the problem is for everyone there are the same keys. Even for distros we use, there are SSH keys that let us verify authentic files from a source. There are no way around it but to fix present or upcoming security issues. As we're on this page via web, we are already using some kind of SSH. It uses to communicate computers securely. Secure Shell or SSH is a network protocol. The conclusion is we need to update & upgrade Kali Linux frequently and update the distribution whenever it release. Follow us to get notified when the update comes.Īlso we must update and upgrade our Kali Linux after some days by using following command: sudo apt update -y & sudo apt upgrade -y We just need to apply some commands to install the update. For being a rolling distro Kali Linux doesn't need to be download ISO image and again install it during update. Updated versions of Kali comes with upgraded kernels. Kali Developers releases a new version in every quarter. There are lots of versions of Kali Linux. We can even use a root user directly on our system, but it will not good for security reasons. Similarly to family and parental accounts. Now Kali's default user is non-root user account.Īn unprivileged user stands directly below the main admin user which have all the root permissions. Now things are changed after Kali Linux 2020.1 update. ![]() Previously root user was Kali's default user. We need to remember that our typed password will not displayed for security reasons. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |