![]() ![]() ![]() It will ask us for confirmation, we write "s" and we give Enter. With this we will have updated the repositories, which are the sources from which we will download the following tools that Linset needs to work. It will be necessary to verify that they do not have any repetition.Īfter this we open a terminal and write: apt-get update We do it with: leafpad /etc/apt/sources.listĪnd we add these repositories to the system: deb testing main contrib non-freeĭeb jessie-updates main contrib non-freeĭeb jessie/updates main contrib non-free To solve this problem we have to add some things to the system, the first thing is to enable some repositories. ![]() The first step will be to download the tool, for this you open the terminal and enter the following: cd DesktopĪt this point we can run the tool, but it will most likely throw an error with the missing dependencies. In some cases that you have mentioned to me with a “negative one” problem, it will be necessary to install a patch, because if this is not the case, you could have problems to be able to carry out the LINSET attack correctly.īefore doing so, you must verify that your Wifi card is compatible with the monitor mode, since it is extremely necessary for the correct use of Linset. Having known how LINSET works, it would be necessary to check if we have the necessary dependencies on our Linux system to run LINSET on Kali Linux. Attack stops after correct password verification.All network users are de-authenticated, waiting for them to connect to FakeAP and enter the password.The mechanism to check the validity of the passwords to be entered is launched.The web server is launched with the selected interface.A DNS server is created to redirect all requests to the Host.A FakeAP is mounted imitating the name of the original.Option to choose any of the pre-designed interfaces, to supplant the real one, here what they do is create a Fake page where it will ask us for the password data of the chosen network.Search for handshake of the chosen network although it can also be used without handshake.It will perform a scan of nearby Wi-Fi networks and display a list of these.Linset with Linset Is Not a Social Enginering Tool is an application developed in the GNU / Linux environment that allows us to audit a Wi-Fi networkWhich using an impersonation method It allows us to access the key without having to do something since it will be the owner of the network who will provide us with the key. Given that many people believe that its operation is to "hack wifi" the theory and reality is another, as I would rather classify it as a phishing tool because in the end the user of the network is the one who ends up giving the password with this method. Kali Linux is a testing ground for administrators who need to verify security is as good as it can be.Due to the variety of applications that exist I would like to focus on one in particular "LINSET". Used by security experts to test that their systems are truly secure.Run advanced penetration protocols to see what might work and what doesn't.Can be installed on ARM-based Raspberry Pi, Chromebooks, Beaglebones, Odroid or Cubox systems.Software for testing out how robust security is.The tool can be abused but it does have good intentions help improve security to avoid penetration by users whom you would not wish to have access. It is possible to take the Kali Linux system and place it on ARM-based systems like Raspberry Pi, Chromebooks, Beaglebones, Odroid or Cubox. It has an advanced set of tools to attempt to penetrate a system. Kali Linux is a Linux-based operating system that comes from the creators of BackTrack. Kali Linux is a tool to help people interested in security test whether their system is as inaccessible as they think it is. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |