Search:

Type: Posts; User: buddha-hacker

Search: Search took 0.00 seconds.

  1. Replies
    3
    Views
    1,831

    Thanks Grid! I'm approaching this from a...

    Thanks Grid!

    I'm approaching this from a defenders point of view. So I'm wondering if there are any tools which are portable / leave no foot print and can be used to remove the evil from a...
  2. Replies
    3
    Views
    1,831

    Stand Alone Scanner & Removal Tool

    Well, I figured this was the right group to ask.

    I'm wondering what security detection and removal tools give Pen Testers fits. Specifically I'm looking for a good portable scanner / removal tool...
  3. Hello Wilsonb, Q quick google yielded this...

    Hello Wilsonb,

    Q quick google yielded this possible solution:
    https://wiki.debian.org/WiFi/AdHoc

    It should work since Kali I believe is on debian.

    Thanks,
  4. Which AV is the best (and hardest to evade)

    I thought this would be an interesting question to ask Kali Linux folks.

    Knowing AV is pretty much dead, which AV do you think is the best and hardest to evade as a red teamer?

    Thanks,
  5. Encrypted Raspberry PI-2 Kali setup requires manual entry of password

    I used the following article:
    https://www.offensive-security.com/kali-linux/raspberry-pi-luks-disk-encryption/

    To create an encrypted Kali PI-2 image, it works fine except that it manually...
  6. Kali Linux and Wireless Audits and Intrusion Systems

    In looking over the SANS control on wireless networking:

    http://www.sans.org/critical-security-controls/control/7


    It discusses using a commercial grade wireless scanning solution. I'm...
  7. Problems installing Kali on Raspberry PI-2

    I'm trying to get Kali Linux going on a Pi-2 with a 16 Gig SD.

    I've tested the unit with a Ubuntu image and it works great. So it should be a hardware issue.

    I'm using these official...
Results 1 to 7 of 7