Kali Linux is a Linux distro based on Debian that brings a ton of forensic/penetration testing tools pre-installed. Here is a small list of what you can find in Kali: John the Ripper - Password Attacks Maltego - Information Gathering Wireshark - Sniffing & Spoofing Yersinia - Vulnerability Analysis Aircrack-ng - Wireless Attacks Grabber - … Continue reading Kali Linux on EVE-NG
Tag: emulated virtual enviroment
s Last one... In this post we will walk you through the process of adding qemu images into EVE. QEMU is a generic and open source machine emulator and virtualizer, so it will be used inside EVE to emulate most of the equipments, from a windows machine to a Cisco ASA. First important thing is … Continue reading EVE-NG – Load qemu images
Continuing this series of posts that began with the Initial Configs of EVE, the dynamips images are the easiest to implement. Just upload the dynamips images to /opt/unetlab/addons/dynamips. Next fix all permissions with the command: /opt/unetlab/wrappers/unl_wrapper -a fixpermissions Enjoy. Video: Until next post, stay good.
After you download the IOL files (previous post) you will need a python script to generate the licences that will allow you emulate these images in eve. Here is the script: //pastebin.com/embed_iframe/DpVpUZg5 Copy this code into a text file and call it script.py or other name you like with the py extension. Now using WinSCP … Continue reading EVE-NG – Load IOL images
reAfter the previous post EVE - Initial Configs, we are going to feed some images to this beast and watch it roar. First you will need to find the images you want in your lab, and believe me, their plenty to choose from. Here is a list of the actual equipment that you can emulate … Continue reading EVE – NG – Build up your lab