Getting To Know The Hacker Desktop Environment

One of the first things you need to be familiar with is your working environment. I have chosen to use two Linux Distros. One will be fedora dextrose which is the operating system and the Kali Linux. It is a Linux that contains a great deal of testing tools so it’s useful in that sense. I will go into it in great detail how you can set this machine up, how you can install it, and so on and so forth.

Using Windows is not advisable for this activity. Since I’m doing this from an environment that I own, it doesn’t matter if I’m anonymous.  In the real world all the pen testing should to be as anonymous and invisible as possible. You do not want them to figure out where the hack is coming from. You want to wipe your trail and windows is not good for that sort of thing. There your anonymity will be low. Most of the tools we are going to be using were made for Linux. Some of them might not work under windows, but I have not tested them all out.

You can still use Windows if you like because you’re not hiding from anyone. In my environment, I do need to actually use proxies and VPN  show you how it is done and how you can do it. For Mac users, most of the systems should work and the procedures are simpler.

The command line tools are the same. How you install them differs but pretty much you will be able to run the same commands as me. Your anonymity level with Max OSX should be good on Linux. You have the greatest anonymity and you are safe in that sense.

You will also need fast internet connection. Even though these attacks  work better with a fast internet connection, some will work from public wifi. In real life we’ll just pretend I set up a wireless access in my house and load it so it’s like  public wifi.

Some of these attacks go over public wifi and public wifi is not the fastest internet connection out there. This happens because you have a lot of people connected to them and there’s a lot of data going through. They’re not the safest networks either. As I said, if you want to anonymize yourself, you have to go out and hook up to a public wifi and conduct their attacks from there. Before they do that, they have to know if the bandwidth of that wifi can sustain their attack. That is how they become anonymous.

The third thing you will need a working wireless card. Most computers have them. Pretty much all laptops from 2005  were standardized with wireless cards. If you’re using a desktop that doesn’t have a wireless card, you won’t be able to follow through abortion of this tutorial. You should be able and go buy a USB wireless card or something of a kind. They’re not that expensive and you can get them anywhere.

What I mean by a fictional wireless network card is that it is recognized by your operating system. You need to make sure that the Dextro you are using has the necessary drivers for the wireless card that you are using. Ethos should be fine. Linux journal supports a lot of Ethos devices if not all the network cards.

If you’re uncertain how to check whether your wireless card functions under Linux distro just try to connect to a wifi. If you can connect to a wifi access point, it works. If you can’t connect, it doesn’t work. Don’t just hop to the conclusion that it doesn’t work, maybe the power is off or something like that. Do not worry, I will show this in greater detail when we go over the installation process.

In the next lecture, we’re going to go over some basic terminology you will need to know for later lectures.

Get the full course for 87% off here