Boot to Kali GRUB menu

How to reset Kali Linux root password

It’s possible to reset Kali Linux password in the event that you are no longer able to login to the root user account. This happens if you haven’t logged in for a while and have since forgot Kali Linux password. In case you have not already tried, the default Kali password for root user is toor (root backwards) on VMWare and live images. Try logging in with this password before resetting the Kali Linux password.

Read more

Logged into the root account in GUI on Kali Linux

Set Kali root password and enable root login

In order to enable root login for Kali Linux, we must set the the root password manually. In past versions of Kali Linux, users were able to log in directly to the root account by default. On more recent versions, this has been disabled. The reasoning behind this change should be obvious, but if you’re a Kali user, you probably know your way around a Linux system by now, and there’s not much risk in letting you use the root account to login.

Read more

Installation of KeePassX Password Manager on Fedora Linux

Installation of KeePassX Password Manager on Fedora Linux

KeePassX is a cross platform password manager to allow users to store and organize passwords by keeping them safe using advanced encryption techniques. It allows you to create a database in which your passwords will be stored and protected by one master password. This database can then be backed up or trasferred to a new system as necessary. You can also import that databsae into another instance of KeePassX.

Read more

How to list and manage files attributes on Linux

How to list and manage files attributes on Linux

When using Linux we have many ways to manage access to resources: the most basic one is by setting the appropriate UGO/RWX permissions on files and directories. In some occasions we may also want to make use of the setuid, the setgid and the sticky bit. Furthermore, we can use ACLs (Access Control List) in order to achieve an higher level of granularity or implement Mandatory Access Control security such those based SELinux or AppArmor.

In addition to the strategies mentioned above, on most filesystems we can manipulate a set of “attributes” in order, for example, to make a file immutable.

Read more

Linux IP forwarding

Linux IP forwarding – How to Disable/Enable using net.ipv4.ip_forward

It may be necessary to configure Linux IP forwarding on a Linux system in certain scenarios. If the Linux server is acting as a firewall, router, or NAT device, it will need to be capable of forwarding packets that are meant for other destinations (other than itself). Linux uses the net.ipv4.ip_forward kernel variable to toggle this setting on or off.

Read more

Instant privacy with tor, privoxy and docker

Instant privacy with tor, privoxy and docker

We have created a Docker container linuxconfig/instantprivacy that you can deploy for instant privacy. It utilizes Tor (anonymity network) and Privoxy (non-caching web-proxy) to deliver instant privacy, and is based on GNU/Linux Debian 11 Bullseye. We’re also open to feedback or feature requests that you would like to see in the container. In this tutorial, we will explain how Tor and Privoxy combine to make your web browsing private, and how to download and run the instant-privacy Docker container.

Read more

sudo command not found - Solution

sudo command not found – Solution

If you have tried to run the sudo command on your Linux system and are greeted with a sudo command not found error, we have the solution for you. This error most commonly occurs on minimal installs, such as in Docker or on a VPS (virtual private server), and can happen on any Linux distro, like Ubuntu Linux and Debian . In this tutorial, we will show you how to resolve the error and give you the ability to run sudo commands without error.

Read more

Hosts file example on Linux

Hosts file example on Linux

The /etc/hosts file can be found on all Linux systems. This is a plain text system file which can be used to map network names (like hostnames of computers on your local network, or URLs to online websites) to IP addresses. The hosts file has a higher priority than any DNS servers your system is configured to use.

Read more