3rd July, 2019Kali Linux on Raspberry Pi 1/2/3(+)/4/Zero(W) with touch optimized interface in a ready-to-go image (Refreshed 03-June-2019 with full RasPi 4 support) Sticky Finger’s Kali-Pi – The pocket size, finger friendly, lean mean hacking machine Need practice targets? Checkout Sticky Finger’s DV-Pi Sticky Finger’s Quick Start Guide: Sticky Finger’s Kali-Pi image comes with […]| Re4son
12th January, 2018Kali Linux 2017.3 on the GPD Pocket Unofficial Kali ISO Image available now for download UPDATE: ISO 20171226-1 & Kernel 4.15.0-rc5-re4son+_8 Wifi Bluetooth Touch screen Screen rotation Proper display scaling & fan control Built natively with debian lb and d-i What is working: Proper screen orientation for graphical debian-installer Display properly rotated in […]| Re4son
4th July, 2018NEW: Damn Vulnerable Raspberry Pi runs on all Pi’s The touch friendly “driving range” for IoT penetration testing with your Kali-Pi. Sticky Fingers DV-Pi – pre-configured with vulnerabilities for penetration and privilege escalation. All DV-Pi’s can be operated with a touch friendly interface or headless via ssh. Ideal tool for practicing, competitions and […]| Re4son
11th April, 2018Latest Kali Linux on Raspberry Pi with Touch Screen, Bluetooth and touch optimised interface (New: Bluetooth, Rogue AP, Remote access AP, more tools) Sticky Fingers Kali-Pi – The pocket size, finger friendly, lean mean hacking machine. Need practice targets? Checkout Sticky Fingers DV-Pi Content Overview Installation Quick install using pre-configured image Manual installation: […]| Re4son
30th March, 2018The Sticky Fingers Kali-Pi installation walk through did not include any detailed information about the configuration of Snort, Barnyard2 and PulledPork on the Raspberry Pi 2 running Kali. Here are my configuration notes. Snort: sudo bash apt install apache2 apache2-doc autoconf automake bison ca-certificates ethtool flex g++ gcc libapache2-mod-php libcrypt-ssleay-perl default-libmysqlclient-dev libnet1 libnet1-dev libpcre3 […]| Re4son
21st September, 2015 Content Why encrypting? What encryption algorithm Writing the crypter Encrypting the shellcode on Linux Decrypting and executing the shellcode on Linux Encrypting the shellcode on Windows Decrypting and executing the shellcode on Windows All files are available on github. 1. Why encrypting? In many cases, encoding shellcode will get it past intrusion […]| Re4son
28th June, 2015 Content Why encoding? What encoding algorithm Writing the encoder Writing the decoder Running the final product 1. Why encoding? Two of the biggest challenges for using our shellcodes are: Bad characters contained in the shellcode Intrusion detection systems Today I am writing an encoder to tackle both those points. 2. What encoding […]| Re4son
22nd June, 2015 Content Introduction Generate shellcode Analysis Conclusion Execute re-engineered shellcode 1. Introduction In previous chapters we’ve looked into the meterpreter reverse tcp shell & the adduser shellcodes. Today I am going to dig into the linux/x86/shell/bind_nonx_tcp shellcode to find the difference between the normal and the noNX payloads. 2. Generate shellcode I am […]| Re4son
27th June, 2015 Content Introduction Generate shellcode Compile POC and retrieve shellcode source Disassemble and analyze shellcode 1. Introduction After looking into the meterpreter reverse shell in the last post I am going to analyze the linux/x86/adduser payload today. 2. Generate shellcode A few things to be aware of when dissecting msf payloads: the shellcodes […]| Re4son