Kill Chain is a unified console with an anonymize that will perform these stages of attacks:
Dependent Tool Sets
Setting Up
Installing Killchain.py:
sudo apt-get update
sudo apt-get install websploit openvas veil-evasion tor
sudo git clone https://github.com/ruped24/killchain.git
cd killchain
sudo chmod +x killchain.py
sudo ./killchain.py
killchain.py one-liner installation
sudo apt-get update && sudo apt-get -y install websploit openvas veil-evasion tor && sudo git clone https://github.com/ruped24/killchain.git && cd killchain && sudo chmod +x killchain.py && sudo ./killchain.py
Post Installation Setup
Click here for options on the menu
Killchain menu setup options;
OpenVas takes a while on first run. Go get a coffee or two. You can launch multi Kill Chain sessions. No need to watch paint dry. Once OpenVas setup has completed; Reset openvas web interface admin password by running the commands below in an external terminal.
sudo openvasmd --user=admin --new-password=<Your_new_reset_admin_password>
Point your browser to https://localhost:9392
Login Username = admin
Login Password = Your_new_reset_admin_password
Note on Veil-Evasion: Veil will complete the setup upon launch. Accept all the defaults. This takes a while. Don’t leave the screen tho, there’re dialog you will have to click through. Once it’s complete, it will auto launch.
Websploit: To exit websploit, type exit.
Metasploit: To exit metasploit, type exit.
WiFite: It’s for site survey within the framework of this console.
Run wifite in an external terminal to do wireless attacks against target.
Courses of Action Matrix & Troubleshooting
Docker is a powerful open-source containerization platform that allows developers to build, test, and deploy…
Docker is one of the most widely used containerization platforms. But there may come a…
Introduction Google Dorking is a technique where advanced search operators are used to uncover information…
Introduction In cybersecurity and IT operations, logging fundamentals form the backbone of monitoring, forensics, and…
What is Networking? Networking brings together devices like computers, servers, routers, and switches so they…
Introduction In the world of Open Source Intelligence (OSINT), anonymity and operational security (OPSEC) are…