Kill Chain is a unified console with an anonymize that will perform these stages of attacks:
Dependent Tool Sets
Setting Up
Installing Killchain.py:
sudo apt-get update
sudo apt-get install websploit openvas veil-evasion tor
sudo git clone https://github.com/ruped24/killchain.git
cd killchain
sudo chmod +x killchain.py
sudo ./killchain.py
killchain.py one-liner installation
sudo apt-get update && sudo apt-get -y install websploit openvas veil-evasion tor && sudo git clone https://github.com/ruped24/killchain.git && cd killchain && sudo chmod +x killchain.py && sudo ./killchain.py
Post Installation Setup
Click here for options on the menu
Killchain menu setup options;
OpenVas takes a while on first run. Go get a coffee or two. You can launch multi Kill Chain sessions. No need to watch paint dry. Once OpenVas setup has completed; Reset openvas web interface admin password by running the commands below in an external terminal.
sudo openvasmd --user=admin --new-password=<Your_new_reset_admin_password>
Point your browser to https://localhost:9392
Login Username = admin
Login Password = Your_new_reset_admin_password
Note on Veil-Evasion: Veil will complete the setup upon launch. Accept all the defaults. This takes a while. Don’t leave the screen tho, there’re dialog you will have to click through. Once it’s complete, it will auto launch.
Websploit: To exit websploit, type exit.
Metasploit: To exit metasploit, type exit.
WiFite: It’s for site survey within the framework of this console.
Run wifite in an external terminal to do wireless attacks against target.
Courses of Action Matrix & Troubleshooting
Introduction As cyber threats grow more sophisticated, organizations need more than just firewalls and antivirus…
Introduction When it comes to cybersecurity and ethical hacking, one of the most effective ways…
Introduction In the world of cybersecurity, knowledge is power. One of the most powerful skillsets…
Introduction In the vast ocean of the internet, the most powerful tool you already have…
Pystinger is a Python-based tool that enables SOCKS4 proxying and port mapping through webshells. It…
Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…