The VX-Files
The VX-Files
  • README.txt
  • For updates, questions, suggestions or just chatting: @malcrvz
  • Download your own local copy or check my other libre projects: Github/malcrvz
  • 📕Cybersecurity Theory
    • Index
      • Malware types
        • Viruses, worms and Trojans
        • Backdoors, Rootkits and Spyware
        • Botnets, DDoS and Spammer
        • Ransomware
        • Scareware and Adware/PUP/PUA
        • Downloaders and Launchers
        • Hacktool
        • APT - Advanced Persistent Threat
      • Social engineering techniques
        • Phishing
        • Pretexting
        • Baiting
        • Quid pro quo
        • Tailgating
      • Cryptography
        • Hash functions
        • Symmetric, Asymmetric and Hybrid cryptography
        • Digital signatures & Digital certificates
        • TLS Protocol
      • Pentesting methodology & Techniques
        • CIA Triad - Confidentiality, Integrity & Availability
        • The methodology steps
        • Pre-Engagement
        • Information Gathering
          • HTTP status codes
          • robots.txt
        • Vulnerability Assessment
        • Exploitation
          • Password cracking
        • Post-Exploitation & Persistence
          • Types of Shells
        • Privilege Escalation & Lateral Movement
        • Reporting & Remediation
  • 🐧Linux Essentials
    • Index
      • 1, 0, bits, Bytes: Units of digital information
      • User management
      • Packet management
      • Privileges & sudo
      • Passwd & Shadow files
      • Managing files, links and regex
      • find
      • Terminal/TTY
      • SSH
  • 🪟Windows Essentials
    • Index
      • CLI user management
      • CMD File management
  • 🌍Networking Essentials
    • Index
      • Windows CLI IP management
      • Linux IP management
      • Linux CLI Wi-Fi connection
  • 🕸️Network Pentesting
    • Tools
      • 1. Pre-Engagement
        • OpenVPN
      • 2. Information gathering
        • cURL & wget
        • Nmap
        • arp
        • Netcat
        • whatweb
      • 3. Vulnerability assessment
        • smbclient
      • 4. Exploitation
        • Metasploit
        • Hashcat
        • John the Ripper
      • 5. Post-Exploitation & Persistence
        • SSH
      • 6. Privilege escalation & Lateral movement
        • Possible privilege escalation vectors - Auto-enumeration scripts
      • 7. Reporting & Remediation
    • Techniques
      • Upgrade reverse shell to interactive
      • Transferring files to/from remote victim
      • Possible privilege escalation vectors - Manual checklist
    • Resources
      • Manufacturer default passwords lists
        • IP Cameras
      • Get Shells
  • 💉Web App pentesting
    • Tools
      • CeWL
      • Gobuster
      • whatweb
    • Techniques
      • Command injection
    • Resources
      • Reverse Shells
      • Bind Shells
  • 📡Wireless pentesting
    • Tools
    • Techniques
    • Resources
  • 🔓On-Premises Pentesting
    • Tools
    • Techniques
      • Removing Linux user passwords
      • Removing Windows user passwords
    • Resources
  • 💽Disks & Forensics
    • Index
      • Getting a disk ready
      • Inodes & Sectors
      • Recover deleted files
      • BUILDING - Secure file deletion
  • 🕷️Bash scripts
    • coming soon
  • ⚡PowerShell Scripts
    • coming soon
  • 🟩HTB Walkthroughs
    • coming soon
  • 🏴‍☠️External Resources
    • Schools
    • Books & Wikis
    • Utilities
    • Interactive cheat sheets
    • Wordlists
Powered by GitBook
On this page
  • APT (Advanced Package Manager)
  • DPKG
  • GIT
  1. Linux Essentials
  2. Index

Packet management

Linux package managers are tools that automate installation, removal and management of software packages. Packages are archives that contain binaries of software, configuration files, information about dependencies and keep track of updates and upgrades. They go search this packages at repositories. Repositories are servers all around the world that contain the software packages and their metadata, when you download or update, the packet manager uses these repositories, they come by default in your Linux distribution and are associated to it. While technically possible to use packages from other Linux distributions, it's generally not recommended as it can lead to issues and conflicts with library versions, configurations, dependencies, etc. If you are most likely using Kali Linux for your cybersecurity studies, you are using a Debian-based distro, and therefore using the APT packet manager.

In Debian you can check or modify your repositories at /etc/apt/sources.list


APT (Advanced Package Manager)

apt update              #Updates information about the packages avaiable in the repository, "synchronizes" with it
apt upgrade             #Updates the packages you have in your system to the latest version fetched by the "apt update"
apt install abc         #Installs specified package
apt remove abc          #Uninstalls specified package but keeps the configuration files, so it you install it again keeps its old config
apt purge abc           #Uninstalls specified package fully, config files too
apt-cache search abc    #Searchs packets in the APT database downloaded from the repository, useful if we can't remember the name of the package to download
apt-cache show abc      #Shows detailed information on the package
apt list --installed    #Prints a list of all the installed packages in our system

DPKG

To install .deb Debian packages, we can also use dpkg

dpkg -i abc.deb             #Installs the specified package
wget url/package.deb && dpkg -i package.deb

GIT

We can download GitHub packages directly with. By default they will be downloaded to the current directory.

git clone https://url.git
git clone https://url.git ~/DirectoryToSave
mkdir ~/DirectoryToSave && git clone https://url.git ~/DirectoryToSave

Last updated 1 year ago

🐧