Author: Ruwantha Nissanka

4 ways to hide your identity using linux

Being able to change your IP address and other network information is a useful skill because it will help you access other networks while appearing as a trusted device on those networks. For example, in a denial­-of­-service (DoS) attack, you can spoof your IP so that that the attack appears to come from another source, thus helping you evade IP capture during forensic analysis. This is a relatively simple task in Linux, and it’s done with the ifconfig command. Step 01 : Changing Your IP Address To change your IP address, enter ifconfig followed by the interface name. For example, to assign the IP address to interface eth0, you would enter the following: #ifconfig eth0 When you do this correctly, Linux will simply return the command prompt and say nothing. When you again check your network connections with ifconfig, you should see that your IP address has changed to the new IP address you just assigned. Step 02 : Changing Your Network Mask and Broadcast Address You can also change your network mask (netmask) and broadcast address with the ifconfig command. For instance, if you want to assign that same eth0 interface with a netmask of and a broadcast address of, you would enter the following: #sudo ifconfig eth0 netmask broadcast Step 03 : Spoofing Your MAC Address You can also use...

Read More

How To Install Kali Linux in Virtualbox

In our previous article, we have discussed about how to download the kali linux image file and how to install virtualbox. Now let’s get you started with the virtual machine. Step 01 : Open Virtualbox VirtualBox should open once it has installed. Now you should be greeted by the VirtualBox Manager Step 02 : Create a new virtual machine Since we will be creating a new virtual machine with Kali Linux, click New in the upper­left corner. This opens the Create Virtual Machine dialog shown below. Give your machine a name and then select Linux from the Type drop­down menu. Finally, select Debian (64­bit) from the third drop­down menu (unless you are using the 32­bit version of Kali, in which case select the Debian 32­bit version). Step 03 : Allocate system resources Here, you need to select how much RAM you want to allocate to this new virtual machine. The more RAM you give your virtual machine, the better and faster it will run, but you must also leave enough RAM for your host operating system and any other virtual machines you might want to run simultaneously. Your virtual machines will not use any RAM when you are not using them, but they will use hard drive space. Click Next, and you’ll get to the Hard Disk screen. Choose Create Virtual Hard Disk and click Create. In the next...

Read More

Kali Linux : The OS That Hackers Use

If you are familiar with cyber security stuff, you must have heard about kali linux. Kali linux is a operating system developed by offensive security and it was specifically targeted for penetration testers. This linux distribution is built on Debian and it comes pre installed with many more security tools. In this guide, we will see how to install this operating system in a virtual environment. Step 01 : Downloading Kali linux Go to From the home page, click the Downloads link at the top of the page. On the Downloads page you’ll be faced with multiple download choices. Step 02 : Choose the right image file It’s important to choose the right image file to download. Along the left side of the table, you will see the image name, which is the name of the version that the link downloads. For instance, the first image name listing I see is Kali Linux 64 Bit, meaning it’s the full Kali Linux and is suitable for 64­bit systems—most modern systems use a 64­bit Intel or AMD CPU. To determine what type of CPU is on your system, go to Control Panel ▸ System and Security ▸ System, and it should be listed. If your system is 64­bit, download and install the 64­ bit version of the full Kali (not Light or Lxde, or any of the other alternatives). If...

Read More

Over 16,000 readers, Get fresh content from “The Linux juggernaut”

Email Subscribe


My photo
My name is Surendra Kumar Anne. I hail from Vijayawada which is cultural capital of south Indian state of Andhra Pradesh. I am a Linux evangelist who believes in Hard work, A down to earth person, Likes to share knowledge with others, Loves dogs, Likes photography. At present I work at Bank of America as Sr. Analyst Systems and Administration. You can contact me at surendra (@) linuxnix dot com.