CYBER 101

  • Alerts
  • Blog
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Domains
  • FAQ
  • Incidents
  • Tutorials

Subscribe to our newsletter

FOLLOW US

No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Jobs
  • Vendors
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
  • Jobs
  • Vendors
Get Help
CyberMaterial
Home Tool

Wifislax

Reading Time: 2 mins read
in Forensics, Software, Tool

Wifislax is an open source Linux operating system based and inspired by the Slackware Linux distribution. It’s main goal is to support the latest Wi-Fi technologies.

The system provides out-of-the-box support for a wide range of wireless and wired network cards.

In addition, it contains a large number of security and forensics tools, which transforms it into a pentesting (penetration testing) distro.

Distributed as a dual-arch Live CD

It is distributed as a single Live CD ISO image that can run on both 64-bit and 32-bit CPUs.

It integrates various unofficial network drivers, directly into the Linux kernel provided by the Slackware project.

Boot options

The boot menu is quite different from the ones used in other Linux distributions. For example, it includes two entries for running the live environment with a normal or PAE kernel (useful if you have more than 4GB of RAM), a hardware detection tool, a memory testing tool, and support for qwerty keyboards.

When pressing on one of the two kernel options for running the live environment, users will be presented with many other options, including Wifislax with KDE (persistent or not), Wifislax with Xfce (persistent or not), text mode, copy to RAM, safe graphics mode, and ACPI Off.

Uses the KDE Plasma desktop environment

Booting into the KDE environment, with persistent mode enabled to save your session, seams to be the best choice for the new Wifislax user. It provides a familiar user interface, with popular open source applications, such as the Mozilla Firefox web browser, ISO Master, XMMS audio player, and SMPlayer video player.

Includes many security-related apps

Among the included security and forensics utilities, we can mention Airssl, CookieMonster, WeapE, Yamas, several decrypters for Spain, Germany, Italy and Mexico, Dumpzilla, Grampus, WPSCrackGUI, Reaver, Inflator, Bully, Dnsenum, Evilgrade, and much more.

Start your hacking career with Wifislax

If you’re a novice hacker, we strongly suggest to start your hacking career with the Wifislax Linux operating system. It is uses the reliable and stable functionality of the Slackware OS, many powerful applications and two different desktop environments, all in a single CD-size ISO image.

VISIT SOURCE

Tags: Drive by attackForensicsNetwork SecurityPenetration TestingPenTestingSoftwaretool of the dayVM
ADVERTISEMENT

Related Posts

Lexar LJDF35-128BNL Jumpdrive Fingerprint

Lexar LJDF35-128BNL Jumpdrive Fingerprint

January 24, 2023
YubiKey Bio Series – FIDO Edition

YubiKey Bio Series – FIDO Edition

January 24, 2023
Kaa IoT

Kaa IoT

December 29, 2022
ThingsBoard

ThingsBoard

December 29, 2022

More Articles

Alerts

CISA Releases Security Advisory for InterNiche Products

August 5, 2021
Alerts

[Control Systems] Mitsubishi Electric security advisory (AV22-026)

January 14, 2022
Course

On Premises Management, Security, and Upgrade

April 21, 2022
Incidents

Juniper Networks Releases Security Updates for Multiple Products

January 13, 2022
Alerts

[Control Systems] Trane Security Advisory

October 20, 2021
Book

Deep Faked

December 6, 2020
Certification

Certificate of Cloud Auditing Knowledge

March 25, 2022
Document

Decoy Systems: A New Player in Network Security and Computer Incident Response

January 21, 2022
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.