Tag: raw sockets
WSL2 does not appear to be shipped with Windows 10 1903
by zitstif on May.21, 2019, under Posts, Videos
Windows Subsystem for Linux (WSL) is a great way to run a Linux environment within Windows 10 locally without having to rely on cygwin or using virtual machines.
It is not without its limitations. For instance, raw sockets are not supported so that means if you want to really utilize tools like nmap, you won’t be able to do so. However, from what I’m gathering, it sounds like WSL2 will support raw sockets.
As of today, I’ve updated my home lab Windows 10 systems to the newest non-insider build (Version 1903 (OS Build 18362.116)) and it was my hope that WSL2 would be included. Unfortunately, this is not the case. The wsl.exe command does not have a –set-version parameter yet and a newly installed debian on the my test system with nmap still produces raw socket related errors.
I have high hopes for what will become of WSL. For more information, take a look at this video:
-
Welcome to #!/zitstif.no-ip.org/
-
Recent Posts
- Hacking the Arlo Q Security Camera: Firmware Extraction
- My TLDR version of Zero Trust Computing/Networking
- Elliptic Curve Cryptography Overview ( F5 DevCentral )
- SSH Client as a Quick and Dirty Port Scanner
- Domain Controller/Active directory over Meraki VPN fix
- Cisco Meraki security is kind of a joke…
- IPMI EVERYWHERE! w/The Pi-KVM – Level1Techs
- 1283 A Lock Picking Game Changer (LockPickingLawyer)
- Portable virtual lab that fits in your pocket
- Pentesting with Evil WinRM – Practical Exploitation [mubix]
Calender
June 2023 S M T W T F S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 Blogroll
- .:: Phrack Magazine ::.
- @GelosSnake
- 100-hacking-tools-and-resources [hackerone.com]
- 2600: The Hacker Quarterly
- Academic Torrents
- Amneiza VPN. Your own self-hosted VPN
- Amnesty Tech | Amnesty International
- anderspitman / awesome-tunneling
- Ansible is Simple IT Automation
- Anti Fraud News Blog | AntiFraudNews.com
- AppleExaminer Home
- Arch Cloud Labs – Projects
- Armis
- ARPSyndicate / awesome-intelligence
- Atek – An open source peer-to-peer Home Cloud | Atek.Cloud
- Attack-Defense Online Lab
- Autonomous Red Teaming for Everyone | Prelude Operator
- awesome-incident-response
- BackBox Linux | Flexible Penetration Testing Distribution
- BackTrack Linux
- Binary Revolution Forums
- BIOS Master Password Generator for Laptops
- BleepingComputer.com
- Blog – Black Hills Information Security
- Blog – NotSoSecure
- Blog | GoSecure
- BREAKDEV
- Brute Ratel C4 | Badger doesn't care. It takes what it wants!
- ByteXD – Practical Tutorials for Web Developers & Entrepreneurs
- carnal0wnage.attackresearch.com
- CCC | Startseite
- Cisco Talos Intelligence Group
- Cloud-Free-Tier-Comparison
- Cloudflare
- CloudSecDocs
- Cockpit Project – Cockpit Project
- Command Line Kung Fu
- command-not-found.com
- CommandLineFu
- Computer Forensics World
- Core Security Technologies (Blog)
- CrowdSec: the next-gen open source, crowd-powered, & dynamic firewall
- Cryptome
- CS6038/CS5138 Malware Analysis, UC
- CSI Linux
- CVE security vulnerability database
- Cyber Arch Blog
- Dark Operator
- Dark Reading
- Darknet – The Darkside | Ethical Hacking
- DeCloudUS – Privacy DNS Blocks Google, Ads, and More
- Default Password List for Routers
- Default passwords list
- Digital Experience Monitoring | ThousandEyes
- Digital Forensiscs, Computer Forensics, eDiscovery | ForensicFocus.com
- DigitalMunition – Ethical Hacking & Computer Security
- DiscMaster
- Distributed Denial of Secrets
- Distributed Denial of Secrets
- Diversion – the Router Ad-Blocker
- DNS-based Content Filtering and Security (cleanbrowsing.org)
- Docker.com
- DSLReports Home Broadband ISP reviews, news, tools and forums
- DZone Security
- Electronic Frontier Foundation
- Escape Big Tech
- Exotic Liability
- Exploit Education
- Exploits Database by Offensive Security
- Felix Krause
- FingerprintJS Blog | FingerprintJS
- Firezone: Open-Source WireGuard VPN Server – firezone.dev
- Fleet | Open-source device management (MDM)
- FOG Project
- Forbidden Stories
- Forensics Wiki
- Free RMM Tools for MSP and Small Businesses (action1.com)
- FreeIPA – Open Source Identity Management Solution
- FTPrivacy.cloud
- Ghetto Forensics
- Ghidra
- GNS3 | The software that empowers network professionals gns3.com
- GNUCITIZEN
- Golem Network
- GPSJam GPS/GNSS Interference Map
- Gramine – a Library OS for Unmodified Applications
- GRAVITL
- GTFOBins
- Guadicore: Cloud and Data Center Security Simplified
- Guardicore
- Hack A Day
- HackDojo
- HackerOne – Bug Bounty program
- HackerspaceWiki
- Hacking-Printers
- HackTricks
- Hak5
- Handshake
- Hash Generator
- hdm.io
- HITB
- HolisticInfoSec
- Home – NetBlocks
- Home – OpenDaylight
- Home – Virtue Security
- Home | endoflife.date
- Home | OpenSCAP portal
- Homepage | CISA
- HoneyDB
- How-To Geek
- I2P Anonymous Network
- Infisical | Open Source SecretOps
- InfoSec Institute
- Infosec Island
- InfosecMatter
- Inj3ct0r – exploit database
- Innernet
- Insecure Magazine
- Inside Laura's Lab
- Instructables – Technology
- Invisible Things Lab
- IPDetective
- IPDS – Domain Name System for IPFS
- IronGeek
- iSecur1ty
- IT Security – stackexchange.com
- ITFlow
- James Brine – Australian Cyber Threat Intelligence
- Kali Linux
- Kali Linux / Kali-purple
- Katacoda – Interactive Learning Platform for Software Engineers
- Keycloak
- Keycloak
- KitPloit – PenTest Tools for your Security Arsenal
- Kon-boot
- Krebs On Security
- LaNMaSteR53.blog
- Learn Pentesting Online
- LibreNMS
- Lifehack – Tips for Life
- Lifehacker
- Linux Kodachi 6.2 The Secure OS
- Linux Security
- LinuxGizmos.com: embedded Linux news & devices
- Live Hacking
- LiveOverflow – YouTube
- LMG Security
- MalwareTech
- Malwr – Malware Analysis by Cuckoo Sandbox
- Mandiant Blog
- MASS | Metal as a Service
- Metasploit Blog
- Metasploit Unleashed – Mastering the Framework
- MG
- Mininet: An Instance Virtual Network on your Laptop (or other PC)
- MITRE ATT&CK
- Mobile Verification Toolkit
- MorningStar Security News
- Moxie Marlinspike >> Thoughtcrime Labs
- MSPGeek a free MSP Community for all Service Providers
- Nagios – The Industry Standard in IT infrastructure monitoring
- NetBox.dev
- NETSEC – Ramblings of a NetSec addict
- Network Engineering Stack Exchange
- Network World
- news.ycombinator.com
- nixCraft – (www.cyberciti.biz)
- nrd-list.com
- NTLM Decrypter
- Objective-See
- Offensive-Security
- offsec.tools
- OmniEdge | Unlimited Computers In Your Private Network
- OnionScan: Investigating the Dark Web
- Online – Reverse Shell Generator
- Online LM hash cracking engine
- Online Password Hash Crack
- Open Network Operating System (ONOS)
- Open-AudIT
- OpenBSD Router Guide
- openITCOCKPIT | Open Source Monitoring
- OpenNIC Project
- OpenProject – Open Source Project Management Software
- OpenSecrets
- OpenSecurity
- OpenSecurityTraining
- OpenWISP: Open Source Network Management System
- OpenZiti
- Opt out of global data surveillance programs like PRISM, XKeyscore and Tempora.
- OSINT Framework
- OSINT Tools for the Dark Web
- osquery | Easily ask questions about your Linux, Windows, and macOS Infrastructure
- osTicket | Support Ticketing system
- OWASP
- Packet Life
- PacketStorm Securtiy
- Parrot Security
- Passbolt | Open source password manager for teams
- PaulDotCom
- Penetration Testing and Vulnerability Analysis Polytechnic Insitute
- Penetration Testing Lab
- Pentester Academy TV – Youtube
- Pentester Academy: Learn Pentesting Online
- Pentester's Promiscuous Notebook
- PenTestIT
- PentHertz Blog
- Peteris Krumins' Blog
- phpIPAM IPAM IP address management software
- Pi-hole
- Pi-KVM – Open and cheap DIY IP-KVM on Raspberry Pi
- PiKVM – Open and inexpensive DIY IP-KVM on Raspberry Pi
- polyswarm.io Blog
- Pomerium
- Portcullis Labs
- Pritunl, Enterprise Distributed OpenVPN, IPsec and WireGuard Server
- Privacy is sexy – Enforce privacy
- PrivacyTools – Encryption Against Global Mass Surveillance
- Project Honey Pot
- Project Zero (Google)
- Pwnagotchi – Deep Reinforcement Learning
- Qubes OS: A reasonably secure operating system
- RANCID – Really Awesome New Cisco confIg Differ
- rConfig – Network Configuration Management!
- reptile[.]haus[/]blog/
- RiskIQ Community Edition
- Risky Business
- Ronin
- ROOter by Modems and Men
- Routerpwn
- SaltStack: Home
- samy kamkar – home
- Sanesecurity signatures: improve ClamAV detection rate
- SANS Digital Forensics Blog
- SANS Penetration Testing Blog
- Schneier on Security
- SDF Public Access UNIX System – Free Shell Account and Shell Access Est. 1987
- SecLists
- SecLists
- secret club | Blog about reverse-engineering, hacking, and breaking your software in ever way
- Secure Data Recovery Services
- SecureDrop.org – Share and accept documents securely
- Security Awareness Training | KnowBe4
- Security Database Tools Watch
- Security Insights | AdaptiveMobile
- Security Onion Solutions
- Security Research | mr.d0x
- Security Watch
- SecurityFocus
- SecurityTube.net
- SecurityTube.net Hack of the Day
- SentinelLabs – Intelligence Redefined
- Server Fault
- ServeTheHome: Server, Storage, and Software Reviews
- Sevro Security | SS
- Shell is coming …
- Shell.Systems – WE POP SHELLS
- Shelter Project
- shieldwall – secure your most private servers – shieldwall.me
- SHODAN – Computer Search Engine
- Signal >> Home
- Silent Break Security Blog
- SkullSecurity
- Slashdot
- Snipe-It Free open source IT asset management
- SNOsoft Research Team
- Social Engineering – Security Through Education
- SpiderFoot
- SpiderFoot HX – SpiderFoot
- Spork: Peer-to-peer socket magic in the air | Spork.sh
- Spy Culture | Intelligence Agencies and Popular Culture
- Stack Exchange
- Stop Ransomware | CISA
- Sucuri Blog
- Sunny Valley Networks – Agile Service Edge Security
- Super User
- Synacktiv Publications
- T E X T F I L E S
- Tails OS
- Tailscale – private networks made easy
- Tales from a Security Professional
- The Art of Mac Malware
- The Black Vault
- The C2 Matrix
- The Citizen Lab – University of Toronto
- The Ethical Hacker Network
- The Exploit Database
- The Free Thought Project – Your online news and discussion platform
- The No More Ransom Project
- The Pragmatic Bookshelf
- The Shadowserver Foundation
- the world.according to koto
- the-infosec
- TheHive Project
- THN: The Hacker News
- threatpost | The First Stop for Security News
- TinyPilot
- Tools to explore BGP
- Top 100 Network Security Tools
- Tor Project | Anonymity Online
- TorBox – TorBox is an easy to use, anonymizing router based on Raspberry Pi.
- Troy Hunt: Troy Hunt
- TrustedSec News and Events (Blog)
- tssci security
- Unimus by NetCore j.s.a
- Unmask Parasites. Blog.
- UrBackup – Client/Server Open Source Network Backup
- Veil – AV Evasion
- Ventoy – A New Bootable USB Solution
- VIPER VAST
- virtuallyGhetto
- VoidSec
- Volatile Systems Blog
- Vulners – Vulnerability Data Base
- w3af – Open Source Web Application Security Scanner w3af.org
- War Room
- Welcome | authentik
- Welcome to Enable Sysadmin | Enable Sysadmin
- What is this? Red Teaming Experiments
- What's My Pass?
- WhoTracks.me – Bringing Transparency to Online Tracking
- WikiLeaks
- Will Hack For SUSHI
- Windows Command Line -CMD commands, command prompt, batch files, Powershell
- Wiz: Cloud infrastructure security reimagined
- Word List Downloads
- xorl
- ZeroTier – Global Area Networking