Xe1phix

Xe1phix

##-=================================================-##
## ParrotSec - Create A LUKS Encrypted Persistent USB, With A Kill Slot.
## Then Backup, Encrypt/Decrypt (OpenSSL), and restore The LUKS Headers.
##-=================================================-##

##-=================================================-##
## [+] How to create a persistent, LUKS encrypted USB device With Parrot Linux
##-=================================================-##
--> How to format the usb with Parrot Linux.
--> How to create an additional persistent partition.
--> How to encrypt the persistent partition.
--> How to add a Nuke Slot to the LUKS header.
--> How to Create a binary backup of the LUKS header.
--> How to encrypt the LUKS header with OpenSSL for secure storage.
--> How to Restore a binary backup of the LUKS header.
--> How to securely wipe data (6 different methods).

## You can find all the syntax used in this presentation on my GitLab Repo:
https://gitlab.com/xe1phix/ParrotSecWiki/blob/InfoSecTalk/ParrotSecEncryptedPersistentUsbNukeSlot-v4.5.sh

## My HackerCon CFPs can be found on my GitLab as well:
https://gitlab.com/xe1phix/ParrotSecWiki/tree/InfoSecTalk/InfoSec-CFP-Submissions

## YouTube Version:
https://www.youtube.com/watch?v=kl6LlyMGQYo

## Archive.org Version:
https://archive.org/details/ParrotSecLUKSEncryptedPersistentUSBWithKillSlot

## Bitchute Version:
https://www.bitchute.com/video/aRCwwvHFr2yh/

##-=================================================-##
## [?] If you have any questions, Feel free to reach out to me!
## Or leave a comment in the video. I'll respond as soon as I can.
## Thanks for watching!
##-=================================================-##

##-=================================================-##
## [?] You can find all of the Xe1phix Linux tutorials On:
## YouTube, Vimeo, Archive.org, and Bitchute!
##-=================================================-##
## ---------------------------------------------------------------------------------------------------------------------- ##
## [!] https://archive.org/details/@xe1phix
## ---------------------------------------------------------------------------------------------------------------------- ##
## [!] https://www.youtube.com/channel/UC4rzx4VToyHJDWbAEJ5cMxQ/videos
## ---------------------------------------------------------------------------------------------------------------------- ##
## [!] https://www.bitchute.com/channel/U0QCI90XuSH9/
## ---------------------------------------------------------------------------------------------------------------------- ##

## Command Used:
cat -vET /proc/cmdline | xxd

## My kernel parameters:
ro nosuid noipv6 nonet security=apparmor apparmor=1 kalsr noautomount

## Kernel.org Kernel Parameters Documentation:
https://www.kernel.org/doc/Documentation/admin-guide/kernel-parameters.txt

## Kernel Boot Command-Line Parameter Reference:
https://gitlab.com/xe1phix/BootTimeKernelConfigurations/blob/master/Kernel%20Boot%20Command-Line%20Parameter%20Reference.pdf

## Youtube URL:
https://www.youtube.com/watch?v=nKsRRLljCkY

## Archive.org URL:
https://archive.org/details/PrintingKernelParametersOnALiveSystem

## This video covers blanking (1 wipe) my 4TB external drive with nwipe.

## Youtube URL:
https://www.youtube.com/watch?v=B7skp80Ge3s

## Archive.org URL:
https://archive.org/details/BlankingADiskWithNwipe

Commands used:

fdisk -l /dev/sda
smartctl -a /dev/sda
smartctl -l error /dev/sda
smartctl -H /dev/sda
smartctl --scan
smartctl -P showall | less

## Youtube URL:
https://www.youtube.com/watch?v=F-B9XLdByGw

## Archive.org URL:
https://archive.org/details/UsingSmartctlToExamineSATAATASmartData

## GPG Key URLs:
https://ftp-master.debian.org/keys.html
https://tails.boum.org/doc/about/openpgp_keys/index.en.html

## Curl Commands Used:
curl --tlsv1.2 --verbose --url https://tails.boum.org/tails-signing.key --output ~/Downloads/tails-signing.key

curl --tlsv1.2 --verbose --url https://ftp-master.debian.org/keys/archive-key-9.asc --output ~/Downloads/archive-key-9.asc

curl --tlsv1.2 --verbose --url https://ftp-master.debian.org/keys/archive-key-9-security.asc --output ~/Downloads/archive-key-9-security.asc

##-=========================================-##
## GPG Key Fingerprints:
## Don't trust me, verify them yourself!
##-=========================================-##

A490 D0F4 D311 A415 3E2B B7CA DBB8 02B2 58AC D84F
A490 D0F4 D311 A415 3E2B B7CA DBB8 02B2 58AC D84F

E1CF 20DD FFE4 B89E 8026 58F1 E0B1 1894 F66A EC98
E1CF 20DD FFE4 B89E 8026 58F1 E0B1 1894 F66A EC98

6ED6 F5CB 5FA6 FB2F 460A E88E EDA0 D238 8AE2 2BA9
6ED6 F5CB 5FA6 FB2F 460A E88E EDA0 D238 8AE2 2BA9

## Youtube URL:
https://www.youtube.com/watch?v=1j2jwICnPtU

## Archive.org URL:
https://archive.org/details/SecurelyDownloadingGPGKeysUsingCurl

## Verify the integrity of files downloaded from the FDroid repo.
## Use FDroid's public GPG key to check the signatures of the packages downloaded.

## This video covers maintence and updating Lineage & FDroid.

## Xe1phix's FDroid-GnuPG-Verification GitLab Repo:
https://gitlab.com/xe1phix/FDroid-GnuPG-Verification

## The commands used in this video can be found on my GitLab:
https://gitlab.com/xe1phix/FDroid-GnuPG-Verification/blob/master/Xe1phix-GnuPG-Trusting-FDroid-V4.3.sh

## FDroid GPG Signing Key (Found On Their GitLab Repo):
https://gitlab.com/fdroid/fdroidclient/blob/master/f-droid.org-signing-key.gpg

## All the GPG Fingerprints Can Be Found Here:
https://f-droid.org/docs/Release_Channels_and_Signing_Keys/?title=Release_Channels_and_Signing_Keys

## FDroid Binary With GPG Signature:
https://f-droid.org/FDroid.apk
https://f-droid.org/FDroid.apk.asc

## FDroid QR Code:
https://f-droid.org/assets/download-fdroid-qr.png

## Youtube URL:
https://www.youtube.com/watch?v=Lm34_DGm85s

## Archive.org URL:
https://archive.org/details/VerifyingFDroidRepositoryPackagesRound2FDroidPackageUpdatesMaintance

## Debian Sources.list:
https://wiki.debian.org/SourcesList

## Run pluma text editor as superuser:
gksu --sudo-user /usr/bin/pluma

## Sources.list file location:
/etc/apt/sources.list

## Youtube Version:
https://www.youtube.com/watch?v=evnctB_zdhY

## Archive.org Link:
https://archive.org/details/AddingTheDebianRepositoryToParrotLinuxUsingSources.list

## Modify your wireless card TX-Power

## The default TX-Power of wireless is set to 20 dBm
## Lets Hack it to 30 dB.

## ----------------- [!] WARNING [!] ----------------- ##
## Check your countries legal spectrum.
## Modifying your TX-Power outside of the limits
## can be illegal in your country.
## ----------------- [!] WARNING [!] ----------------- ##

## Youtube URL:
https://www.youtube.com/watch?v=DLMBDzd5iDk

## Archive.org URL:
https://archive.org/details/ModifyWirelessChipsetTxpower

## Converting EPUB files into PDFs - using Calibre

## The File I Used In The Video Can Be Found on My GitLab:
https://gitlab.com/xe1phix/Doc/blob/master/Calibre.sh

## YouTube Version:
https://www.youtube.com/watch?v=5K0H8jiLEIA

## Archive.org Version:
https://archive.org/details/ConvertingEpubFilesIntoPdfsUsingCalibre

## Verify the integrity of files downloaded from the FDroid repo.
## Use FDroid's public GPG key to check the signatures of the packages downloaded.

## Xe1phix's FDroid-GnuPG-Verification GitLab Repo:
https://gitlab.com/xe1phix/FDroid-GnuPG-Verification

## The commands used in this video can be found on my GitLab:
https://gitlab.com/xe1phix/FDroid-GnuPG-Verification/blob/master/Xe1phix-GnuPG-Trusting-FDroid-V4.3.sh

## FDroid GPG Signing Key (Found On Their GitLab Repo):
https://gitlab.com/fdroid/fdroidclient/blob/master/f-droid.org-signing-key.gpg

## All the GPG Fingerprints Can Be Found Here:
https://f-droid.org/docs/Release_Channels_and_Signing_Keys/?title=Release_Channels_and_Signing_Keys

## FDroid Binary With GPG Signature:
https://f-droid.org/FDroid.apk
https://f-droid.org/FDroid.apk.asc

## FDroid QR Code:
https://f-droid.org/assets/download-fdroid-qr.png

## Youtube URL:
https://www.youtube.com/watch?v=83UU6-m71Ok

## Archive.org URL:
https://archive.org/details/Xe1phixFDroidVerifyPackagesAgainstGPGKey

## Vimeo URL:
https://vimeo.com/293837809

SHOW MORE

Created 1 month ago.

33 videos

CategoryEducation

Linux System Engineer, Studying Memory Forensics, & Intrusion Detection.
GnuPG Key: https://gitlab.com/xe1phix/Gnupg/blob/master/Xe1phix.asc