Pinephone: Starting out with (DanctNIX Mobile) Arch Linux we go step by step through the process of adding BlackArch repositories. Then we try everything out installing Blackarch's radio tools for future SDR (Software Defined Radio) videos.
This is my first Danctnix video, and I've wanted to do one for a while. I was waiting for a good idea to make it stand out from other stable Mobian Phosh videos.
This is a perfect way to use DanctNIX. I don't think any other current (Pinephone) distro is as quickly capable to become a pentesting studio as this one.
I wasn't sure how things would workout, and some GUI programs will not open, but as I say in the video: the fun is on the commandline. :)
I hope you like this video. Be sure to give it a huge thumbs up! (Now! ;)), subscribe with the bell icon, and share this video with people who have interest in the Pinephone/Linux!
Thanks and I'll see you in the comments section. :D (comments help the channel move up as do likes/shares/subscribes!).
00:57 Enabling SSH for easy typing into Pinephone from computer
02:26 Here we are ssh'd into Pinephone on my laptop
02:49 We are starting the process now
06:54 Back on the Pinephone to test Blackarch tool running
Best way to help/support this channel grow (and help me push more content) is to Like, Share, and Comment on videos. Subscribe and hid the Bell icon now to show your support for the Channel! I thank you :)
### Installation commands:
# Verify the SHA1 sum
$ echo d062038042c5f141755ea39dbd615e6ff9e23121 strap.sh | sha1sum -c
# Set execute bit
$ chmod +x strap.sh
# Run strap.sh
$ sudo ./strap.sh
# Enable multilib following https://wiki.archlinux.org/index.php/... and run:
$ sudo pacman -Syu
### After above use the commands below to build your system how you want!
# To list all of the available tools, run
$ sudo pacman -Sgg | grep blackarch | cut -d' ' -f2 | sort -u
# To install all of the tools, run
$ sudo pacman -S blackarch
# To install a category of tools, run
$ sudo pacman -S blackarch-category
# To see the blackarch categories, run
$ sudo pacman -Sg | grep blackarch
# Note - it maybe be necessary to overwrite certain packages when installing blackarch tools. If
# you experience "failed to commit transaction" errors, use the --needed and --overwrite switches
# For example:
$ sudo pacman -Syyu --needed blackarch --overwrite='*'
I make no money doing this, if you want to show additional support, or interested in personalized dedicated ethical privacy/Linux lessons/consulting options (w/account on my dedicated hidden/private Nextcloud w/e2e chat)/custom work check out:
Also check our Odysee Videos Channel (LBRY): https://odysee.com/@RTP Odysee/LBRY allows you to earn crypto for watching videos on things that interest you on a new uncensored platform, or start your own free channel. You can then use that LBRY currency a couple ways including promoting your own videos. An uncensored platform using a unique setup. .
Video Editing Done In Free Open Source: Kdenlive
Blackarch website: https://www.blackarch.org
1. Install Docker (https://www.docker.com/get-started)
2. Run those commands in the Terminal:
docker pull opensecurity/mobile-security-framework-mobsf
docker run -it -p 8000:8000 opensecurity/mobile-security-framework-mobsf:latest
4. Open the browser on the specified port
5. Drag APK of necessary app and perform analysis
6. Review the analysis and save as PDF if needed
0:40 Discussing specific Application
1:25 Preparing the environment
2:43 MobSF installation completed
2:53 Performing the analysis of the APK file
More about MobSF:
DIVA app download:
If you found this video useful please consider subscribing and/or donating using the links below.
💰 Support me (for NEW videos!):
This presentation will highlight some of the most exciting and shocking methods by which my team and I routinely let ourselves in on physical jobs.
Many organizations are accustomed to being scared at the results of their network scans and digital penetration tests, but seldom do these tests yield outright "surprise" across an entire enterprise. Some servers are unpatched, some software is vulnerable, and networks are often not properly segmented. No huge shocks there. As head of a Physical Penetration team, however, my deliverable day tends to be quite different. With faces agog, executives routinely watch me describe (or show video) of their doors and cabinets popping open in seconds.
Presenter: Deviant Ollam - https://enterthecore.net/
Event: Wild West Hackin' Fest 2017
Special thanks to Wild West Hackin' Fest for letting us share their talks.