this post was submitted on 22 Jun 2024
553 points (96.0% liked)

Technology

34977 readers
117 users here now

This is the official technology community of Lemmy.ml for all news related to creation and use of technology, and to facilitate civil, meaningful discussion around it.


Ask in DM before posting product reviews or ads. All such posts otherwise are subject to removal.


Rules:

1: All Lemmy rules apply

2: Do not post low effort posts

3: NEVER post naziped*gore stuff

4: Always post article URLs or their archived version URLs as sources, NOT screenshots. Help the blind users.

5: personal rants of Big Tech CEOs like Elon Musk are unwelcome (does not include posts about their companies affecting wide range of people)

6: no advertisement posts unless verified as legitimate and non-exploitative/non-consumerist

7: crypto related posts, unless essential, are disallowed

founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] lnxtx@feddit.nl 7 points 5 months ago (1 children)
[–] ripcord@lemmy.world 10 points 5 months ago (1 children)
[–] nexussapphire@lemm.ee 3 points 5 months ago (1 children)

That good and all for your saints and what not but how about us sinners.

[–] Whitebrow@lemmy.world 5 points 5 months ago (1 children)
[–] nexussapphire@lemm.ee 6 points 5 months ago (1 children)

You mean that distro people use to pretend to be a hacker/security researcher. It's just hardened Debian with a few tools installed. I've set something like that up in an afternoon tbh.

[–] Iapar@feddit.de 3 points 5 months ago (1 children)

You don't need to invest an afternoon because Kali exists.

The point ist that you can't do it yourself, the point is to get something running quick without much hassle.

[–] nexussapphire@lemm.ee 1 points 5 months ago

Don't take it personally, it's just a direction I haven't seen many researchers/pen testers use. I've seen most run it on a virtual machine or a second computer and modify Ubuntu/Debian to better suit their needs and a primary computer/os for business transactions etc.

I can't speak for hackers but from anecdotal evidence it seems like they can do their work on most systems but hacking hardware is just easier on Linux in general.