Chinese Hackers Distributing SMS Bomber Tool with Malware Hidden Inside

June 24, 2022 A threat cluster with ties to a hacking group called Tropic Trooper has been spotted using a previously undocumented malware coded in Nim language to strike targets as part of a newly discovered campaign. The novel loader, dubbed Nimbda, is “bundled with a Chinese language greyware ‘SMS Bomber’ tool that is most …

Chinese Hackers Distributing SMS Bomber Tool with Malware Hidden Inside Read More »

Critical PHP Vulnerability Exposes QNAP NAS Devices to Remote Attacks

June 24, 2022 QNAP, Taiwanese maker of network-attached storage (NAS) devices, on Wednesday said it’s in the process of fixing a critical three-year-old PHP vulnerability that could be abused to achieve remote code execution. “A vulnerability has been reported to affect PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24, and 7.3.x below 7.3.11 with improper …

Critical PHP Vulnerability Exposes QNAP NAS Devices to Remote Attacks Read More »

Kali Linux as Full Time OS in our Daily Life — Installing Office, Media and other

Before 2020 we don’t recommended Kali as a full time usable OS because of it’s root default user. Default root user is for advanced users only. Beginners could harm their-self as root (super user).

But with the 2020.1 update root user is not default. Like other normal Debian based distribution Kali also moved to non-root user in default which is more traditional security model.

It increase the use of Kali Linux as a daily Desktop OS, means no VMWare neither dual boot. We can use it to do day to day stuffs while we are not doing any penetration testing job.

kids using Kali Linux
Even kids are running Kali Linux.  Image Source:Twitter/kalilinux

Here a problem occurs that Kali Linux comes with it’s pre-installed penetration testing tools, and some simple and lightweight system tools(Thuner File Manager, Parole Media Player etc).

But this is not enough to run an Operating System in our daily life. For an example we simply can’t a docx (document file). So in this tutorial we will learn how we can use Kali in our daily life.

Installing Office Software in Kali Linux

For our official jobs and presentation works we frequently use MS Office in our Windows PC, but MS Office is not available in our Linux environment.

We can use LibreOffice in the place of MS office. Almost everything is same except the names and costs. LibreOffice is a lightweight and free tool with all the features of Microsoft Office.

libreoffice in Kali Linux

LibreOffice is a powerful and free office suite, used by lots of people around the world. Its have very clear interface and feature-rich tools help us unleash our creativity and enhance our productivity. LibreOffice includes several applications that make it the most versatile Free and Open Source office suite on the market.

Here are some LibreOffice application which are equivalent of Microsoft Office

  • LibreOffice Writer (word processing) = MS Word
  • LibreOffice Calc (spreadsheets) = Microsoft Excel
  • LibreOffice Impress (presentations) = Microsoft PowerPoint
  • LibreOffice Draw (vector graphics and flowcharts)
  • LibreOffice Base (databases), = MS Access
  • LibreOffice Math (formula editing)

LibreOffice is compatible with a ultrawide range of document formats such as Microsoft® Word (.doc, .docx), Excel (.xls, .xlsx), PowerPoint (.ppt, .pptx) and Publisher.

In Kali Linux we open terminal Window and update our system by using following command:

sudo apt-get update

After update we simply apply following command to install LibreOffice suit:

sudo apt-get install libreoffice -y

This command will install LibreOffice in our Kali Linux system, but it will take some time to install it depending our internet speed. Then we can easily use the office suit.

Install VLC Media Player

VLC media player is the most widely used media player in PC. It is an all-in-one media player. We can use this media player for playing most multimedia files as well as DVDs, Audio CDs, VCDs, and various streaming protocols. It is free and open source.

We can install this by using following command:

sudo apt-get install vlc -y

Above command will install VLC on or Kali Linux system. After that we can use VLC media player on our Kali Linux system.

Install Web Cam tool in Kali Linux

Almost all modern laptop comes with a WebCam but in Kali Linux distribution. We can’t use it to take selfies without configure. We need to install cheese to take snaps or record videos in Kali Linux. Its very easy we just use apt-get command to install it. Our command will be following:

sudo apt-get install cheese -y

Then we can use it from the multimedia apps or simply using cheese command.

Install Bluetooth in Kali Linux

Although Bluetooth is an old technology but it can be useful when we use Bluetooth speakers or attacking on Bluetooth devices. To install Bluetooth we run following command:

sudo apt-get install bluetooth bluez bluez-tools rfkill -y

Then it will install Bluetooth on our Kali Linux system, to activate it we use another command like following :

sudo service bluetooth start

After it we can see the Bluetooth icon in our top panel of Kali Linux and our we can use Bluetooth services.

Other Useful Installations

File Manager

We did not like Kali’s new Thuner File Manager although it is lightweight. Did you think previous GNOME’s File Manager was grate then this, then we can install it again by using following command:

sudo apt-get install nautilus-share -y

This command will bring back GNOME’s File Manager.

Special Terminal

Terminal lover like us ? Then try Terminator.

Terminator is a special terminal looks like GNOME default terminal but it have many features loaded like multi-window.

Laptop PC's comes with on board Wi-Fi. Now it becomes hard to install Wi-Fi drivers and use onboard Wi-Fi chipset when we have direct install
Terminator Multi-Window

We can install Terminator by using following command:

sudo apt-get install terminator -y

This will install terminator.

Installing Windows Application in Kali Linux

We can easily install Windows application in Kali Linux using Wine tool. Now Wine supports latest Windows applications. WINE is not an emulator. For more information we can check this article.

In this way we can do our daily stuffs using Kali Linux and use it as our full time daily based Operating System as well as penetration testing jobs.

Love our articles? Make sure to follow us on Twitter and GitHub, we post article updates there. To join our KaliLinuxIn family, join our Telegram Group. We are trying to build a community for Linux and Cybersecurity. For anything we always happy to help everyone on the comment section. As we know our comment section is always open to everyone. We read each and every comment and we always reply.

Researchers Uncover Ways to Break the Encryption of ‘MEGA’ Cloud Storage Service

June 23, 2022 A new piece of research from academics at ETH Zurich has identified a number of critical security issues in the MEGA cloud storage service that could be leveraged to break the confidentiality and integrity of user data. In a paper titled “MEGA: Malleable Encryption Goes Awry,” the researchers point out how MEGA’s …

Researchers Uncover Ways to Break the Encryption of ‘MEGA’ Cloud Storage Service Read More »

Russian Hackers Exploiting Microsoft Follina Vulnerability Against Ukraine

June 23, 2022 The Computer Emergency Response Team of Ukraine (CERT-UA) has cautioned of a new set of spear-phishing attacks exploiting the “Follina” flaw in the Windows operating system to deploy password-stealing malware. Attributing the intrusions to a Russian nation-state group tracked as APT28 (aka Fancy Bear or Sofacy), the agency said the attacks commence with a …

Russian Hackers Exploiting Microsoft Follina Vulnerability Against Ukraine Read More »

Newly Discovered Magecart Infrastructure Reveals the Scale of Ongoing Campaign

June 23, 2022 A newly discovered Magecart skimming campaign has its roots in a previous attack activity going all the way back to November 2021. To that end, it has come to light that two malware domains identified as hosting credit card skimmer code — “scanalytic[.]org” and “js.staticounter[.]net” — are part of a broader infrastructure used to carry …

Newly Discovered Magecart Infrastructure Reveals the Scale of Ongoing Campaign Read More »

Europol Busts Phishing Gang Responsible for Millions in Losses

June 23, 2022 Europol on Tuesday announced the dismantling of an organized crime group that dabbled in phishing, fraud, scams, and money laundering activities. The cross-border operation, which involved law enforcement authorities from Belgium and the Netherlands, saw the arrests of nine individuals in the Dutch nation. The suspects are men between the ages of …

Europol Busts Phishing Gang Responsible for Millions in Losses Read More »

RIG Exploit Kit Now Infects Victims’ PCs With Dridex Instead of Raccoon Stealer

June 23, 2022 The operators behind the Rig Exploit Kit have swapped the Raccoon Stealer malware for the Dridex financial trojan as part of an ongoing campaign that commenced in January 2022. The switch in modus operandi, spotted by Romanian company Bitdefender, comes in the wake of Raccoon Stealer temporarily closing the project after one of its team members …

RIG Exploit Kit Now Infects Victims’ PCs With Dridex Instead of Raccoon Stealer Read More »

New ToddyCat Hacker Group on Experts’ Radar After Targeting MS Exchange Servers

June 22, 2022 An advanced persistent threat (APT) actor codenamed ToddyCat has been linked to a string of attacks aimed at high-profile entities in Europe and Asia since at least December 2020. The relatively new adversarial collective is said to have commenced its operations by targeting Microsoft Exchange servers in Taiwan and Vietnam using an …

New ToddyCat Hacker Group on Experts’ Radar After Targeting MS Exchange Servers Read More »

Researchers Disclose 56 Vulnerabilities Impacting OT Devices from 10 Vendors

June 22, 2022 Nearly five dozen security vulnerabilities have been disclosed in devices from 10 operational technology (OT) vendors due to what researchers call are “insecure-by-design practices.” Collectively dubbed OT:ICEFALL by Forescout, the 56 issues span as many as 26 device models from Bently Nevada, Emerson, Honeywell, JTEKT, Motorola, Omron, Phoenix Contact, Siemens, and Yokogawa. “Exploiting these …

Researchers Disclose 56 Vulnerabilities Impacting OT Devices from 10 Vendors Read More »

Open Whatsapp chat
Whatsapp Us
Chat with us for faster replies.