Infondlinux A Script For Security Tools-Tutorial

Ethical hacking/penetration testing process requires a list of different automatic tools that helps to perform the job easier, effective, reliable and less time consumer. Normally a penetration tester creates their own toolkit for their job, but what if there is a script that will provides the effective tools on a single place that will be really help full.

Normally, in a penetration toolkit there is some sort of vulnerability scanner, vulnerability management, a port scanner (Nmap recommended), cracking tool(hydra, john the ripper etc), some tools for information gathering tools, IDS and the other tools include, or it depend on the nature of the test that will going to held.

Infondlinux is a bash script that provides a list of security tools and it is designed for Ubuntu Linux, it is a open source script and easy to use and it provides a comprehensive tools to perform a quick pen-test.

  • First way is to copy and paste the whole code in text editor and save it to infondlinux.sh
  • The second and recommended way to use terminal to download this script, open terminal and type.

How To Use Infondlinux
This tutorial is for how to install these tools on ubuntu, once you have downloaded the script by using previous method open terminal(you must be on a place where the script has been downloaded before).
After you need to read the script by using sudo command now type exactly.
$ sudo sh infondlinux.sh 

# - vim 
# - less 
# - gimp
# - build-essential 
# - wipe 
# - xchat 
# - pidgin 
# - vlc 
# - nautilus-open-terminal
# - nmap
# - zenmap
# - sun-java6-plugin et jre et jdk
# - bluefish
# - flash-plugin-nonfree
# - aircrack-ng
# - wireshark
# - ruby
# - ascii
# - webhttrack
# - socat
# - nasm
# - w3af
# - subversion
# - wireshark
# - mercurial
# - libopenssl-ruby
# - ruby-gnome2
# - traceroute
# - filezilla
# - gnupg
# - rubygems
# - php5
# - libapache2-mod-php5 
# - And More

Note: If you enjoyed this post, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...