Docs - Ninjutsu OS
Docs - Ninjutsu OS
docs
Documentation (Updated 17/05/2020)
An important part of any operating system is documentation, the technical manuals which describe the operation and
Hasan use of programs.
Cyber Security Specialist
As part of its efforts to create a high-quality operating system, the Ninjutsu Project is making every effort to provide
PO ST C AT EGO RIES TAGS
all of its users with proper documentation in an easily accessible form.
1 0 0 The documentation is a continuous work in progress, and all Ninjutsu users are invited to contribute to the creation
and translation process of this portal.
Follow
R4
LINKS
R5
R EC EN T
2020-04-18
What -Is-Ninjutsu-OS
R6
A R C H I V ES
April 2020 1
R7
C ATA L O GU E Screen
5.1.1 Useing third-party tools : Ninjutsu contains more than 800 tools that are geared towards various information security tasks, such as Penetration
Testing, Red Teaming, Malware analysis, Android Penetration Testing, and Reverse Engineering. Ninjutsu is created
5.2 Linux
and customize by Hasan Al-Qawzai (Information security expert) .
5.3 MacOS
Ninjutsu Project was released on the 08th May, 2020.
6 User Guide
11 How To Install Ninjutsu OS in Oracle VM VirtualBox : Remove/Disable many Windows programs and services.
13.1.11 Metasploit framework Before you run Ninjutsu OS, or install it to your hard disk, you want to be very sure that what you’ve got actually is
13.1.12 Sqlmap Ninjutsu OS, and not an imposter. Ninjutsu is a professional penetration testing and red teaming toolkit. As a
13.1.13 W3AF vulnerability scanner professional penetration tester, having absolute confidence in the integrity of your tools is critical: if your tools aren’t
trustworthy, your investigations won’t be trustworthy, either.
13.1.14 Amass
13.1.15 sherlock
Windows
13.1.16 Remove Docker containers
Screen
4- Open the Checksum Calculator Click the Browse next to the file box and browse to the file you want to check. Select
“Ninjutsu-v1.0.iso” file.
5- Select the type of Checksum you are calculating, By default, the Checksum is set to MD5
Linux
1 md5sum Ninjutsu-v1.0.iso
2
3 sha256sum Ninjutsu-v1.0.iso
MacOS
1 md5 Ninjutsu-v1.0.iso
2
3 shasum -a 256 Ninjutsu-v1.0.iso
User Guide
Getting Started
Minimum System Requirements :
CPU : Intel/AMD Dual core Processor
RAM : 2 GB of RAM DDR3/DDR4
Storage : 60 GB of Hard drive space
Installing Ninjutsu as Main OS in Your Computer/Laptop :
To install Ninjutsu OS on your computer or laptop you need :
Before you start to format your machine check your disk partition scheme
IMPORTANT! Don’t forget your laptop it’s include your original windows installation, it’s called recovery mode or
windows reset factory , so don’t do this tutorial if you don’t want lose ur recovery windows, I recommend you use
PartitionMagic to check ur disk before starting format
You can view this information in the DIsk Management tool incldued with Windows. To access it, right-click the Start
menu or press Windows Key+X and select “Disk Management.” You can also press Windows Key+R to open the Run
dialog, type “diskmgmt.msc” into the box, and press Enter.
Screen
Locate the disk you want to check in the Disk Management window. Right-click it and select “Properties.”
Click over to the “Volumes” tab. To the right of “Partition style,” you’ll see either “Master Boot Record (MBR)” or “GUID
Partition Table (GPT),” depending on which the disk is using.
Screen
Screen
In our example we are going to create a bootable USB stick “GPT” containing the Ninjutsu OS , Don’t be a blindly follow
the lesson, maybe your laptop/computer is MBR , so be careful
Now we finished create bootable USB stick , After that restart your computer and boot from USB.
warning Now be careful I don’t want you format wrong drive and lose your data
1 Diskpart
2 List vol
3 Dir d:\
Screen
Screen
Screen
Screen
Screen
Screen
Screen
After installation maybe you will getting random slowdown to your windows 10, so I recommend you to update drivers,
you can use Driver Booster 7 to update and tweak your laptop
Download :
https://www.iobit.com/en/driver-booster.php
Minimum Requirements :
1- Ninjutsu OS Image
2- Empty drive partition in your machine with 55 GB (Minimum) (Ninjutsu OS will take 53 GB from total storage
available)
You can view this information in the DIsk Management tool incldued with Windows. To access it, right-click the Start
menu or press Windows Key+X and select “Disk Management.” You can also press Windows Key+R to open the Run
dialog, type “diskmgmt.msc” into the box, and press Enter.
Screen
if you don’t have empty drive partition to install Ninjutsu OS , you have to create drive partition and format it , in my
tutorial
Step 1: Right-click one hard disk partition and select “Shrink Volume”.
Screen
Step 2: Enter the amount of space you want to shrink in MB as shown below then click on the “Shrink” button.
Screen
Step 3: Right-click on the unallocated space and select “New Simple Volume”.
Screen
Step 5: You’ll now enter the New Simple Volume Wizard interface by clicking “Next” and specify a volume size.
Screen
Step 6: Assign Drive Letter or Path, then format the partition into the default file system NTFS. Click “Finish” to
complete creating a new partition in Windows 10.
Screen
We are going to explain how to install and use two windows edtion in the same computer/laptop :
Next step , add deployed Windows on drive E: to Windows boot menu, use following command:
1 bcdboot E:\Windows
Screen
Now write this command to check defult profile and currnet profile windows
BCD files provide a store that is used to describe boot applications and boot application settings.
BCDEdit can be used for a variety of purposes, including creating new stores, modifying existing stores, adding boot
menu options, and so on.
1 bcdedit
Boot Options Identifiers :
Screen
Now we need to change the boot description , When deployed, the new OS has ID {default}. To rename it, give it a
better description, use following command:
Screen
Screen
Screen
Screen
Screen
Screen
Screen
Screen
Screen
Screen
Screen
Screen
Screen
Screen
Screen
Screen
Screen
Screen
Screen
How To Install Ninjutsu OS in Oracle VM VirtualBox :
Screen
Screen
Screen
Screen
Screen
Screen
Screen
Screen
Screen
Screen
Screen
Screen
Screen
Screen
Screen
Screen
Screen
Screen
what is the information may be disclosed to government/ISP provider when you browsing Internet? And what’s the
solution!
In the normal use of the Internet, the information you need to take care of:
1. MAC address
2. DNS requests
3. Site or service address even in TLS connection
4. The IP address of the site or service
5. Unencrypted information
1. MAC address :
This Mac address can track your positions.It is best to have a different MAC address each time you connect to the
Internet. You can use a variety of tools, but in Windows 10, you can enable it:
2- DNS requests
Normally, even if you use 1.1.1.1, your DNS requests can be easily heard. Only if you use DNSCrypt or other encrypted
items, your DNS requests will not be heard.
The addresses of the sites you visit will be transmitted in plain text via SNI, which is audible. You can only use a proxy
or a valid VPN to solve this problem.
Many sites have dedicated servers. Donating an IP address is equal to donating a site address. As before, you can only
use a proxy or a valid VPN to solve this problem.
5- Unencrypted information :
Unencrypted information needs no explanation and you should use a VPN. But there is still a big problem! What
happens if you accidentally and unintentionally disconnect your VPN?
Some of your sensitive information will be disclosed! To prevent this from happening, your VPN must have Kill-Switch
functionality
Screen
Screen
Screen
Screen
Screen
Screen
Now Using Docker to run Cyber Security Tools is becoming more and more popular.
You should be aware that Docker requires VT-X/AMD-v virtual hardware extension to be enabled before you can run any
container.
Depending on your computer, you may need to reboot and enable it in your BIOS.
You can check if VT-X/AMD-v is enabled by running systeminfo from the command prompt.
1 systeminfo
Screen
2. Now select the Processors option and you’ll see the Intel VT-X & AMD Virtualization enabling option beside and
mark it if you want. Also, you can let the virtualization engine by default(Automatic), the automatic option uses the
three options there when required and disable them when they aren’t needed.
Screen
2. Here, select the System tab and select Acceleration tab then you can see and enable Intel VT-x or AMD
virtualization and click Ok.
Screen
Please follow the motherboard/Laptop guide to enable Intel VT-x/AMD Virtualization from Bios
Screen
So now after enable Intel VT-x or AMD virtualization in your Vmware/VirtualBox and PC
Installing Docker
You can download Docker for Windows with:
Screen
You should restart your laptop after you install Docker.
1 docker ps
If everything works as expected, you should see an empty list of containers running.
Screen
Now I’m going to install Metasploit , nmap and sqlmap on Kali Linux image
1 apt-get update && apt-get install metasploit-framework nmap sqlmap
Screen
Screen
You can get a list of all containers by passing the -a flag to the docker container ls command:
1 docker container ls -a
1 C:\Users\Administrator\Desktop>docker container ls -a
2 CONTAINER ID IMAGE COMMAND CREATED STATUS
3 2e89361f5005 kalilinux/kali-rolling "/bin/bash" 54 minutes ago Exited (130) 1 s
Once you know the CONTAINER ID of the containers you want to delete, pass it to the docker container rm command.
For example, to remove the first two containers listed in the output above run:
1 # docker ps -a
2 docker ps -a
3 CONTAINER ID IMAGE COMMAND CREATED STATUS
d1c01c8eb336 ubuntu:14.04 "/bin/bash" 5 seconds ago Exited (0) 3 seco
4
df7834f86c78 debian:stable "/bin/bash" 10 seconds ago Up 9 seconds
5
9bdd9d49a75b mongo:3 "/entrypoint.sh mong 18 minutes ago Up 18 minutes
6
774b02c9c51a oraclelinux:7 "/bin/bash" 27 minutes ago Up 27 minutes
7
1 C:\Users\Administrator\Desktop>docker image ls
2 REPOSITORY TAG IMAGE ID CREATED SIZE
3 ctfd/ctfd latest ba8fec4b9a20 2 days ago 500MB
ctfwiki/ctf-wiki latest a4ad75128371 5 days ago 195MB
4
kalilinux/kali-rolling latest d88b418fb1f9 6 days ago 114MB
5
parrotsec/security latest 35cfd692bb97 2 weeks ago 4.71GB
6
pyaillet/ctf-tools latest f57c8c381e52 6 months ago 992MB
7 simplysecurity/simplyemail latest 58c90bda30f4 2 years ago 684MB
8
you can install different tools without having to fight with different libraries or dependencies
Screen
Screen
Screen
https://hub.docker.com/r/aaaguirrep/pentest
Kali Linux
Metasploit framework
Sqlmap
Amass
sherlock
Docker Notes
1 docker
2 docker container --help
1 docker --version
2 docker version
3 docker info
1 docker images
2 docker image ls
3
Options:
4
--quiet option to only show the image ID
5
--filter option to filter out images based on certain conditions (ie --filter=dangling=true)
6
1 docker ps -a # Lists containers (and tells you which images they are spun from)
2 docker rm <container_id> # Removes a container
3 docker rmi <image_id> # Removes an image
docker rmi -f <image_id> # Forces removal of image even if it is referenced in multiple repositorie
4
5 # i.e. same image id given multiple names/tags
6 # Will still fail if there is a docker container referencing image
1 docker container ls
2 docker container ls --all
3 docker container ls -aq
Tumblr More
R1
L I K E T H I S A R T I C L E? SU P P O R T T H E A U T H O R W I T H
R2
Comments
What do you think?
8 Responses
Surprised Sad
R3