diff --git a/_posts/blog/2024-02-13-Entorno-Pentesting.md b/_posts/blog/2024-02-13-Entorno-Pentesting.md index dbf38bf..3dbe8d5 100644 --- a/_posts/blog/2024-02-13-Entorno-Pentesting.md +++ b/_posts/blog/2024-02-13-Entorno-Pentesting.md @@ -4,16 +4,15 @@ title: "Entorno Pentesting y Hacking" subtitle: "Intalacion y personalizacíon" category: Blog tags: [Linux, Github, Curiosidades, Portafolio, Cheet-Sheet] ---- - -![list](/assets/img/entorno/Kali-2022-09-12-23-42-00.png){:.lead width="800" height="100" loading="lazy"} - +image: + path: /assets/img/entorno/spotify.gif --- I'm someone who often installs virtual machines for my testing, and I've become very accustomed to working in that environment as it's more efficient for me. I find it frustrating to work in a regular Kali environment now, it's quite challenging for me haha. I'm going to share my personal configuration of Bspwm + Polybar + Kitty + Spotify with you, which can be installed on any Linux distribution designed for Penetration Testing, Ethical Hacking, CTFs, etc. +{:.note title="Attention"} I must say that I'm not a developer, so the code is quite straightforward. It lacks validations and could be infinitely improved. When installing, we'll see how everything is set up. I've kept it this way to catch any errors. It serves its purpose, which is to install the entire environment on top of a freshly installed image. I encourage you to modify it to your liking. It's something I'm planning to do myself as I prepare for OSCP, and I take any opportunity to practice scripting." {:.note title="Attention"} @@ -30,1064 +29,116 @@ Good Luck ## Considerations -Before installing anything I will explain a little how the script of the three different versions works: - -![list](/assets/img/entorno/help.png){:.lead width="800" height="100" loading="lazy"} - -Antes de instalar nada procedemos con los siguientes comandos. - -```bash -sudo apt update -``` - -```bash -sudp apt upgrade -``` - -```bash -apt install build-essential git vim libxcb-util0-dev libxcb-ewmh-dev libxcb-randr0-dev libxcb-icccm4-dev libxcb-keysyms1-dev libxcb-xinerama0-dev libasound2-dev libxcb-xtest0-dev libxcb-shape0-dev libxcb-xtest0-dev libxcb-shape0-dev -y -``` - -```bash -apt install latexmk zathura rubber texlive-full -y --fix-missing - -``` - ---- - -## istalamos el terminal Kitty. - -```bash -sudo apt install kitty -y -``` - ---- - -## Instalamos bspwm y sxhkd. - -```bash -cd /home/axel/Descargas/ -git clone https://github.com/baskerville/bspwm.git -git clone https://github.com/baskerville/sxhkd.git -cd bspwm/ -make -sudo make install -cd ../sxhkd/ -make -sudo make install -``` - -Hay que cambiar mi usuario es decir `axel` por el usuario que corresponda a tu ruta. -{:.note title="Attention"} - ---- - -### Instalamos bspwm. - -```bash -sudo apt install bspwm -y -``` - ---- - -### Cargamos en bspwm y sxhkd ficheros de ejemplo. - -```bash -mkdir ~/.config/bspwm -mkdir ~/.config/sxhkd -cd /home/axel/Descargas/bspwm/ -cp examples/bspwmrc ~/.config/bspwm/ -chmod +x ~/.config/bspwm/bspwmrc -cp examples/sxhkdrc ~/.config/sxhkd/ -``` - -Hay que cambiar mi usuario es decir `axel` por el usuario que corresponda a tu ruta. -{:.note title="Attention"} - ---- - -## Procedemos a instalar la paqueteria nesesaria para la polybar. - -```bash -sudo apt install cmake cmake-data pkg-config python3-sphinx libcairo2-dev libxcb1-dev libxcb-util0-dev libxcb-randr0-dev libxcb-composite0-dev python3-xcbgen xcb-proto libxcb-image0-dev libxcb-ewmh-dev libxcb-icccm4-dev libxcb-xkb-dev libxcb-xrm-dev libxcb-cursor-dev libasound2-dev libpulse-dev libjsoncpp-dev libmpdclient-dev libuv1-dev libnl-genl-3-dev - -``` - ---- - -### Para instalar la polybar hacemos lo siguiente. - -```bash -cd /home/axel/Descargas/ -git clone --recursive https://github.com/polybar/polybar -cd polybar/ -mkdir build -cd build/ -cmake .. -make -j$(nproc) -sudo make install -``` - -Hay que cambiar mi usuario es decir `axel` por el usuario que corresponda a tu ruta. -{:.note title="Attention"} - ---- - -### Para configurar nuestra Polybar, clonaremos primeramente en 'Descargas' el siguiente repositorio. - -```default -git clone https://github.com/VaughnValle/blue-sky.git -``` - -Posteriormente, ejecutaremos los siguientes comandos: - -```default -mkdir ~/.config/polybar -cd ~/Descargas/blue-sky/polybar/ -cp * -r ~/.config/polybar -echo '~/.config/polybar/./launch.sh' >> ~/.config/bspwm/bspwmrc -cd fonts -sudo cp * /usr/share/fonts/truetype/ -fc-cache -v -``` - -Hacemos Windows + Shift + R para cargar la configuración y deberíamos ver la Polybar por arriba. - ---- - -## Abrimos el bspwnrc y lo remplazamos con este script en la ruta `~/.config/bspwn/`. - -Desacarga [archivo-bspwnrc] - -[archivo-bspwnrc]: https://github.com/4xLoff/Entorno-Pentesting-y-Hacking/blob/main/config/bspwm/bspwmrc - -```bash -#! /bin/sh - -pgrep -x sxhkd > /dev/null || sxhkd & - -bspc monitor -d I II III IV V VI VII VIII IX X - -bspc config border_width 2 -bspc config window_gap 12 -bspc config split_ratio 0.52 -bspc config borderless_monocle true -bspc config gapless_monocle true -bspc rule -a Caja state=floating follow=on -bspc rule -a Gimp desktop='^8' state=floating follow=on -bspc rule -a Chromium desktop='^2' -bspc rule -a mplayer2 state=floating -bspc rule -a Kupfer.py focus=on -bspc rule -a Screenkey manage=off -feh --bg-fill /home/axel/Images/1222108.png -~/.config/polybar/./launch.sh -bspc config focus_follows_pointer true -picom --experimental-backends & -bspc config border_width 0 -xsetroot -cursor_name left_ptr & -``` - -Hay que cambiar mi usuario es decir `axel` por el usuario que corresponda a tu ruta. -{:.note title="Attention"} - ---- - -## Abrimos el sxhkdrc y lo remplazamos con este script en la ruta `~/.config/sxhkd`. - -Desacarga [archivo-sxhkdrc] - -[archivo-sxhkdrc]: https://github.com/4xLoff/Entorno-Pentesting-y-Hacking/blob/main/config/sxhkd/sxhkdrc - -```default -# ------------------------------------------------------------------------------------------------ -# -# wm independent hotkeys -# - -# terminal emulator -super + Return - kitty - -# program launcher -super + d - rofi -show run - -# make sxhkd reload its configuration files: -super + Escape - pkill -USR1 -x sxhkd - -# -# bspwm hotkeys -# - -# quit/restart bspwm -super + alt + {q,r} - bspc {quit,wm -r} - -# close and kill -super + {_,shift + }w - bspc node -{c,k} - -# alternate between the tiled and monocle layout -super + m - bspc desktop -l next - -# send the newest marked node to the newest preselected node -super + y - bspc node newest.marked.local -n newest.!automatic.local - -# swap the current node and the biggest node -super + g - bspc node -s biggest - -# -# state/flags -# - -# set the window state -super + {t,shift + t,s,f} - bspc node -t {tiled,pseudo_tiled,floating,fullscreen} - -# set the node flags -super + ctrl + {m,x,y,z} - bspc node -g {marked,locked,sticky,private} - -# -# focus/swap -# - -super + {_,shift + }{Left,Down,Up,Right} - bspc node -{f,s} {west,south,north,east} +For control purposes I have used the latest version of Kali so far, which is [release 2024.1](https://www.kali.org/blog/kali-linux-2024-1-release/), which you can download from the [ISO](https://cdimage.kali.org/kali-2024.1/kali-linux-2024.1-installer-amd64.iso) +![list](/assets/img/entorno/base.png){:.lead width="800" height="100" loading="lazy"} -# focus the node for the given path jump -super + {p,b,comma,period} - bspc node -f @{parent,brother,first,second} - -# focus the next/previous node in the current desktop -super + {_,shift + }c - bspc node -f {next,prev}.local - -# focus the next/previous desktop in the current monitor -super + bracket{left,right} - bspc desktop -f {prev,next}.local - -# focus the last node/desktop -super + {grave,Tab} - bspc {node,desktop} -f last - -# focus the older or newer node in the focus history -super + {o,i} - bspc wm -h off; \ - bspc node {older,newer} -f; \ - bspc wm -h on - -# focus or send to the given desktop -super + {_,shift + }{1-9,0} - bspc {desktop -f,node -d} '^{1-9,10}' - -# -# preselect -# - -# preselect the direction -super + ctrl + alt + {Left,Down,Up,Right} - bspc node -p {west,south,north,east} - - -# preselect the ratio -super + ctrl + {1-9} - bspc node -o 0.{1-9} - -# cancel the preselection for the focused node -super + ctrl + space - bspc node -p cancel - -# cancel the preselection for the focused desktop -super + ctrl + alt + space - bspc query -N -d | xargs -I id -n 1 bspc node id -p cancel - -# -# move/resize -# - -# expand a window by moving one of its side outward -#super + alt + {h,j,k,l} -# bspc node -z {left -20 0,bottom 0 20,top 0 -20,right 20 0} - -# contract a window by moving one of its side inward -#super + alt + shift + {h,j,k,l} -# bspc node -z {right -20 0,top 0 20,bottom 0 -20,left 20 0} - -# move a floating window -super + ctrl + {Left,Down,Up,Right} - bspc node -v {-20 0,0 20,0 -20,20 0} - -# Custom move/resize -alt + super + {Left,Down,Up,Right} - /home/axel/.config/bspwm/scripts/bspwm_resize {west,south,north,east} - -# Open firefox -super + shift + f - /usr/bin/firefox - -# Slimlock -super + shift + x - # slimlock - -# ------------------------------------------------------------------------------------------------ -``` - -{:.note title="Attention"} -Hay que cambiar en `Custom move/resize` mi usuario es decir `axel` por el usuario - -que corresponda a tu ruta. - -## Creamos el archivo bspwm_resize. - -```bash -mkdir ~/.config/bspwm/scripts/ -touch ~/.config/bspwm/scripts/bspwm_resize; chmod +x ~/.config/bspwm/scripts/bspwm_resize -``` +Before installing anything I will explain a little how the script of the three different versions works: -Mediante la siguiente configuración podremos en el futuro controlar las dimensiones +![list](/assets/img/entorno/mode.png){:.lead width="800" height="100" loading="lazy"} -de las vetanas así como modificarlas con atajos de teclado. +{:.note} +I recommend you to read the whole post before installing in environment. -### Abrimos el bspwn_resize y lo remmplazamos con este script en la ruta `~/.config/bspwn/scripts/`. +### scriptMode -Desacarga [archivo-bspwn_resize] +The first version is the basic installation that consists of bspwn + polyvar + picom + powerlevel10k + kitty + zsh + vsc + neovim, this suite is only for building in the environment and may take between 20 to 25 minutes. -[archivo-bspwn_resize]: https://github.com/4xLoff/Entorno-Pentesting-y-Hacking/blob/main/config/bspwm/scripts/bspwm_resize +Depending on the time of installation, a console-setup window will appear, give ok and continue. -```bash -#!/usr/bin/env bash +![list](/assets/img/entorno/panel.png){:.lead width="800" height="100" loading="lazy"} -if bspc query -N -n focused.floating > /dev/null; then - step=20 -else - step=100 -fi +At some point it will change, you will log out, at this moment you will have to restart the system and to start the session choose the BSPWN option. -case "$1" in - west) dir=right; falldir=left; x="-$step"; y=0;; - east) dir=right; falldir=left; x="$step"; y=0;; - north) dir=top; falldir=bottom; x=0; y="-$step";; - south) dir=top; falldir=bottom; x=0; y="$step";; -esac +![list](/assets/img/entorno/bspwn.png){:.lead width="800" height="100" loading="lazy"} -bspc node -z "$dir" "$x" "$y" || bspc node -z "$falldir" "$x" "$y" -``` +I have automated the entire installation, so you no longer need to configure either zsh or powerlevel10k; these will load automatically. If you wish to edit anything, it's in the configuration file. Neither fzf nor neovim needs to be configured separately. Just open any file, and the dependencies for neovim will be installed. Don't forget that this must be done for the low-privileged user as well as root. ---- +![list](/assets/img/entorno/p10.png){:.lead width="800" height="100" loading="lazy"} -## Procedemos con la instalación de Picom para ajustar las transparencias. +![list](/assets/img/entorno/nvim.png){:.lead width="800" height="100" loading="lazy"} -Primeramente, instalamos los siguientes paquetes, no sin antes actualizar el sistema: +All of us who use this type of environment are used to seeing our IP and VPN from Hack the box. This is also implemented in the following way, for example. -```bash -sudo apt update -sudo apt install meson libxext-dev libxcb1-dev libxcb-damage0-dev libxcb-xfixes0-dev libxcb-shape0-dev libxcb-render-util0-dev libxcb-render0-dev libxcb-randr0-dev libxcb-composite0-dev libxcb-image0-dev libxcb-present-dev libxcb-xinerama0-dev libpixman-1-dev libdbus-1-dev libconfig-dev libgl1-mesa-dev libpcre2-dev libevdev-dev uthash-dev libev-dev libx11-xcb-dev libxcb-glx0-dev -``` - -Posteriormente, ejecutamos los siguientes comandos bajo el directorio ~/Descargas: +To configure the IP and name of the HTB machine we use. ```bash -git clone https://github.com/ibhagwan/picom.git -cd picom/ -git submodule update --init --recursive -meson --buildtype=release . build -ninja -C build -sudo ninja -C build install -``` - ---- - -### Remplazamos el siguiente script en el archivo `picom.conf`en la ruta `~/.config/picom/`.. - -Desacarga [archivo-picon.conf] - -[archivo-picon.conf]: https://github.com/4xLoff/Entorno-Pentesting-y-Hacking/blob/main/config/picom/picom.conf - -```default -################################# -# Shadows # -################################# - -shadow = false; - -shadow-radius = 7; - -shadow-offset-x = -7; - -shadow-exclude = [ - "name = 'Notification'", - "class_g = 'Conky'", - "class_g ?= 'Notify-osd'", - "class_g = 'Cairo-clock'", - "_GTK_FRAME_EXTENTS@:c" -]; - -################################# -# Fading # -################################# - -fading = true - -fade-in-step = 0.03; - -fade-out-step = 0.03; - -inactive-opacity = 0.8; - -frame-opacity = 0.5; - -inactive-opacity-override = false; - -active-opacity = 1.0; - -focus-exclude = [ "class_g = 'Cairo-clock'" ]; - -################################# -# General Settings # -################################# - -backend = "xrender"; - -vsync = true - -mark-wmwin-focused = true; - -mark-ovredir-focused = false; - -detect-rounded-corners = true; - -detect-client-opacity = true; - -refresh-rate = 0 - -detect-transient = true - -detect-client-leader = true - -use-damage = true - -wintypes: -{ - tooltip = { fade = true; shadow = true; opacity = 0.75; focus = true; full-shadow = false; }; - dock = { shadow = false; } - dnd = { shadow = false; } - popup_menu = { opacity = 0.8; } - dropdown_menu = { opacity = 0.8; } -}; - -corner-radius = 15.0; -rounded-corners-exclude = [ - #"window_type = 'normal'", - #"class_g = 'rofi'", - #"class_g = 'XTerm'", - "class_g = 'Polybar'", - #"class_g = 'code-oss'", - #"class_g = 'TelegramDesktop'", - "class_g = 'firefox'" - #"class_g = 'Thunderbird'" -]; - -opacity-rule = [ - "100:class_g = 'Rofi'", - "100:class_g = 'Spotify'", - "100:class_g = 'Firefox'", - "100:class_g = 'burp-StartBurp'" -]; - +settarget 10.10.10.4 Blue ``` ---- - -## Instalamos rofi (Posteriormente instalaremos el tema Nord para Rofi): +And to clean. ```bash -sudo apt install rofi -y -``` - ---- - -### Insertamos este script con el nombre de `nord.rasi` en ala ruta `~/.config/rofi/themes/`. - -Desacarga [archivo-nord.rasi] - -[archivo-nord.rasi]: https://github.com/4xLoff/Entorno-Pentesting-y-Hacking/blob/main/config/rofi/themes/nord.rasi - -```default -configuration { - show-icons: true; - font: "SauceCodePro Nerd Font Medium 10"; - drun-display-format: "{icon} {name}"; - display-run: " "; - display-drun: " "; - display-window: " "; - modi: "window,run,drun"; -} - -* { - background-color: #2E3440; - bg-alt: #3B4252; - fg: #ECEFF4; - - nord-blue-light: #88C0D0; - nord-yellow: #A8D7FE; - - border: 0; - lines: 12; - padding: 0; - margin: 0; - spacing: 0; -} - -window { - width: 30%; - transparency: "real"; -} - -mainbox { - children: [inputbar, listview]; -} - -listview { - columns: 1; -} - -element { - padding: 12; - orientation: vertical; - text-color: @fg; -} - -element selected { - background-color: @bg-alt; - text-color: @nord-blue-light; -} - -inputbar { - background-color: @background; - children: [prompt, entry]; -} - -prompt { - enabled: true; - font: "SauceCodePro Nerd Font 12"; - padding: 12 0 0 12; - text-color: @nord-yellow; -} - -entry { - padding: 12; - text-color: @nord-yellow; -} +cleartarget ``` -Posteriormente con `rofi-theme-selector` seleccionamos el tema Nord. - ---- - -## En este punto, reiniciamos el equipo y seleccionamos bspwm. - -```default -super + alt + q -``` +![list](/assets/img/entorno/sp.png){:.lead width="800" height="100" loading="lazy"} -la tecla `super` es la tecla de windows. {:.note} +It is also used to clean the target when there is no IP set. ---- - -## Configuramos un poco la terminal e instalamos las Hack Nerd Fonts. - -EN esta parde debemos esconder la barra superior de la kitty y la barra lateral. - -Las [fuentes] de Hack Nerd Fonts deben ir descomprimidas en ` - -una vez hecho hay que ejecutar el comando. - -[fuentes]: https://www.nerdfonts.com/font-downloads - -```bash -fc-cache -v -``` - ---- - -## Instalamos Google chome o Firefox. - -O cualquier buscador de su eleccion. - -```default -sudo dpkg -i “nombre del paquete .deb” -``` - ---- - -## Instalamos el addon 'FoxyProxy' para Firefox o Google. +Still, I like my environment to be simple, so I have removed what I don't need and implemented the following. -Lo buscamos tal cual foxy proxy extencion. +- The location of the window will always tell you where you are located, no matter if you are between terminals, watching a video or whatever. ---- +- The interfaces for ctf's. -### Configuramos la privacidad en Firefox y el directorio de descargas principal. +- Resizing applications is something that I really like because certain applications fit into the environment bar with just one click. -En ajuates para que no se guarde ninguna cookie ni historial de busqueda incluso +- The implementation of spotify to hack with my favorite music. -el color del tema eso ya es a su gusto. - ---- - -## Instalamos 'feh' con 'apt install feh' para poder cargar fondos de pantalla. - -```default -sudo apt install feh xclip flameshot-y -``` - ---- - -### Cargamos en el archivo bspwmrc justo al final la siguiente línea: - -```default -feh --bg-fill /home/axel/Desktop/fondo.jpg -``` +![list](/assets/img/entorno/inicial.png){:.lead width="800" height="100" loading="lazy"} {:.note title="Attention"} -Aki debe poner la ruta de su wallpaper justo despues de `feh --bg-fill` esto esta en bspwnrc. +Like most of us who have customized our environments, we have learned this thanks to s4vitar and even used his environment. But in the exercise of wanting to know more, how could I set up my own environment? I reached the conclusion of using the forest template since it has many utilities already implemented that can be taken advantage of, unlike the simple one that we all learned and replicated. ---- +### hackerMode -## Remplazaremos todos los archivos de la polybar por los siguientes scripts con los mismo nombres. +There's not much to explain in this way, just that it will install everything from scriptMode plus the entire LaTeX suite for report writing. Since there are too many dependencies and fonts, etc., it takes about 35 to 40 minutes depending on your internet speed. -Cabe recalcar que esta es mi configuaracion pero si quereis cambiarla su gusto puede +### musicMode -hacerlo con total confianza no es nada dificil agregar o quitar modulos ,botones o +This version installs scriptMode and also installs hackerMode, as well as everything necessary for Spotify to work. Although it's my favorite, I don't have it installed because it uses a lot of resources. I don't recommend it for systems with less than 16GB of RAM. Also, it takes between 35 and 40 minutes to install. -funciones es algo que podebos investigar en internet tamvien dejo toda la +You log in and you're ready to go. -confifuracionde [polyvar], recomiendo remplazar toda la carpeta si no quereis editar nada. +![list](/assets/img/entorno/spotify.png){:.lead width="800" height="100" loading="lazy"} -[polyvar]: https://github.com/4xLoff/Entorno-Pentesting-y-Hacking/tree/main/config/polybar +This looks like this, and also the letters move. ---- - -### El siguiente script es `launch.sh` lo remplazamos con el del mismo nombre en la ruta `~/.config/polyvar/`. - -Desacarga [archivo-launch.sh] - -[archivo-launch.sh]: https://github.com/4xLoff/Entorno-Pentesting-y-Hacking/blob/main/config/polybar/launch.sh - -```bash -#!/usr/bin/env sh - -# Terminar las instancias de barra que ya se están ejecutando -killall -q polybar - -# Espere hasta que los procesos se hayan cerrado. -while pgrep -u $UID -x polybar >/dev/null; do sleep 1; done - -# Barra superior -polybar apagado -c ~/.config/polybar/current.ini & -polybar parrot -c ~/.config/polybar/current.ini & -polybar hackthebox -c ~/.config/polybar/current.ini & -polybar objetivo -c ~/.config/polybar/current.ini & -polybar escritorios -c ~/.config/polybar/current.ini & - -# Barra inferior -polybar icono -c ~/.config/polybar/current.ini & -polybar hora -c ~/.config/polybar/current.ini & -polybar procesador -c ~/.config/polybar/current.ini & -polybar memoria -c ~/.config/polybar/current.ini & -polybar spotify -c ~/.config/polybar/current.ini & -polybar controlspotify -c ~/.config/polybar/current.ini & -polybar volumen -c ~/.config/polybar/current.ini & -``` - ---- - -### El siguiente script es `current.ini` lo remplazamos con el del mismo nombre en la ruta `~/.config/polyvar/`. - -Desacarga [archivo-curren.ini] - -[archivo-curren.ini]: https://github.com/4xLoff/Entorno-Pentesting-y-Hacking/blob/main/config/polybar/current.ini - ---- - -### El siguiente script es `hackthebox.sh` lo remplazamos con el del mismo nombre en la ruta `~/.config/polyvar/scripts/`. - -``` -#!/bin/sh - -IFACE=$(/usr/sbin/ifconfig | grep tun0 | awk '{print $1}' | tr -d ':') - -if [ "$IFACE" = "tun0" ]; then - echo "%{F#2EFE64}%{F#FFFFFF}$(/usr/sbin/ifconfig tun0 | grep "inet " | awk '{print $2}')%{u-}" -else - echo "%{F#2efe64}%{u-}%{F#FFFFFF}Desconectado" -fi -``` +![list](/assets/img/entorno/terminal.png){:.lead width="800" height="100" loading="lazy"} --- -### El siguiente script es `parrot.sh` lo remplazamos con el del mismo nombre en la ruta `~/.config/polyvar/scripts/`. - -``` -#!/bin/sh +## Installation -echo "%{F#00BFFF}%{F#FFFFFF}$(/usr/sbin/ifconfig ens33 | grep "inet " | awk '{print $2}')%{u-}" - -``` - ---- - -### El siguiente script es `objetivo.sh` lo remplazamos con el del mismo nombre en la ruta `~/.config/polyvar/scripts/`. - -``` -#!/bin/bash - -ip_address=$(cat ~/.config/polybar/scripts/machine | awk '{print $1}') -machine_name=$(cat ~/.config//polybar/scripts/machine | awk '{print $2}') - -if [ $ip_address ] && [ $machine_name ]; then - echo "${F#FE2E2E}%{F#FFFFFF}$ip_address%{u-} - $machine_name" -else - echo "${F#E73D3D}%{u-}%{F#ffffff}Máquina Desconectada" -fi -``` - ---- - -## Instalamos la powerlevel10k en la zsh. - -```default -git clone --depth=1 https://github.com/romkatv/powerlevel10k.git ~/powerlevel10k - -echo 'source ~/powerlevel10k/powerlevel10k.zsh-theme' >>~/.zshrc -``` - -Esto se debe hacer para root asi que para el otro usuario y para cofigurarlo escribimos en la terminal `zsh`. -{:.note title="Attention"} - -Desacarga [archivo-.p10k.zsh] - -[archivo-.p10k.zsh]: https://github.com/4xLoff/Entorno-Pentesting-y-Hacking/blob/main/p10k.zsh - -Si borra y copia el contenido de .p10k.zsh con el contenido del link de decargase - -aplicaran las configuraciones para dicho usuario por lo cual si queremos hacer - -estos tanto para el usuario root y no root debemos remplazarlos en las rutas de sus - -repectivos archivos `/home/` y `/root/` - -Si borrramos el archivo y remplazamos por el de link debemos cambiarle el nombre - -de `p10k.zsh` a `.p10k.zsh` ya que estos archivos de configuracion sirempre estan ocultos. - -```bash -mv p10k.zsh .p10k.zsh -``` - ---- - -## Remplazamos .zshrc este script con el mismo nombre de `.zshrc` en ala ruta `~/.zshrc`. - -Desacarga [archivo-.zshrc] - -[archivo-.p10k.zsh]: https://github.com/4xLoff/Entorno-Pentesting-y-Hacking/blob/main/zshrc.txt - -Si borra y copia el contenido de .zshrc con el contenido del link de decarga se - -aplicaran las configuraciones para dicho usuario por lo cual si queremos hacer - -estos tanto para el usuario root y no root debemos remplazarlos en las rutas de sus - -repectivos archivos `/home/` y `/root/` - -Si borrramos el archivo y remplazamos por el de link debemos cambiarle el nombre - -de `zshrc.txt` a `.zshrc` ya que estos archivos de configuracion sirempre estan ocultos. +I have implemented everything so you don't do anything, just clone the following [repository](https://github.com/4xLoff/Entorno) and copy the following commands. ```bash -mv zshrc.txt .zshrc +cd Downloads +git clone https://github.com/4xLoff/Entorno.git +cd Entorno +chmod +x helpers.sh +sudo ./helpers.sh -i musicMode ``` +You can choose the mode you prefer. {:.note title="Attention"} -Hay que cambiar mi usuario es decir `axel` por el usuario que corresponda a tu ruta -que esta dentro .zshcr casi al final . - ---- - -### Creamos enlace simbólico de la .zshrc y .p10k.zsh para root. - -Si queremos evitarnos los paso de estar reeplazando los archivos tanto en root - -como en el usuario no privilegiado podemos hacer link simbolico para que sean iguales. -```bash -ln -s -f /home/axel/.zshrc /root/.zshrc -``` +![list](/assets/img/entorno/terminal.png){:.lead width="800" height="100" loading="lazy"} -Esto se debe hacer para que la configuracion de .zshrc de root y el otro usuario sea iguales. -{:.note title="Attention"} +