Mar 18, 2017 Adobe flash malware Another malicious attack discovered by researchers this week also relied on standard Windows techniques by prompting users to download and install a fake software update, but actually harvest the user Keychain, phish usernames. Would you mind if I share this with the Linux Gazette so that they can publish it in their.
Enable Developer mode for the Chromebook
- Enter recovery mode by pressing Escape and Refresh, then press the power button.
- Press Control-D
- Press enter to confirm, and wait for the Chromebook to reboot.
- At the waring during the boot press Control-D or wait 30 seconds.
Install Crouton
To run the terminal in a separate window, install Crosh Window
Install chroot on a removable disk
Remount the drive. Then run:
![Chrome launcher github Chrome launcher github](/uploads/1/2/5/7/125788531/576334685.png)
Install Metasploit-framework
Install dependancies for metasploit.
Install ruby:
Downloading the framework
Setup Metasploit
Move the folder and install all gems
Setup Postgres
![Metasploit Vanish Sh Download Chrome Metasploit Vanish Sh Download Chrome](https://warroom.rsmus.com/wp-content/uploads/2015/06/Screenshot-2015-06-04-at-11.30.54-PM.png)
Create the database and hook-up metasploit
Creat config file for metasploit. Edit /opt/msf3/config/database.yml