How to Install and Uninstall ibombshell Package on Kali Linux
Last updated: November 06,2024
1. Install "ibombshell" package
This guide let you learn how to install ibombshell on Kali Linux
$
sudo apt update
Copied
$
sudo apt install
ibombshell
Copied
2. Uninstall "ibombshell" package
In this section, we are going to explain the necessary steps to uninstall ibombshell on Kali Linux:
$
sudo apt remove
ibombshell
Copied
$
sudo apt autoclean && sudo apt autoremove
Copied
3. Information about the ibombshell package on Kali Linux
Package: ibombshell
Version: 0~git20201107-0kali2
Architecture: all
Maintainer: Kali Developers
Installed-Size: 5061
Depends: powershell, python3-termcolor, python3-pynput
Homepage: https://github.com/Telefonica/ibombshell
Priority: optional
Section: misc
Filename: pool/main/i/ibombshell/ibombshell_0~git20201107-0kali2_all.deb
Size: 4430516
SHA256: 64cfa59c8f70b61f274c9c61e076caf244ba90ee4d794f07f01b3eaa26b6bdb0
SHA1: 032623c6161eac5fbea9659b3d9cafbadccc171e
MD5sum: bc0169bd91684a71cbb9eaf3835b011e
Description: Dynamic Remote Shell
This package contains a tool written in Powershell that allows you to have a
prompt at any time with post-exploitation functionalities (and in some cases
exploitation). It is a shell that is downloaded directly to memory providing
access to a large number of pentesting features. These functionalities can be
downloaded directly to memory, in the form of a Powershell function. This form
of execution is known as everywhere.
.
In addition, ibombshell provides a second execution mode called Silently, so
the pentester can execute an instance of ibombshell (called warrior). The
compromised computer will be connected to a C2 panel through HTTP. Therefore,
it will be possible to control the warrior and be able to load functions in
memory that help the pentester. This is happening whithin the
post-exploitation phase.
Description-md5:
Version: 0~git20201107-0kali2
Architecture: all
Maintainer: Kali Developers
Installed-Size: 5061
Depends: powershell, python3-termcolor, python3-pynput
Homepage: https://github.com/Telefonica/ibombshell
Priority: optional
Section: misc
Filename: pool/main/i/ibombshell/ibombshell_0~git20201107-0kali2_all.deb
Size: 4430516
SHA256: 64cfa59c8f70b61f274c9c61e076caf244ba90ee4d794f07f01b3eaa26b6bdb0
SHA1: 032623c6161eac5fbea9659b3d9cafbadccc171e
MD5sum: bc0169bd91684a71cbb9eaf3835b011e
Description: Dynamic Remote Shell
This package contains a tool written in Powershell that allows you to have a
prompt at any time with post-exploitation functionalities (and in some cases
exploitation). It is a shell that is downloaded directly to memory providing
access to a large number of pentesting features. These functionalities can be
downloaded directly to memory, in the form of a Powershell function. This form
of execution is known as everywhere.
.
In addition, ibombshell provides a second execution mode called Silently, so
the pentester can execute an instance of ibombshell (called warrior). The
compromised computer will be connected to a C2 panel through HTTP. Therefore,
it will be possible to control the warrior and be able to load functions in
memory that help the pentester. This is happening whithin the
post-exploitation phase.
Description-md5: