Met As Ploit
Met As Ploit
Met As Ploit
Kali Linux
AVIS DE NON-RESPONSABILIT
Ce document est uniquement destin informer. Les informations, ainsi que les contenus et fonctionnalits de ce do -
cument sont fournis sans engagement et peuvent tre modifis tout moment. RF-232 n'offre aucune garantie quant
l'actualit, la conformit, l'exhaustivit, la qualit et la durabilit des informations, contenus et fonctionnalits de
ce document. L'accs et l'utilisation de ce document se font sous la seule responsabilit du lecteur ou de l'utilisateur.
RF-232 ne peut tre tenu pour responsable de dommages de quelque nature que ce soit, y compris des dommages di-
rects ou indirects, ainsi que des dommages conscutifs rsultant de l'accs ou de l'utilisation de ce document ou de
son contenu.
Chaque internaute doit prendre toutes les mesures appropries (mettre jour rgulirement son logiciel antivirus, ne
pas ouvrir des documents suspects de source douteuse ou non connue) de faon protger le contenu de son ordina-
teur de la contamination d'ventuels virus circulant sur la Toile.
Avertissement
Bien que nous utilisions ici un vocabulaire issu des techniques informatiques, nous ne prtendons nullement la
prcision technique de tous nos propos dans ce domaine.
En un clin-d'oeil
I- Introduction.............................................................6
II- Tlchargement......................................................7
V- Login......................................................................18
IX- chkconfig...............................................................25
X- ssh.........................................................................28
XIV- htop........................................................................42
XV- Tor..........................................................................43
Sommaire
I- Introduction.............................................................6
1. Description gnrale....................................................................6
1.1. Note au lecteur................................................................................................6
1.2. Conventions....................................................................................................6
II- Tlchargement......................................................7
1. Marche suivre............................................................................7
2. Tlchargement............................................................................7
2.1. Somme de contrle SHA1SUM.......................................................................8
V- Login......................................................................18
1. Login de root..............................................................................18
IX- chkconfig...............................................................25
1. Introduction................................................................................25
1.1. NOM.............................................................................................................25
1.2. SYNOPSIS.....................................................................................................25
1.3. DESCRIPTION.............................................................................................25
X- ssh.........................................................................28
1. Introduction................................................................................28
1.1. NOM.............................................................................................................28
1.2. SYNOPSIS.....................................................................................................28
1.3. DESCRIPTION.............................................................................................28
2. Cl ssh........................................................................................28
2.1. Changement de la cl ssh.............................................................................28
3. Activation permanente de ssh....................................................30
3.1. chkconfig.......................................................................................................30
4. MOTD........................................................................................31
4.1. ASCII Art......................................................................................................31
4.2. dition du fichier texte de MOTD................................................................31
XIV- htop........................................................................42
1. Introduction................................................................................42
2. Installation..................................................................................42
3. Commande.................................................................................42
XV- Tor..........................................................................43
1. Introduction................................................................................43
2. Installation..................................................................................43
3. Vrification................................................................................45
Crdits........................................................................................46
GNU Free Documentation License............................................49
I- Introduction
1. Description gnrale
Ce document prsente la marche suivre pour installer Kali Linux sous VirtualBox.
Rfrence: http://fr.wikipedia.org/wiki/Kali_Linux
Kali Linux est une distribution Linux sortie le 13 mars 2013, base sur Debian. La distribution a pris la suc-
cession de Backtrack. L'objectif de Kali Linux est de fournir une distribution regroupant l'ensemble des outils
ncessaires aux tests de scurit d'un systme d'information.
Kali Linux est disponible sous forme de live DVD. Il est galement possible de l'installer sur un disque dur,
sur une cl USB, ou encore de mettre en place un dmarrage PXE. Il est galement possible de construire son
propre DVD en utilisant les scripts Debian live-build. Cette distribution est utilise par des auditeurs en scuri-
t des systmes d'information comme Lexsi ou ACESI. Jean-Bernard YATA, expert en scurit, la recom-
mande auprs de ses clients dans le cadre de l'audit automatis de premier niveau, permettant d'valuer la scu-
rit intrinsque d'un environnement.
1.2. Conventions
Toutes les commandes entrer la console sont en gras. Les affichages surveiller sont en rouge ou en bleu.
# ping 192.168.1.149
192.168.1.149 is alive
#
Les liens de rfrence internet sont en bleu et ceux intra document en bleu.
Une note.
II- Tlchargement
1. Marche suivre
- On tlcharge l'ISO de Kali Linux.
- On vrifie la somme de contrle de l'ISO tlcharg.
- On cre une machine virtuelle sous VirtualBox.
- On installe Kali Linux.
- Quelques configurations.
2. Tlchargement
On se rend l'adresse http://www.kali.org/downloads/. On clique l'ISO du fichier Kali Linux 64 bit ISO.
* Remarquer la somme de contrle SHA1SUM du fichier. On la vrifiera plus loin.
1. Cration
Pour l'installation de VirtualBox, on peut consulter la page ci-dessous:
http://www.micronator.org/?page_id=104
- Nom: Kali-Linux_64_15G
- Type: Linux
- On lance VirtualBox. - Version: Linux 2.6 / 3.x (64 bit)
- On clique Nouvelle. - Suivant
Nous allons attacher le fichier ISO de Kali Linux au CD/DVD de la machine virtuelle.
Stockage | sous Arborescence Stockage, icne CD/DVD Vide | l'extrme droite sous Attributs, icne du
CD/DVD | Choisissez un fichier de CD/DVD virtuel...
Rseau | Carte 1
- Rseau | Carte 1 | cocher Activer la carte r-
seau | slectionner Accs par pont.
- OK pour activer tous nos changements.
On choisit un nom descriptif pour notre machine | On choisit un nom de domaine si l'installation n'en a
Entre. pas dcouvert un | Entre.
- Il peut tre demand de choisir un fuseau horaire. On choisit Assist - Utiliser un disque entier | En-
- Pour l'horloge, on choisit Est (Eastern) | Entre. tre.
- Passer la souris sur le haut de l'cran pour afficher, si ce n'est dj fait, la barre des outils de VirtualBox.
- Priphriques | Lecteur CD/DVD | puis cliquer Lecteur de l'hte E:. Entre pour continuer.
V- Login
1. Login de root
Pour se loguer en tant que root, cliquer Autre... Root | Se connecter.
Pour amliorer les performances graphiques de Kali Linux sous VirtualBox, il est prfrable d'installer les
Additions Invit.
1. Version de VirtualBox
Il faut que les paquets des Additions Invit soient de la mme version que celle de VirtualBox.
Il nous faut donc vrifier la version de VirtualBox.
- Dans la fentre de VirtualBox,
- Aide | propos de VirtualBox... Ici, la version de VirtualBox est 4.3.10.
3. Vrification
- Les paquets ont t installs de mme que leur d-
Vrification des installations des paquets. pendances.
1. Introduction
Par dfaut, Kali Linux n'a qu'un seul usager i.e. root. Il est toujours mieux d'ajouter un second usager.
Vrification.
root@kali-linux-101:~# ls -als /home/
total 12
4 drwxr-xr-x 3 root root 4096 nov. 7 00:21 .
4 drwxr-xr-x 24 root root 4096 nov. 6 15:22 ..
4 drwxr-xr-x 2 michelandre michelandre 4096 nov. 7 00:21 michelandre
root@kali-linux-101:~#
3. Mot de passe
Dans un changement de mot de passe, la deuxime fois qu'on entre le mot de passe, ce dernier est compar
avec le premier. Ces deux mots de passe devront tre identiques pour que le mot de passe soit chang.
La complexit de ce mot de passe est alors teste. Comme ligne de conduite gnrale, un mot de passe doit tou-
jours tre constitu de 6 8 caractres en en choisissant un ou plus parmi chacun des ensembles suivants:
- caractres alphabtiques minuscules,
- chiffres de 0 9,
- marques de ponctuation.
Il faudra faire attention ne pas utiliser les caractres de suppression ou d'effacement. Habituellement, passwd
rejettera tout mot de passe dont la complexit ne sera pas suffisante.
root@kali-linux-101:~# passwd michelandre
Entrez le nouveau mot de passe UNIX :
Retapez le nouveau mot de passe UNIX :
passwd: le mot de passe a t mis jour avec succs
root@kali-linux-101:~#
4. sudo
On ajoute l'usager au groupe sudo pour lui permettre d'installer des logiciels, d'imprimer des documents, d'uti-
liser le mode privilgi etc...
-a, --append
Ajouter l'utilisateur aux groupes supplmentaires. N'utilisez cette option qu'avec l'option -G.
-G, --groups GROUPE1[,GROUPE2,...[,GROUPEN]]]
Liste de groupes supplmentaires auxquels appartient galement l'utilisateur. Chaque groupe est spar du sui -
vant par une virgule, sans espace entre eux. Les groupes sont soumis aux mmes restrictions que celles de l'op-
tion -g.
Si l'utilisateur fait actuellement partie d'un groupe qui n'est pas list, l'utilisateur sera supprim du groupe. Ce
comportement peut tre modifi par l'option -a, qui permet d'ajouter l'utilisateur la liste actuelle des groupes
supplmentaires.
root@kali-linux-101:~# usermod -a -G sudo michelandre
root@kali-linux-101:~#
Vrification
root@kali-linux-101:~# cat /etc/group | grep michelandre
sudo:x:27:michelandre
michelandre:x:1001:
root@kali-linux-101:~#
Vrification
root@kali-linux-101:~# cat /etc/passwd | grep michelandre
michelandre:x:1000:1001::/home/michelandre:/bin/bash
root@kali-linux-101:~#
IX- chkconfig
1. Introduction
Rfrence: http://www.linuxcertif.com/man/8/chkconfig/
1.1. NOM
chkconfig - gre les informations des niveaux d'excution pour les services systme.
1.2. SYNOPSIS
chkconfig --list [service]
chkconfig --add service
chkconfig --del service
chkconfig [--level niveaux] service <on|off|reset>
chkconfig [--level niveaux] service
1.3. DESCRIPTION
chkconfig fournit une interface simple en ligne de commande pour maintenir l'arborescence /etc/rc[0-6].d en
vitant l'administrateur d'avoir manipuler les liens symboliques de cette arborescence.
Cette implmentation de chkconfig est drive de la commande chkconfig prsente sur IRIX. Plutt que de
maintenir des informations de configuration en dehors de l'arborescence /etc/rc[0-6].d, cette version gre direc-
tement les liens dans /etc/rc[0-6].d. Cela permet d'avoir au mme endroit toutes les informations de configura-
tion indpendamment des services lancs par init.
chkconfig propose cinq fonctions: ajouter un nouveau service grer, supprimer un service grer, lister l'tat
actuel des services dmarrer, changer les informations de dmarrage des services et vrifier les informations
de dmarrage d'un service en particulier.
Excut sans argument, chkconfig renvoie sa syntaxe. Si seul le nom d'un service est fourni, il cherche si le
service est configur pour dmarrer dans le niveau d'excution courant. Si c'est le cas, chkconfig renvoie true,
sinon il renvoie false. L'option --level peut tre utilis pour interroger un autre niveau d'excution que celui en
cours.
Si on spcifie un des paramtres on, off, ou reset aprs le nom d'un service , chkconfig change les informa-
tions de dmarrage pour ce service. Les options on et off feront respectivement dmarrer ou arrter le service
pour le niveau d'excution spcifi. L'option reset rinitialise les informations de dmarrage en fonction de ce
qui est spcifi dans le script d'init du service.
Par dfaut, les options on et off agissent sur les niveaux d'excution 3, 4 et 5, alors que reset agit sur tous les
niveaux d'excution. L'option --level est utilise pour spcifier quels niveaux d'excution sont impacts.
Pour chaque service, il existe un script de dmarrage ou d'arrt dans chacun des niveaux d'excution. Lorsque
init change de niveaux d'excution, il ne relancera pas un service dj actif et n'arrtera pas un service inactif.
1.4. OPTIONS
--level niveaux
Indique les niveaux d'excution impacts. niveaux tant un chiffre de 0 7. Par exemple, --level 35 indique les
niveaux d'excution 3 et 5.
--add service
Cette option demande chkconfig de prendre en charge un nouveau service. Lors de l'ajout d'un service, chk-
config vrifie que ce service possde bien un script de dmarrage ou d'arrt dans chaque niveau d'excution.
S'il en manque, chkconfig les crera en fonction des informations contenues dans le script d'init.
--del service
Le service ne sera plus gr par chkconfig, et tous les liens symboliques concernant ce service dans /etc/rc[0-
6].d seront supprims.
--list service
Liste tous les services grs par chkconfig et indique s'ils doivent tre lancs ou non pour chaque niveau d'ex-
cution. Si un nom de service est fourni, seules les informations de ce service sont affiches.
2. Installation
On installe chkconfig en lanant la commande ci-dessous.
root@kali-linux-101:~# apt-get install chkconfig -y
Lecture des listes de paquets... Fait
Construction de l'arbre des dpendances
Lecture des informations d'tat... Fait
Les NOUVEAUX paquets suivants seront installs :
chkconfig
0 mis jour, 1 nouvellement installs, 0 enlever et 0 non mis jour.
Il est ncessaire de prendre 10,3 ko dans les archives.
Aprs cette opration, 59,4 ko d'espace disque supplmentaires seront utiliss.
Rception de : 1 http://http.kali.org/kali/ kali/main chkconfig all 11.4-54.60.1-1 [10,3 kB]
10,3 ko rceptionns en 0s (16,2 ko/s)
Slection du paquet chkconfig prcdemment dslectionn.
(Lecture de la base de donnes... 318895 fichiers et rpertoires dj installs.)
Dpaquetage de chkconfig ( partir de .../chkconfig_11.4-54.60.1-1_all.deb) ...
Traitement des actions diffres ( triggers ) pour man-db ...
Paramtrage de chkconfig (11.4-54.60.1-1) ...
root@kali-linux-101:~#
3. run levels
Rfrence: http://www.tldp.org/LDP/sag/html/run-levels-intro.html
Signification conventionnelle des run levels.
Les run levels ne sont pas tous normaliss, en gnral la signification suivante est adopte:
0 Halt the system.
1 Single-user mode (for special administration).
2 Local Multiuser with Networking but without network service (like NFS)
3 Full Multiuser with Networking
4 Not Used
5 Full Multiuser with Networking and X Windows(GUI)
6 Reboot.
X- ssh
1. Introduction
Rfrence: http://www.linuxcertif.com/man/1/ssh/
1.1. NOM
ssh - Client SSH OpenSSH (programme de connexion distance).
1.2. SYNOPSIS
ssh [-1246AaCfgkMNnqsTtVvXxY ] [-b adr_assoc ] [-c crypt_spec ] -words [-D port ] [-e char_echap ] [-F
fich_config ] [-i fich_identite ] [-L port host hostport ] [-l nom_login ] [-m mac_spec ] [-o option ] -words [-p
port ] [-R port host hostport ] [-S ctl ] [utilisateur @ hostname ] [commande ].
1.3. DESCRIPTION
ssh (client SSH) est un programme qui permet de se connecter sur une machine distante, ou d'excuter des
commandes sur une machine distante. Il a pour objectif de remplacer rlogin et rsh, et fournit des transmissions
scurises et chiffres entre deux machines qui ne sont pas sres, et ce travers un rseau non scuris. On
peut transfrer des connexions X11 et des ports TCP/IP arbitraires travers un tunnel scuris.
ssh se connecte et ouvre une session sur la machine hostname (avec ventuellement un nom d' utilisateur).
L'utilisateur doit prouver son identit sur la machine distante l'aide d'une mthode parmi plusieurs qui d -
pendent de la version du protocole SSH utilise:
Si commande est spcifie, alors commande est excute sur la machine distante la place du shell de login.
2. Cl ssh
2.1. Changement de la cl ssh
chaque fois qu'on installe une distribution Linux par CD ou DVD ou par toute autre mthode similaire, l'ins-
tallation utilise la mme cl ssh par dfaut.
Cette cl est la mme pour toutes les installation faites l'aide de ces mmes sources d'installation.
Toute personne avec une installation similaire peut excuter une attaque dite Man in the Middle Attack
(MITM) et couter tout votre trafic chiffr.
Pour remdier cette situation, nous allons faire les manipulations ci-dessous.
Vrification.
root@kali-linux-101:/etc/ssh# ls -alsd cle_kali_par_defaut/
4 drwxr-xr-x 2 root root 4096 nov. 7 16:49 cle_kali_par_defaut/
root@kali-linux-101:/etc/ssh#
root@kali-linux-101:/etc/ssh# ls -als
total 188
4 drwxr-xr-x 3 root root 4096 nov. 7 16:49 .
12 drwxr-xr-x 183 root root 12288 nov. 7 15:10 ..
4 drwxr-xr-x 2 root root 4096 nov. 7 16:49 cle_kali_par_defaut
136 -rw-r--r-- 1 root root 136156 juin 29 17:34 moduli
4 -rw-r--r-- 1 root root 1669 juin 29 17:34 ssh_config
4 -rw-r--r-- 1 root root 2489 oct. 2 06:37 sshd_config
4 -rw------- 1 root root 668 nov. 6 15:22 ssh_host_dsa_key
4 -rw-r--r-- 1 root root 609 nov. 6 15:22 ssh_host_dsa_key.pub
4 -rw------- 1 root root 227 nov. 6 15:22 ssh_host_ecdsa_key
4 -rw-r--r-- 1 root root 181 nov. 6 15:22 ssh_host_ecdsa_key.pub
4 -rw------- 1 root root 1679 nov. 6 15:22 ssh_host_rsa_key
4 -rw-r--r-- 1 root root 401 nov. 6 15:22 ssh_host_rsa_key.pub
root@kali-linux-101:/etc/ssh#
Vrification.
root@kali-linux-101:/etc/ssh# ls -als
total 164
4 drwxr-xr-x 3 root root 4096 nov. 7 16:51 .
12 drwxr-xr-x 183 root root 12288 nov. 7 15:10 ..
4 drwxr-xr-x 2 root root 4096 nov. 7 16:51 cle_kali_par_defaut
136 -rw-r--r-- 1 root root 136156 juin 29 17:34 moduli
4 -rw-r--r-- 1 root root 1669 juin 29 17:34 ssh_config
4 -rw-r--r-- 1 root root 2489 oct. 2 06:37 sshd_config
root@kali-linux-101:/etc/ssh#
root@kali-linux-101:/etc/ssh# cd cle_kali_par_defaut/
root@kali-linux-101:/etc/ssh/cle_kali_par_defaut#
root@kali-linux-101:/etc/ssh/cle_kali_par_defaut# md5sum *
8fa1b546675aa1343bbdd0affc10f82d ssh_host_dsa_key
f4bafbf04f39d4614c688e2569f99252 ssh_host_dsa_key.pub
0aefece3f0d7b971dbf3562a1775309e ssh_host_ecdsa_key
5043df81dfeb08bbd06d76cb3c795508 ssh_host_ecdsa_key.pub
a9142cae20ea204a120131df6cb2a777 ssh_host_rsa_key
f2dfe8bd00eaeac78e5a5aedd67c66a5 ssh_host_rsa_key.pub
root@kali-linux-101:/etc/ssh/cle_kali_par_defaut#
3.1. chkconfig
Pour savoir si ssh est activ d'une faon permanente, on utilise la commande chkconfig.
root@kali-linux-101:~# chkconfig -l | egrep ssh
ssh 0:off 1:off 2:off 3:off 4:off 5:off 6:off
root@kali-linux-101:~#
Vrification.
root@kali-linux-101:~# chkconfig -l | egrep ssh
ssh 0:off 1:off 2:on 3:on 4:on 5:on 6:off
root@kali-linux-101:~#
4. MOTD
Rfrence: http://fr.wikipedia.org/wiki/Message_of_the_Day
Message Of The Day, abrg MOTD (en franais: "message du jour") est un message envoy un logiciel
client lors de son identification sur des serveurs (tels que les serveurs IRC, SSH ou encore FTP). Gnrale-
ment, ce message est utilis pour afficher les rgles, les contacts administratifs, ou encore un dessin ASCII Art.
Ajuster avec des espaces pour centrer le texte puis ajouter le nom de sa page web en dessous du texte.
__ __ _ _
| \/ (_) ___ _ __ ___ _ __ __ _| |_ ___ _ __
| |\/| | |/ __| '__/ _ \| '_ \ / _` | __/ _ \| '__|
| | | | | (__| | | (_) | | | | (_| | || (_) | |
|_| |_|_|\___|_| \___/|_| |_|\__,_|\__\___/|_|
http://www.micronator.org
Vrification.
root@kali-linux-101:~# ls -als /etc/motd*
4 -rw-r--r-- 1 root root 282 aot 13 09:34 /etc/motd
4 -rw-r--r-- 1 root root 282 nov. 7 20:19 /etc/motd_org
root@kali-linux-101:~#
1. Mise en garde
Il n'est pas recommand d'autoriser le partage de bureau votre station Kali Linux car cette autorisation repr-
sente une certaine faille de scurit.
2. Adresse IP
Pour se connecter au bureau de la station, si nous n'utilisons pas le nom DNS, il faut absolument savoir
l'adresse IP de la machine Kali Linux.
Pour lancer un terminal: cliquer l'icne du termi- - Entrer la commande ifconfig.
nal en haut droite. - On peut alors voir l'adresse IP (192.168.1.154).
5. Connexion
- Sur une station de travail, on lance Real VNC
Viewer.
- On entre l'adresse de la station Kali Linux de
mme que le numro de l'cran laquelle on veut
accder i.e. "0", ces deux paramtres sont relis par
un ":" | OK. On entre le mot de passe de de la connexion.
6. Confirmation automatique
l'cran Prfrence de partage de bureau, si on d-
coche Chaque accs cet ordinateur doit tre confir-
m, il ne sera plus ncessaire de confirmer l'accs. La
connexion sera automatiquement autorise. Il faudra
quand mme entrer le mot de passe de la connexion.
7. remmina
7.1. Introduction
Rfrence: http://fr.wikipedia.org/wiki/Remmina
remmina est un client graphique de connexion et de prise de contrle de bureau multi-protocoles pour les sys-
tmes d'exploitation bass sur le noyau Linux. Il s'appuie sur la bibliothque GTK+ pour l'affichage et permet
de se connecter distance sur les bureaux de nombreux systmes d'exploitation: GNU/Linux, Unix, Windows,
Mac OS, Android, etc.
Dans sa dernire version, remmina prend en charge les technologies NX, RDP, SFTP, SSH, VNC et XDMCP.
Les connexions peuvent se faire en clair (pas scuris du tout) ou travers un tunnel SSH chiffr (recomman-
d) par mot de passe ou par change de cls.
On le trouve entre autres dans les dpts des distributions suivantes:
- Debian depuis la version 6 (Squeeze)
- Ubuntu partir de 10.04 (Lucid Lynx)
- Linux Mint depuis la version 10 (Julia)
- Fedora 11 (Lonidas) et suprieures
7.2. Installation
On installe remmina en lanant la commande ci-dessous.
root@kali-linux-101:~# apt-get install remmina -y
Lecture des listes de paquets... Fait
Construction de l'arbre des dpendances
Lecture des informations d'tat... Fait
Les paquets supplmentaires suivants seront installs :
libfreerdp-plugins-standard libfreerdp1 remmina-common remmina-plugin-rdp remmina-plugin-
vnc
Paquets suggrs :
freerdp-x11
Les NOUVEAUX paquets suivants seront installs :
libfreerdp-plugins-standard libfreerdp1 remmina remmina-common remmina-plugin-rdp
remmina-plugin-vnc
0 mis jour, 6 nouvellement installs, 0 enlever et 0 non mis jour.
Il est ncessaire de prendre 1 231 ko dans les archives.
Aprs cette opration, 4 722 ko d'espace disque supplmentaires seront utiliss.
Rception de : 1 http://http.kali.org/kali/ kali/main libfreerdp1 amd64
1.1.0~beta1+git20131203-0kali [758 kB]
...
...
...
Traitement des actions diffres ( triggers ) pour hicolor-icon-theme ...
Traitement des actions diffres ( triggers ) pour desktop-file-utils ...
Traitement des actions diffres ( triggers ) pour gnome-menus ...
Traitement des actions diffres ( triggers ) pour man-db ...
Traitement des actions diffres ( triggers ) pour menu ...
Paramtrage de libfreerdp1:amd64 (1.1.0~beta1+git20131203-0kali) ...
Paramtrage de libfreerdp-plugins-standard:amd64 (1.1.0~beta1+git20131203-0kali) ...
Paramtrage de remmina-common (1.0.0-4+deb7u1) ...
Paramtrage de remmina (1.0.0-4+deb7u1) ...
Paramtrage de remmina-plugin-rdp (1.0.0-4+deb7u1) ...
Paramtrage de remmina-plugin-vnc (1.0.0-4+deb7u1) ...
Traitement des actions diffres ( triggers ) pour menu ...
root@kali-linux-101:~#
7.3. Paramtres
Ajustement des paramtres de connexion.
Applications | Internet | Remmina Remote
Desktop Client. Outils | Greffons.
1. Introduction
Rfrence: http://fr.wikipedia.org/wiki/FileZilla
FileZilla Client (FileZilla) est un client FTP, FTPS et SFTP, dvelopp sous la licence publique gnrale
GNU. Il existe galement un logiciel de serveur FTP du nom de FileZilla Server.
Aucune installation Linux n'est complte sans avoir un bon client FTP. FileZilla est vraiment le meilleur client
disponible prsentement.
2. Installation
On installe FileZilla en lanant la commande ci-dessous.
root@kali-linux-101:~# apt-get install filezilla filezilla-common -y
Lecture des listes de paquets... Fait
Construction de l'arbre des dpendances
Lecture des informations d'tat... Fait
Les paquets supplmentaires suivants seront installs :
libtinyxml2.6.2
Les NOUVEAUX paquets suivants seront installs :
filezilla filezilla-common libtinyxml2.6.2
0 mis jour, 3 nouvellement installs, 0 enlever et 0 non mis jour.
Il est ncessaire de prendre 4 324 ko dans les archives.
Aprs cette opration, 11,3 Mo d'espace disque supplmentaires seront utiliss.
Rception de : 1 http://http.kali.org/kali/ kali/main libtinyxml2.6.2 amd64 2.6.2-1 [43,8
kB]
Rception de : 2 http://http.kali.org/kali/ kali/main filezilla-common all 3.5.3-2 [3 015
kB]
Rception de : 3 http://http.kali.org/kali/ kali/main filezilla amd64 3.5.3-2 [1 265 kB]
4 324 ko rceptionns en 7s (551 ko/s)
Slection du paquet libtinyxml2.6.2 prcdemment dslectionn.
(Lecture de la base de donnes... 318249 fichiers et rpertoires dj installs.)
Dpaquetage de libtinyxml2.6.2 ( partir de .../libtinyxml2.6.2_2.6.2-1_amd64.deb) ...
Slection du paquet filezilla-common prcdemment dslectionn.
Dpaquetage de filezilla-common ( partir de .../filezilla-common_3.5.3-2_all.deb) ...
Slection du paquet filezilla prcdemment dslectionn.
Dpaquetage de filezilla ( partir de .../filezilla_3.5.3-2_amd64.deb) ...
Traitement des actions diffres ( triggers ) pour man-db ...
Traitement des actions diffres ( triggers ) pour hicolor-icon-theme ...
Traitement des actions diffres ( triggers ) pour menu ...
Traitement des actions diffres ( triggers ) pour desktop-file-utils ...
Traitement des actions diffres ( triggers ) pour gnome-menus ...
Paramtrage de libtinyxml2.6.2 (2.6.2-1) ...
Paramtrage de filezilla-common (3.5.3-2) ...
Paramtrage de filezilla (3.5.3-2) ...
Traitement des actions diffres ( triggers ) pour menu ...
root@kali-linux-101:~#
Par dfaut, le navigateur Iceweasel est en anglais seulement. Nous allons ajouter un paquet de francisation.
1. Vrification de Iceweasel
Pour afficher les menus, clac droite de l'onglet et
On lance Iceweasel en cliquant son icne. cocher Menu Bar.
3. Vrification
On lance Iceweasel.
Le menu est maintenant en franais.
XIV- htop
1. Introduction
htop est un moniteur systme pour Linux trs similaire top, mais qui propose une interface dans un terminal
plus convivial que ce dernier. Il est programm en C l'aide de la bibliothque ncurses.
Rfrence: http://fr.wikipedia.org/wiki/Htop
2. Installation
On installe htop en lanant la commande ci-dessous.
root@kali-linux-101:~# apt-get install htop
Lecture des listes de paquets... Fait
Construction de l'arbre des dpendances
Lecture des informations d'tat... Fait
Paquets suggrs :
strace ltrace
Les NOUVEAUX paquets suivants seront installs :
htop
0 mis jour, 1 nouvellement installs, 0 enlever et 4 non mis jour.
Il est ncessaire de prendre 0 o/74,9 ko dans les archives.
Aprs cette opration, 216 ko d'espace disque supplmentaires seront utiliss.
Slection du paquet htop prcdemment dslectionn.
(Lecture de la base de donnes... 340828 fichiers et rpertoires dj installs.)
Dpaquetage de htop ( partir de .../htop_1.0.1-1_amd64.deb) ...
Traitement des actions diffres ( triggers ) pour menu ...
Traitement des actions diffres ( triggers ) pour man-db ...
Traitement des actions diffres ( triggers ) pour desktop-file-utils ...
Traitement des actions diffres ( triggers ) pour gnome-menus ...
Paramtrage de htop (1.0.1-1) ...
Traitement des actions diffres ( triggers ) pour menu ...
root@kali-linux-101:~#
3. Commande
-d --delay=DELAY
Les dlais sont en diximes de seconde (0.1 secondes).
Pour utiliser htop on lance la commande ci-dessous.
root@kali-linux-101:~# htop -d 10
...
XV- Tor
1. Introduction
Rfrence: http://fr.wikipedia.org/wiki/Tor_%28r%C3%A9seau%29
Tor (acronyme de The Onion Router, littralement "le routeur oignon") est un rseau in-
formatique superpos mondial et dcentralis, implmentation du principe de rseau mlan-
g (mix network). Il est compos de routeurs organiss en couches, appels nuds de loi-
gnon, qui transmettent de manire anonyme des flux TCP. Le rseau Tor peut ainsi rendre
anonymes tous les changes internet fonds sur le protocole de communication TCP. Ce lo-
giciel libre est distribu sous licence BSD rvise.
Le routage en oignon fait rebondir les changes TCP au sein dInternet afin de neutraliser les analyses de tra-
fic sur une partie du rseau (notamment les analyses par attaque de l'homme du milieu). Les utilisateurs du r-
seau deviennent alors impossibles identifier.
2. Installation
Tor est disponible depuis les dpts Kali Linux.
Pour l'installer directement depuis un dpt Kali Linux, ouvrir un terminal et lancer la commande ci-dessous.
root@kali-linux-101:~# apt-get install tor
Lecture des listes de paquets... Fait
Construction de l'arbre des dpendances
Lecture des informations d'tat... Fait
Les paquets suivants ont t installs automatiquement et ne sont plus ncessaires :
distorm3 libgadu3 libmozjs24d libtsk3-3 xulrunner-24.0
Veuillez utiliser apt-get autoremove pour les supprimer.
Les paquets supplmentaires suivants seront installs :
tor-geoipdb torsocks
Paquets suggrs :
mixmaster xul-ext-torbutton tor-arm polipo privoxy apparmor-utils
Les NOUVEAUX paquets suivants seront installs :
tor tor-geoipdb torsocks
0 mis jour, 3 nouvellement installs, 0 enlever et 0 non mis jour.
Il est ncessaire de prendre 2 511 ko dans les archives.
Aprs cette opration, 6 504 ko d'espace disque supplmentaires seront utiliss.
Souhaitez-vous continuer [O/n] ? O
Rception de : 1 http://http.kali.org/kali/ kali/main tor amd64 0.2.4.24-1 [1 351 kB]
Rception de : 2 http://http.kali.org/kali/ kali/main torsocks amd64 1.2-3 [80,4 kB]
Rception de : 3 http://http.kali.org/kali/ kali/main tor-geoipdb all 0.2.4.24-1 [1 080 kB]
2 511 ko rceptionns en 4s (513 ko/s)
Slection du paquet tor prcdemment dslectionn.
(Lecture de la base de donnes... 318273 fichiers et rpertoires dj installs.)
Dpaquetage de tor ( partir de .../tor_0.2.4.24-1_amd64.deb) ...
Slection du paquet torsocks prcdemment dslectionn.
Dpaquetage de torsocks ( partir de .../torsocks_1.2-3_amd64.deb) ...
Slection du paquet tor-geoipdb prcdemment dslectionn.
Dpaquetage de tor-geoipdb ( partir de .../tor-geoipdb_0.2.4.24-1_all.deb) ...
Traitement des actions diffres ( triggers ) pour man-db ...
Paramtrage de tor (0.2.4.24-1) ...
Something or somebody made /var/lib/tor disappear.
Tel que dcrit lors de l'installation de Tor, on enlve les paquets qui ne sont plus ncessaires.
root@kali-linux-101:~# apt-get autoremove distorm3 libgadu3 libmozjs24d libtsk3-3 xulrunner-24.0
Lecture des listes de paquets... Fait
Construction de l'arbre des dpendances
Lecture des informations d'tat... Fait
Les paquets suivants seront ENLEVS :
distorm3 libgadu3 libmozjs24d libtsk3-3 xulrunner-24.0
0 mis jour, 0 nouvellement installs, 5 enlever et 0 non mis jour.
Aprs cette opration, 53,1 Mo d'espace disque seront librs.
Souhaitez-vous continuer [O/n] ? O
(Lecture de la base de donnes... 318339 fichiers et rpertoires dj installs.)
Suppression de distorm3 ...
Suppression de libgadu3 ...
Suppression de xulrunner-24.0 ...
Suppression de libmozjs24d ...
Suppression de libtsk3-3 ...
Traitement des actions diffres ( triggers ) pour python-support ...
Traitement des actions diffres ( triggers ) pour man-db ...
root@kali-linux-101:~#
3. Vrification
la page d'acceuil de Google, on recherche:
test my speed | Recherche Google.
Victoire totale.
Crdits
2014 RF-232
Auteur: Michel-Andr Robillard CLP
Remerciement: Tous les contributeurs GNU/GPL.
Intgr par: Michel-Andr Robillard CLP
Contact: michelandre at micronator.org
Rpertoire de ce document: E:\000_DocPourRF232_general\RF-232_Kali-Linux\RF-232_Kali-Linux_2014-11-
09_10h17.odt
License, but only as regards disclaiming warranties: any other im- der this License. If your rights have been terminated and not per -
GNU Free Documentation License plication that these Warranty Disclaimers may have is void and has You may add a section Entitled Endorsements, provided it contains manently reinstated, receipt of a copy of some or all of the same ma-
no effect on the meaning of this License. nothing but endorsements of your Modified Version by various terial does not give you any rights to use it.
parties--for example, statements of peer review or that the text has
Version 1.3, 3 November 2008 2. VERBATIM COPYING been approved by an organization as the authoritative definition of a 10. FUTURE REVISIONS OF THIS LICENSE
standard.
You may copy and distribute the Document in any medium, either The Free Software Foundation may publish new, revised versions of
Copyright (C) 2000, 2001, 2002, 2007, 2008 Free Software Founda- commercially or noncommercially, provided that this License, the You may add a passage of up to five words as a Front-Cover Text, the GNU Free Documentation License from time to time. Such new
tion, Inc. http://fsf.org/ copyright notices, and the license notice saying this License applies and a passage of up to 25 words as a Back-Cover Text, to the end of versions will be similar in spirit to the present version, but may dif -
to the Document are reproduced in all copies, and that you add no the list of Cover Texts in the Modified Version. Only one passage of fer in detail to address new problems or concerns. See
Everyone is permitted to copy and distribute verbatim copies of this other conditions whatsoever to those of this License. You may not Front-Cover Text and one of Back-Cover Text may be added by (or http://www.gnu.org/copyleft/.
license document, but changing it is not allowed. use technical measures to obstruct or control the reading or further through arrangements made by) any one entity. If the Document
copying of the copies you make or distribute. However, you may already includes a cover text for the same cover, previously added Each version of the License is given a distinguishing version num -
0. PREAMBLE accept compensation in exchange for copies. If you distribute a by you or by arrangement made by the same entity you are acting on ber. If the Document specifies that a particular numbered version of
large enough number of copies you must also follow the conditions behalf of, you may not add another; but you may replace the old one, this License or any later version applies to it, you have the option of
The purpose of this License is to make a manual, textbook, or other in section 3. on explicit permission from the previous publisher that added the old following the terms and conditions either of that specified version or
functional and useful document free in the sense of freedom: to as- one. of any later version that has been published (not as a draft) by the
sure everyone the effective freedom to copy and redistribute it, with You may also lend copies, under the same conditions stated above, Free Software Foundation. If the Document does not specify a ver -
or without modifying it, either commercially or noncommercially. and you may publicly display copies. The author(s) and publisher(s) of the Document do not by this Li- sion number of this License, you may choose any version ever pub-
Secondarily, this License preserves for the author and publisher a cense give permission to use their names for publicity for or to assert lished (not as a draft) by the Free Software Foundation. If the Docu -
way to get credit for their work, while not being considered respons- 3. COPYING IN QUANTITY or imply endorsement of any Modified Version. ment specifies that a proxy can decide which future versions of this
ible for modifications made by others. License can be used, that proxy's public statement of acceptance of a
If you publish printed copies (or copies in media that commonly 5. COMBINING DOCUMENTS version permanently authorizes you to choose that version for the
This License is a kind of copyleft, which means that derivative have printed covers) of the Document, numbering more than 100, Document.
works of the document must themselves be free in the same sense. It and the Document's license notice requires Cover Texts, you must You may combine the Document with other documents released un-
complements the GNU General Public License, which is a copyleft enclose the copies in covers that carry, clearly and legibly, all these der this License, under the terms defined in section 4 above for mod - 11. RELICENSING
license designed for free software. Cover Texts: Front-Cover Texts on the front cover, and Back-Cover ified versions, provided that you include in the combination all of
Texts on the back cover. Both covers must also clearly and legibly the Invariant Sections of all of the original documents, unmodified, "Massive Multiauthor Collaboration Site" (or "MMC Site") means
We have designed this License in order to use it for manuals for free identify you as the publisher of these copies. The front cover must and list them all as Invariant Sections of your combined work in its any World Wide Web server that publishes copyrightable works and
software, because free software needs free documentation: a free present the full title with all words of the title equally prominent and license notice, and that you preserve all their Warranty Disclaimers. also provides prominent facilities for anybody to edit those works. A
program should come with manuals providing the same freedoms visible. You may add other material on the covers in addition. Copy- public wiki that anybody can edit is an example of such a server. A
that the software does. But this License is not limited to software ing with changes limited to the covers, as long as they preserve the The combined work need only contain one copy of this License, and "Massive Multiauthor Collaboration" (or "MMC") contained in the
manuals; it can be used for any textual work, regardless of subject title of the Document and satisfy these conditions, can be treated as multiple identical Invariant Sections may be replaced with a single site means any set of copyrightable works thus published on the
matter or whether it is published as a printed book. We recommend verbatim copying in other respects. copy. If there are multiple Invariant Sections with the same name MMC site.
this License principally for works whose purpose is instruction or but different contents, make the title of each such section unique by "CC-BY-SA" means the Creative Commons Attribution-Share Alike
reference. If the required texts for either cover are too voluminous to fit legibly, adding at the end of it, in parentheses, the name of the original au - 3.0 license published by Creative Commons Corporation, a not-for-
you should put the first ones listed (as many as fit reasonably) on the thor or publisher of that section if known, or else a unique number. profit corporation with a principal place of business in San Fran -
1. APPLICABILITY AND DEFINITIONS actual cover, and continue the rest onto adjacent pages. Make the same adjustment to the section titles in the list of Invariant cisco, California, as well as future copyleft versions of that license
Sections in the license notice of the combined work. published by that same organization.
This License applies to any manual or other work, in any medium, If you publish or distribute Opaque copies of the Document number - "Incorporate" means to publish or republish a Document, in whole
that contains a notice placed by the copyright holder saying it can be ing more than 100, you must either include a machine-readable In the combination, you must combine any sections Entitled History or in part, as part of another Document.
distributed under the terms of this License. Such a notice grants a Transparent copy along with each Opaque copy, or state in or with in the various original documents, forming one section Entitled His- An MMC is "eligible for relicensing" if it is licensed under this Li -
world-wide, royalty-free license, unlimited in duration, to use that each Opaque copy a computer-network location from which the gen- tory; likewise combine any sections Entitled Acknowledgements, cense, and if all works that were first published under this License
work under the conditions stated herein. The Document, below, eral network-using public has access to download using public- and any sections Entitled Dedications. You must delete all sections somewhere other than this MMC, and subsequently incorporated in
refers to any such manual or work. Any member of the public is a standard network protocols a complete Transparent copy of the Doc- Entitled Endorsements. whole or in part into the MMC, (1) had no cover texts or invariant
licensee, and is addressed as you. You accept the license if you ument, free of added material. If you use the latter option, you must sections, and (2) were thus incorporated prior to November 1, 2008.
copy, modify or distribute the work in a way requiring permission take reasonably prudent steps, when you begin distribution of 6. COLLECTIONS OF DOCUMENTS The operator of an MMC Site may republish an MMC contained in
under copyright law. Opaque copies in quantity, to ensure that this Transparent copy will the site under CC-BY-SA on the same site at any time before August
remain thus accessible at the stated location until at least one year You may make a collection consisting of the Document and other 1, 2009, provided the MMC is eligible for relicensing.
A Modified Version of the Document means any work containing the after the last time you distribute an Opaque copy (directly or through documents released under this License, and replace the individual
Document or a portion of it, either copied verbatim, or with modific- your agents or retailers) of that edition to the public. copies of this License in the various documents with a single copy
ations and/or translated into another language. that is included in the collection, provided that you follow the rules
It is requested, but not required, that you contact the authors of the of this License for verbatim copying of each of the documents in all
A Secondary Section is a named appendix or a front-matter section Document well before redistributing any large number of copies, to other respects.
of the Document that deals exclusively with the relationship of the give them a chance to provide you with an updated version of the
publishers or authors of the Document to the Document's overall Document. You may extract a single document from such a collection, and dis -
subject (or to related matters) and contains nothing that could fall tribute it individually under this License, provided you insert a copy
directly within that overall subject. (Thus, if the Document is in part 4. MODIFICATIONS of this License into the extracted document, and follow this License
a textbook of mathematics, a Secondary Section may not explain any in all other respects regarding verbatim copying of that document.
mathematics.) The relationship could be a matter of historical con - You may copy and distribute a Modified Version of the Document
nection with the subject or with related matters, or of legal, commer- under the conditions of sections 2 and 3 above, provided that you re - 7. AGGREGATION WITH INDEPENDENT WORKS
cial, philosophical, ethical or political position regarding them. lease the Modified Version under precisely this License, with the
Modified Version filling the role of the Document, thus licensing A compilation of the Document or its derivatives with other separate
The Invariant Sections are certain Secondary Sections whose titles distribution and modification of the Modified Version to whoever and independent documents or works, in or on a volume of a storage
are designated, as being those of Invariant Sections, in the notice possesses a copy of it. In addition, you must do these things in the or distribution medium, is called an aggregate if the copyright result -
that says that the Document is released under this License. If a sec- Modified Version: ing from the compilation is not used to limit the legal rights of the
tion does not fit the above definition of Secondary then it is not al - compilation's users beyond what the individual works permit. When
lowed to be designated as Invariant. The Document may contain A. Use in the Title Page (and on the covers, if any) a title distinct the Document is included in an aggregate, this License does not ap-
zero Invariant Sections. If the Document does not identify any In- from that of the Document, and from those of previous versions ply to the other works in the aggregate which are not themselves de -
variant Sections then there are none. (which should, if there were any, be listed in the History section of rivative works of the Document.
the Document). You may use the same title as a previous version if
The Cover Texts are certain short passages of text that are listed, as the original publisher of that version gives permission. If the Cover Text requirement of section 3 is applicable to these cop -
Front-Cover Texts or Back-Cover Texts, in the notice that says that B. List on the Title Page, as authors, one or more persons or entities ies of the Document, then if the Document is less than one half of
the Document is released under this License. A Front-Cover Text responsible for authorship of the modifications in the Modified Ver- the entire aggregate, the Document's Cover Texts may be placed on
may be at most 5 words, and a Back-Cover Text may be at most 25 sion, together with at least five of the principal authors of the Docu - covers that bracket the Document within the aggregate, or the elec-
words. ment (all of its principal authors, if it has fewer than five), unless tronic equivalent of covers if the Document is in electronic form.
they release you from this requirement. Otherwise they must appear on printed covers that bracket the whole
A Transparent copy of the Document means a machine-readable C. State on the Title page the name of the publisher of the Modified aggregate.
copy, represented in a format whose specification is available to the Version, as the publisher.
general public, that is suitable for revising the document straightfor- D. Preserve all the copyright notices of the Document. 8. TRANSLATION
wardly with generic text editors or (for images composed of pixels) E. Add an appropriate copyright notice for your modifications adja-
generic paint programs or (for drawings) some widely available cent to the other copyright notices. Translation is considered a kind of modification, so you may distrib-
drawing editor, and that is suitable for input to text formatters or for F. Include, immediately after the copyright notices, a license notice ute translations of the Document under the terms of section 4. Repla -
automatic translation to a variety of formats suitable for input to text giving the public permission to use the Modified Version under the cing Invariant Sections with translations requires special permission
formatters. A copy made in an otherwise Transparent file format terms of this License, in the form shown in the Addendum below. from their copyright holders, but you may include translations of
whose markup, or absence of markup, has been arranged to thwart or G. Preserve in that license notice the full lists of Invariant Sections some or all Invariant Sections in addition to the original versions of
discourage subsequent modification by readers is not Transparent. and required Cover Texts given in the Document's license notice. these Invariant Sections. You may include a translation of this Li -
An image format is not Transparent if used for any substantial H. Include an unaltered copy of this License. cense, and all the license notices in the Document, and any Warranty
amount of text. A copy that is not Transparent is called Opaque. I. Preserve the section Entitled History, Preserve its Title, and add to Disclaimers, provided that you also include the original English ver-
it an item stating at least the title, year, new authors, and publisher sion of this License and the original versions of those notices and
Examples of suitable formats for Transparent copies include plain of the Modified Version as given on the Title Page. If there is no disclaimers. In case of a disagreement between the translation and
ASCII without markup, Texinfo input format, LaTeX input format, section Entitled History in the Document, create one stating the the original version of this License or a notice or disclaimer, the ori-
SGML or XML using a publicly available DTD, and standard-con- title, year, authors, and publisher of the Document as given on its ginal version will prevail.
forming simple HTML, PostScript or PDF designed for human Title Page, then add an item describing the Modified Version as
modification. Examples of transparent image formats include PNG, stated in the previous sentence. If a section in the Document is Entitled Acknowledgements, Dedica -
XCF and JPG. Opaque formats include proprietary formats that can J. Preserve the network location, if any, given in the Document for tions, or History, the requirement (section 4) to Preserve its Title
be read and edited only by proprietary word processors, SGML or public access to a Transparent copy of the Document, and likewise (section 1) will typically require changing the actual title.
XML for which the DTD and/or processing tools are not generally the network locations given in the Document for previous versions
available, and the machine-generated HTML, PostScript or PDF it was based on. These may be placed in the History section. You 9. TERMINATION
produced by some word processors for output purposes only. may omit a network location for a work that was published at least
four years before the Document itself, or if the original publisher of You may not copy, modify, sublicense, or distribute the Document
The Title Page means, for a printed book, the title page itself, plus the version it refers to gives permission. except as expressly provided under this License. Any attempt other-
such following pages as are needed to hold, legibly, the material this K. For any section Entitled Acknowledgements or Dedications, Pre- wise to copy, modify, sublicense, or distribute it is void, and will
License requires to appear in the title page. For works in formats serve the Title of the section, and preserve in the section all the sub - automatically terminate your rights under this License.
which do not have any title page as such, Title Page means the text stance and tone of each of the contributor acknowledgements and/or
near the most prominent appearance of the work's title, preceding the dedications given therein. However, if you cease all violation of this License, then your license
beginning of the body of the text. The publisher means any person L. Preserve all the Invariant Sections of the Document, unaltered in from a particular copyright holder is reinstated (a) provisionally, un-
or entity that distributes copies of the Document to the public. their text and in their titles. Section numbers or the equivalent are less and until the copyright holder explicitly and finally terminates
not considered part of the section titles. your license, and (b) permanently, if the copyright holder fails to no -
A section Entitled XYZ means a named subunit of the Document M. Delete any section Entitled Endorsements. Such a section may tify you of the violation by some reasonable means prior to 60 days
whose title either is precisely XYZ or contains XYZ in parentheses not be included in the Modified Version. after the cessation.
following text that translates XYZ in another language. (Here XYZ N. Do not retitle any existing section to be Entitled Endorsements
stands for a specific section name mentioned below, such as Ac - or to conflict in title with any Invariant Section. Moreover, your license from a particular copyright holder is rein-
knowledgements, Dedications, Endorsements, or History.) To Pre- O. Preserve any Warranty Disclaimers. stated permanently if the copyright holder notifies you of the viola-
serve the Title of such a section when you modify the Document tion by some reasonable means, this is the first time you have re-
means that it remains a section Entitled XYZ according to this defin - If the Modified Version includes new front-matter sections or appen- ceived notice of violation of this License (for any work) from that
ition. dices that qualify as Secondary Sections and contain no material copyright holder, and you cure the violation prior to 30 days after
copied from the Document, you may at your option designate some your receipt of the notice.
The Document may include Warranty Disclaimers next to the notice or all of these sections as invariant. To do this, add their titles to the
which states that this License applies to the Document. These War - list of Invariant Sections in the Modified Version's license notice. Termination of your rights under this section does not terminate the
ranty Disclaimers are considered to be included by reference in this These titles must be distinct from any other section titles. licenses of parties who have received copies or rights from you un-