Hacking Articles Part 10 (1)

Comenzar desde el principio
                                        

*

gpg: using RSA key DA87E80D6294BE9B

Key fingerprint = DF9B 9C49 EAA9 2984 3258 9D76 DA87 E80D 6294 BE9B

*

DA87E80D6294BE9B matches Key fingerprint = DF9B 9C49 EAA9 2984 3258 9D76 DA87 E80D 6294 BE9B

To download and import this key run:

$ gpg --keyserver keyring.debian.org --recv-keys DA87E80D6294BE9B

5. Now, we need to verify GPG Siganture of Hashsum File

-Now we can run the command which checks if the signature of the hashsum file we have, ay hindi modified ng kahit na sino at nagmamatch sa nagenerate at signed ng Debian.

*

gpg: assuming signed data in 'SHA512SUMS'

gpg: Signature made Mon 19 Sep 2016 12:23:47 AM HKT

gpg: using RSA key DA87E80D6294BE9B

gpg: checking the trustdb

gpg: marginals needed: 3 completes needed: 1 trust model: pgp

gpg: depth: 0 valid: 1 signed: 0 trust: 0-, 0q, 0n, 0m, 0f, 1u

gpg: Good signature from "Debian CD signing key <debian-cd@lists.debian.org>" [unknown]

gpg: WARNING: This key is not certified with a trusted signature!

gpg: There is no indication that the signature belongs to the owner.

Primary key fingerprint: DF9B 9C49 EAA9 2984 3258 9D76 DA87 E80D 6294 BE9B

*

Ang pinakaimportanteng line sa output na yan ay ang "Good signature from ..." . It still shows a warning since we never signed that Debian key.

6. After that, we need to write ISO image to install media

-Dahil nga nakaverifiy na ang ating ISO file pwede na tayong magsimulang mag by writing it to an USB stick or Blank DVD. So gamitin mo ang pinakapaborito mong tool to write the ISO to your install media and boot from it. In the example, he used dd and a USB stick attached as /dev/sdb.

*

dd if=debian-8.6.0-amd64-DVD-1.iso of=/dev/sdb bs=1M oflag=sync

*

7. Now, we will install Debian on Crypted Volume with USB boot Partition

(How:

1. There you need to select the "Guided, use entire disk and set up encrypted LVM" option. After that select the built-in disk of your laptop, which usually is sda but double check this before you go ahead, as it will overwrite the data! The 137 GB disk in this case is the built-in disk and the 8 GB is the USB stick.

2.It makes no difference at this point if you select "All files in one partition" or "Separate /home partition". The USB boot partition can be selected a later step.

3. Confirm that you want to overwrite your built-in disk shown as sda. It will take a while as it will write random data to the disk to ensure there is no unencrypted data left on the disk from previous installations for example.

4. Now you need to enter your passphrase that will be used to protect the private key of the crypt volume. Choose something long enough like a sentence and don't forget the passphrase else you can no longer access your data! Don't save the passphrase on any computer, smartphone or password manager. If you want to make a backup of your passphrase then use a ball pen and paper and store the paper backup in a secure location.

Hacking ArticlesDonde viven las historias. Descúbrelo ahora