Awesome! I subbed coz you are the first channel I found to do an “in depth” talk about Kali purple. I’m going to run it on my main pc, as a dual boot, not gonna pen test, but I will try to utilise the “defensive” tools they feature in it! Are you going to do another vid actually using it, especially the new defensive tools? So cool, thx man👍
As one that manages a decent size defensive team, I hope it can be used to help. I’ll hold judgement until I see it more, but I’m not seeing how a “SOC in a box” is possible but for the smallest of small places. There’s SO much more to managing security than tooling.
Hi c1ph3punk. Yes. of course I am holding judgement too until I can throughly dig into it more, the only expectation I have from tools like this is can they save me time and scale to handle the workloads I need. Yes, there is a lot more that has to be done besides what Kali Purple does, Its a red flag to me when a tool claims to do it all, whatever that means.
Anything is possible. For Selks I see my only option is to request a demo, would be hard to review that in all honesty unless Stamus Networks wants to provide me a short term license to try it out, as for Security Onion, yeah that would be much more likely
My disappointment so far is that the main stuff I wanted isn't even installed and the wiki has a bunch of complainants about the instructions are not even there so you can install them. I agree it is interesting but I wish the documentation was a little more flushed out.
I wonder what's your take on the conspiracy theory of honey pots? Like what if someone out there produces stuff of actual value like Kali or graphene os just to install a secret back door.
The concept of a defensive platform rather than at attack/pentest platform is a fresh take. Nice work from Kali.
Awesome! I subbed coz you are the first channel I found to do an “in depth” talk about Kali purple.
I’m going to run it on my main pc, as a dual boot, not gonna pen test, but I will try to utilise the “defensive” tools they feature in it!
Are you going to do another vid actually using it, especially the new defensive tools?
So cool, thx man👍
Awesome! Thank you for the sub!
@@CyberGizmo 👋
Thank you for this interesting introduction to it.
Great video. Gonna test it. Im studying Pentesting and cybersecurity. And i want to focus my knowledge on the blue team and infrastructure.
Thanks for bring this up, hope DJ later in time you do depth on these utilities on it as for testing.
Hi abobader, yes I will might be a few weeks but yes its on my list of to-dos
@@CyberGizmo Thanks DJ and well done as always.
that's really cool, I was expecting that they were going to release something like that
Thanks for this. Im thinking of making a video on another channel about non-pen-testing distros and its pretty timely that Purple just came out.
As one that manages a decent size defensive team, I hope it can be used to help. I’ll hold judgement until I see it more, but I’m not seeing how a “SOC in a box” is possible but for the smallest of small places. There’s SO much more to managing security than tooling.
Hi c1ph3punk. Yes. of course I am holding judgement too until I can throughly dig into it more, the only expectation I have from tools like this is can they save me time and scale to handle the workloads I need. Yes, there is a lot more that has to be done besides what Kali Purple does, Its a red flag to me when a tool claims to do it all, whatever that means.
Could you do a walkthgouh of the install of Secure Kali Pi? and maybe combine it with Sun Knudsen's Disable Data Persistene?
Any chance your gonna reviewing selks linux or security onion?
Anything is possible. For Selks I see my only option is to request a demo, would be hard to review that in all honesty unless Stamus Networks wants to provide me a short term license to try it out, as for Security Onion, yeah that would be much more likely
👍Nice!
My disappointment so far is that the main stuff I wanted isn't even installed and the wiki has a bunch of complainants about the instructions are not even there so you can install them. I agree it is interesting but I wish the documentation was a little more flushed out.
I wonder what's your take on the conspiracy theory of honey pots? Like what if someone out there produces stuff of actual value like Kali or graphene os just to install a secret back door.
Probably the wrong person to ask, I would never use one or build one, as for placing malware into trusted software that would be unethical to me.
*꧁ Hello ☝🏼 Thank you 👌 ꧂*
I’m not in the field but I liked Black Arch more.
That's great, but I always think of Black Arch as a pentesting and security researchers tool, is it organized to do cybersecurity defense?
Kali purple is woke version of Kali. That's why its purple XD :D