Common Kicksecure CLI Commands

From Kicksecure
Jump to navigation Jump to search

There are a number of common command line operations that are performed by users of all skill levels in the Kicksecure environment. This wiki page is intended to serve as a quick and handy reference guide for locating these, but it is not a substitute for reading relevant wiki entries that provide detailed instructions for various activities. [1] Additional, useful commands will be added here over time.

Table: Kicksecure Common Commands

Category Commands
Change Keyboard Layout
  • To change the keyboard layout:
    • sudo dpkg-reconfigure keyboard-configuration
    • sudo dpkg-reconfigure console-data
  • Make the reconfigured keyboard-configuration change take effect:
    • sudo setupcon
Connection Wizard (Enable/Disable Tor)

Not yet available in Kicksecure. This notice might be outdated.

  • lxsudo anon-connection-wizard
  • sudo setup-wizard-dist
Default Username and Password.
  • Default username: user
  • Default password: changeme
Important Logs Not yet available in Kicksecure. This notice might be outdated.
  • sudo tail -f /var/log/syslog
  • sudo sdwdate-log-viewer
  • tail -f /var/run/tor/log
Nyx: Tor Command Line Monitor [2]
  • Launch Nyx:

nyx

sdwdate
  • Restart sdwdate:

sudo sdwdate-clock-jump

systemcheck

Not yet available in Kicksecure. This notice might be outdated.

  • General system check, Network Time Synchronization and Tor Connection Check:

systemcheck

Time
  • Report the date in UTC:

date -u

  • Manually set the system clock:

sudo date -s "17 FEB 2019 24:00:00" && sudo hwclock -w

  • Randomize the time: [3] [4]
    • clock-random-manual-gui: a randomized clock setting (in UTC) is entered via a GUI.
    • clock-random-manual-cli: a randomized clock setting (in UTC) is entered on the command line. For example: echo "Wed Dec 04 06:20:13 UTC 2019" | /usr/bin/clock-random-manual-cli
Tor
  • Restart Network:

sudo service networking restart

  • Restart Tor:

sudo service tor restart

  • Stop Tor:

sudo systemctl stop tor@default

  • Check the Tor version:

anon-info

  • Check the Tor configuration:

anon-verify sudo -u debian-tor tor --verify-config

Virtual Consoles
  • Text console: Press Alt + Crtl + F1
    • Additional text consoles: Press Alt + Crtl + F2 or F3 and so on.
  • Graphical console: Press Alt + Crtl + F7
VM Operations
  • Reboot:

sudo reboot

  • Power off:

sudo poweroff

Kicksecure Version
  • Kicksecure version:

cat /etc/kicksecure_version

DNS Resolution Functionality Test
  • nslookup check.torproject.org
GnuPG (OpenPGP)
  • Retrieve keys (example):
  • Display key fingerprint (example):

sudo apt-key adv --fingerprint A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89

  • Check file signatures (example):

gpg --verify tor-browser-linux64-8.5_en-US.tar.xz.asc tor-browser-linux64-8.5_en-US.tar.xz

HexChat
  • Reset HexChat identity:

hexchat-reset

Network Restart
  • sudo service networking restart
OS Updates / Software Installation
  • upgrade-nonroot or
  • sudo apt update && sudo apt full-upgrade
  • Install the package-name package.

sudo apt install package-name

  • Install the package-name package from Debian backports. Requires enabling backports repository.

sudo apt -t bookworm-backports install package-name

Footnotes[edit]

  1. This entry has been inspired by the relatively unknown kicksecure command, which already lists common Kicksecure command line operations.
  2. This is a Tor Controller which runs as a console application.
  3. A non-zero exit codes signifies an error, while 0 means it succeeded.
  4. Also see: man clock-random-manual-gui man clock-random-manual-cli

We believe security software like Kicksecure needs to remain Open Source and independent. Would you help sustain and grow the project? Learn more about our 12 year success story and maybe DONATE!