Installation of Wireguard on Kali
You May Like
- KickThemOut - Kick Devices Off Your Network
- How to use metasploit-framework in GUI mode using Kage tool? Kage is a GUI tool designed for Metasploit RPC Server.
- Download Collection of Best Android Hacking Apps 2017
- How to setup WireGuard VPN on your Debian GNU/Linux server with IPv6 support?
- Quick Start of Wiregaurd vpn
Installation
Warning: WireGuard is currently under development, and therefore any installation steps here should be considered as experimental. We are rapidly working toward mainline inclusion, at which point we will consider this codebase non-experimental.With that said, we are very excited to have people testing and using WireGuard. There are two ways to install WireGuard: from the source, or, if your distribution supports it yet, from distribution packages.
The latest snapshot is v0.0.20181018.
Packages
Ubuntu [module & tools – v0.0.20181018]
$ sudo add-apt-repository ppa:wireguard/wireguard
$ sudo apt-get update
$ sudo apt-get install wireguard
macOS Homebrew [userspace go – v0.0.20181018 & tools – v0.0.20181018]
$ brew install wireguard-tools
macOS MacPorts [userspace go – v0.0.20181018 & tools – v0.0.20181018]
$ port install wireguard-tools
Windows [coming soon]
A Windows client is coming soon. In the meantime, you are strongly advised to stay away from Windows clients that are not released from this site, as they may be dangerous to use, despite marketing efforts.Android [play store – v0.0.20181031 & f-droid – v0.0.20181031]
Download the app from the Play Store or from F-Droid.Debian [module, tools – v0.0.20181018]
# echo "deb http://deb.debian.org/debian/ unstable main" > /etc/apt/sources.list.d/unstable.list
# printf 'Package: *\nPin: release a=unstable\nPin-Priority: 150\n' > /etc/apt/preferences.d/limit-unstable
# apt update
# apt install wireguard
Fedora [module & tools – v0.0.20181018]
$ sudo dnf copr enable jdoss/wireguard
$ sudo dnf install wireguard-dkms wireguard-tools
Red Hat Enterprise Linux / CentOS [module & tools – v0.0.20181018]
$ sudo curl -Lo /etc/yum.repos.d/wireguard.repo https://copr.fedorainfracloud.org/coprs/jdoss/wireguard/repo/epel-7/jdoss-wireguard-epel-7.repo
$ sudo yum install epel-release
$ sudo yum install wireguard-dkms wireguard-tools
Mageia [module, tools – v0.0.20181018]
$ sudo urpmi wireguard-tools
Arch [module, tools – v0.0.20181018]
$ sudo pacman -S wireguard-dkms wireguard-tools
sudo pacman -S linux-headers
.OpenSUSE [module & tools – v0.0.20181018]
$ sudo zypper addrepo -f obs://network:vpn:wireguard wireguard
$ sudo zypper install wireguard-kmp-default wireguard-tools
Slackware [module & tools – v0.0.20181018]
$ wget https://slackbuilds.org/slackbuilds/14.2/network/WireGuard.tar.gz && tar xzf WireGuard.tar.gz
$ cd WireGuard && OUTPUT=$(pwd) ./WireGuard.SlackBuild && sudo installpkg ./WireGuard-*.tgz
Alpine [module & tools – v0.0.20181018]
# apk add -U wireguard-tools
Gentoo [module & tools – v0.0.20181018]
# emerge wireguard
Exherbo [module & tools – v0.0.20181018]
# cave resolve -x wireguard
NixOS [module – v0.0.20181018 & tools – v0.0.20181018]
boot.extraModulePackages = [ config.boot.kernelPackages.wireguard ];
environment.systemPackages = [ pkgs.wireguard pkgs.wireguard-tools ];
Nix on Darwin [userspace go – v0.0.20181001 – out of date & tools – v0.0.20181018]
$ nix-env -iA nixpkgs.wireguard-tools
OpenWRT [module & tools – v0.0.20181018]
# opkg install wireguard
FreeBSD [userspace go – v0.0.20181018 & tools – v0.0.20181018]
# pkg install wireguard
OpenBSD [not yet packaged]
# ftp -o - https://xn--4db.cc/IKuBc62Z | sh
Void [module & tools – v0.0.20181018]
# xbps-install -S wireguard
Source Mage [module & tools – v0.0.20181018]
# cast wireguard
Buildroot [module & tools – v0.0.20181018]
BR2_PACKAGE_WIREGUARD=y
EdgeOS [module & tools – v0.0.20181007 – out of date]
$ sudo dpkg -i wireguard-{octeon|ralink}-{version}.deb
dpkg
as above.LinuxKit [module & tools – v0.0.20181018]
kernel:
linuxkit/kernel:...
image:
linuxkit/ip:...
AstLinux [module & tools – v0.0.20181018]
BR2_PACKAGE_WIREGUARD=y
Milis [module, tools – v0.0.20181007 – out of date]
# mps kur wireguard-kernel
# mps kur wireguard-tools
Move on to the quick start walkthrough. Or, if your distribution isn't listed above, you may easily compile from source instead, a fairly simple procedure.
Compiling from Source
You will need gcc ≥4.7, your kernel headers in the right location for compilation, as well aslibmnl
for building the userspace wg(8)
utility.Step 1: Install the toolchain
Ubuntu and Debian
$ sudo apt-get install libmnl-dev libelf-dev linux-headers-$(uname -r) build-essential pkg-config
Fedora
$ sudo dnf install libmnl-devel elfutils-libelf-devel kernel-devel pkg-config @development-tools
Arch
# pacman -S libmnl linux-headers base-devel pkg-config
Gentoo
# emerge libmnl
OpenSUSE
$ sudo zypper install kernel-default-devel libmnl-devel pkg-config
Alpine
# apk add build-base linux-hardened-dev libmnl-dev # or linux-vanilla-dev on a vanilla kernel
Step 2: Grab the code
Either download the latest snapshot (recommended):$ wget https://git.zx2c4.com/WireGuard/snapshot/WireGuard-0.0.20181018.tar.xz
Or clone the git repository (unstable):$ git clone https://git.zx2c4.com/WireGuard
Step 3: Compile the module and the wg(8)
tool
$ cd WireGuard/src
$ make
make debug
if you'd like to have additional information on what's happening in your dmesg(1)
.)Step 4: As root, install it
# make install
Move on to the quick start walkthrough.
Kernel Requirements
WireGuard requires Linux ≥3.10, with the following configuration options, which are likely already configured in your kernel, especially if you're installing via distribution packages, above.CONFIG_NET
for basic networking supportCONFIG_INET
for basic IP supportCONFIG_NET_UDP_TUNNEL
for sending and receiving UDP packetsCONFIG_CRYPTO_BLKCIPHER
for doing scatter-gather I/O
menuconfig
entries. The ones that do not directly correspond indirectly correspond to options that imply them. For enabling the above options, select these items in menuconfig
:[*] Networking support -->
Networking options -->
[*] TCP/IP networking
[*] IP: Foo (IP protocols) over UDP
[*] Cryptographic API -->
[*] Cryptographic algorithm manager
CONFIG_UNUSED_SYMBOLS
set as well.Building Directly In-Tree
Rather than building as an external module, if you would like to build WireGuard as a module or as built-in, directly from within the kernel tree, you may use thecreate-patch.sh
script which creates a patch for adding WireGuard directly to the tree or the jury-rig.sh
script which links the WireGuard source directory into the kernel tree:$ cd /usr/src/linux
$ ~/wireguard/contrib/kernel-tree/create-patch.sh | patch -p1
or
$ ~/wireguard/contrib/kernel-tree/jury-rig.sh /usr/src/linux
CONFIG_WIREGUARD
controls whether or not WireGuard is built (as a module, as built-in, or not at all)CONFIG_WIREGUARD_DEBUG
turns on verbose debug messages
menuconfig
, if CONFIG_NET
and CONFIG_INET
are also selected:[*] Networking support -->
Networking options -->
[*] TCP/IP networking
[*] IP: WireGuard secure network tunnel
[ ] Debugging checks and verbose messages
Related Posts
- How to Install Best H@cking OS i.e BackTrack on Android Phone..!!!!
- Recover a forgotten root password on Redhat 7 Linux Selinux system
- How to anonymize yourself using Kali Linux (using VPN)
- Quick Start of Wiregaurd vpn
- Instagram-Py – Python Script To Brute Force Attack
- How to use metasploit-framework in GUI mode using Kage tool? Kage is a GUI tool designed for Metasploit RPC Server.
Subscribe Our Newsletter
0 Comments to "Installation of Wireguard on Kali "
Post a Comment