Kali Gnome Desktop – View Trash and Home icons and delete using the “Delete” key

Categories Kali, Linux

There are two things that bother me a little when using Kali with Gnome Desktop. There is no Trash icon on the Desktop and the need of pressing ctrl+del to send a file or directory to the Trash. If you feel the same way read the following lines to solve it.

– Showing Trash and Home icons on desktop –

From a terminal type the following:


The “Configurator Editor” pops up. From the left panel select the following schema:

org >> gnome >> nautilus >> desktop

In the right panel you will see some interesting properties like “computer-icon-visible“, “home-icon-visible” and “trash-icon-visible“. You have to check them in order to show those icons on the Desktop. If they are already checked and you don’t see the icon, uncheck them and check them again.


– Deleting using the “Delete” key –

This was a little more painful but I finally found a solution. There is a way by activating the “can-change-accels” property using the dconf-editor utility shown previously, but the problem is that we lose our changes when nautilus is restarted.

So here is the method that worked for me using the console:

Create the folder /root/.gnome2/accels:

mkdir /root/.gnome2/accels

Create the file /root/.gnome2/accels/nautilus and write the following line:

(gtk_accel_path “/DirViewActions/Trash” “Delete”)

Save the file. Now restart nautilus:

nautilus -q

That’s all.

Enjoy :)

Recovering router password using Burp Suite dictionary attack

Categories Backtrack, Blackbuntu, Kali, Linux, Windows

Few weeks ago, during cleaning up, I found an old access point/router. I wanted to attach it to my network and do some tests, but I did not remember the password for configuring it through its web access page. I knew it had to be some default user/password but I did not succeed in my tries. I thought it was the right time to prepare a small dictionary attack. There are many powerful tools for this task but I used “Burp Suite” because I love it and I try to use it whenever I can. Furthermore is a perfect tool for understanding what happen behind the scenes during these kind of attacks.

I made the following video trying to explain this process. I hope you find it helpful.

If you want you can download the ‘combinator’ script used in the video ->  combinator.rb (184 downloads) .