This topic explores Linux file permissions as part of the ‘Linux Fundamental – A Journey with Linux‘ series. Discover ownership, user groups, and permissions, essential for managing file security and protecting valuable information on Linux file systems.Continue reading “Mastering Linux File Permissions: A Comprehensive Guide for Beginners and Experts – Part 1”
Are you ready to take your Linux skills to the next level? Welcome back to the “Journey with Linux” series, where we dive deep into the core concepts of this open-source operating system. In this write-up, we’ll explore advanced Linux commands that are essential for any IT professional looking to upskill and take their Linux expertise to the next level.
In part 2 of our “Basics on Linux: Top Linux Commands – Part 2” series of Linux Fundamental – A Journey with Linux continues of Top Linux Commands – Part 1, we’ll cover a range of advanced commands that will help you troubleshoot problems, optimize system performance, and streamline your workflows. From process management with ps and top to network troubleshooting with netstat and tcpdump, we’ll cover everything you need to know to become a Linux power user.
Our expert guides will provide detailed explanations of each command, including its syntax, use cases, and practical examples. We’ll also explore some lesser-known Linux commands that can be invaluable tools in your IT arsenal, such as awk, sed, and xargs.
So, whether you’re a seasoned Linux pro or just starting on your journey with Linux, this write-up is a must-read. Join us as we explore the top advanced Linux commands and take your Linux skills to the next level!Continue reading “Basics on Linux: Top Linux Commands – Part 2”
Linux is a widely used open-source operating system that powers the majority of servers, cloud platforms, and supercomputers around the world. Understanding the fundamentals of Linux is essential for anyone looking to pursue a career in IT or software development. In this “Linux Fundamental – A Journey with Linux” series, we will be exploring one of the core concepts of Linux, the Linux Standard Stream, in-depth, there are three communication channels or standard streams called stdin, stdout, and stderr.
These streams are used by a program to interact with the environment and receive input (stdin) from the user, display output (stdout) to the user, and report errors (stderr) if something goes wrong.Continue reading “Linux Standard Streams – What are stdin, stdout, and stderr on Linux?”
Here will start a new topic on Linux Fundamental – A Journey with Linux Series, as it is part 1 will go through the Basics of Linux and top Linux commands which can be helpful for newcomers in this journey.
Linux is an Operating System, which is a clone of Unix. Linux is actually developed by Linus Torvalds.
Linux is free and open-source, Which means you can make changes and keep your own distribution name.
Another Walkthrough of the Windows Exploitation Series on Windows 7, This walkthrough will give a thorough idea about the security measure needed in the network and keep your system up-to-date with the latest updates.
So as a demonstration, we have used our own lab to have a proper setup with the prerequisites.Continue reading “How to hack Windows 7 using Metasploit – Part 2”
Here we’ll have Windows Exploitation Series on Windows XP, This walkthrough will give a thorough idea about the security measure needed in the network and keep your system up-to-date with the latest updates.
So as a demonstration, we have used our own lab to have a proper setup with the prerequisites.Continue reading “How to hack Windows XP using Metasploit – Part 1”
In this activity, We’ll demonstrate steganography by using steghide to hide secret messages in an image file, So no third person can find it out except if they know the passphrase.Continue reading “Steganography by using Steghide”
In this activity, We’ll demonstrate cracking WPA/WPA2 wireless network security which uses pre-shared keys.
This is the approach used to crack the WPA/WPA2 Pre-shared key which will not have the statistical method compared then the WEP, where the statical methods can be used to speed up the cracking process, only plain brute force technique can be used against WPA/WPA2.
This Walkthrough is on Kioptrix: Level 1 (#1) Vulnhub Machine made by Author Kioptrix. This VM image Challenge has the objective of acquiring root access in any possible way and the goal is to learn the essential tools and techniques in vulnerability assessment and exploitations. For more details or to download the machine go here.Continue reading “Kioptrix: Level 1 Walkthrough | Vulnhub”
Another Walkthrough of the Basic Pentesting series on Basic Pentesting: 2 Vulnhub Machine made by Josiah Pierce. It contains multiple remote vulnerabilities and multiple privilege escalation vectors. For more details or for downloading the machine go here. If you’ve solved the Basic Pentesting: 1 then this Machine is good for the next step and challenging one.Continue reading “Basic Pentesting – 2 Walkthrough | Vulnhub”