Bash is a scripting language that runs within the terminal on most Linux distros. Shell scripts are a series of bash commands, combined to achieve complex tasks that let us automate sysadmin tasks.
Continue ReadingEthical hacker
Day 078 #FromZeroToHacker – The hacker methodology
Nessus vulnerability scanner is what it does say on the tin: A vulnerability scanner. Using techniques similar to Nmap, but presenting the information in a beautiful GUI.
Continue ReadingDay 077 #FromZeroToHacker – Nessus for beginners
Nessus vulnerability scanner is what it does say on the tin: A vulnerability scanner. Using techniques similar to Nmap, but presenting the information in a beautiful GUI.
Continue ReadingDay 076 #FromZeroToHacker – Hydra for beginners
Hydra is a brute force online password cracking program and a quick system login password hacking tool. Hydra can run a list and brute-force authentication services, especially if they have weak passwords.
Continue ReadingDay 075 #FromZeroToHacker – Nmap for beginners
Proper enumeration should be done before any exploitation attempts are made, as the more knowledge we have, the more vectors attack we may use.
Continue ReadingDay 072 #FromZeroToHacker – History of Malware
“Malware” consists of two words combined: “Malicious” and “Software”. Malware is designed to damage computers and/or networks.
Continue ReadingDay 071 #FromZeroToHacker – Encryption – Crypto 101
Cryptography is used to protect confidentiality, ensure integrity and authenticity. Even if we don’t notice, we use encryption daily.
Continue ReadingDay 070 #FromZeroToHacker – John the Ripper
John the ripper is one of the most used hash cracking tools out there. Fast, great range of hash types and loads of tutorials and information.
Continue ReadingDay 069 #FromZeroToHacker – Hashing – Crypto 101
Hashing is the process of transforming a given key or string of characters into another value. This is especially useful when we are dealing with passwords.
Continue ReadingDay 068 #FromZeroToHacker – Common cyber attacks
Using the internet is something common nowadays, so it is imperative that we understand and can protect ourselves against common attacks.
Continue Reading