Penetration testing (also called pen testing) is the practice of testing a computer system, network or Web application to find vulnerabilities that an attacker could exploit. Kali Linux Cheat Sheet for Penetration testers is a high level overview for typical penetration testing environment ranging from nmap, sqlmap, ipv4, enumeration, fingerprinting …
Read More »Top 30 SSH shenanigans
Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. The best known example application is for remote login to computer systems by users. SSH provides a secure channel over an unsecured network in a client-server architecture, connecting an SSH client application with …
Read More »Take picture of unauthorized user trying to access your Laptop
Did you ever tried to guess your friends password? Did you ever tried to login to your partners password protected computer? Sounds silly and childish but many are guilty of it. Most cases it’s no big deal but I am sure all of us would like to know who tried …
Read More »Run Kali Linux in Microsoft Azure on SSD for free
Big news for Kali Linux users, now you can run Kali Linux in Microsoft Azure cloud and that’s on super fast SSD! It seems Microsoft Azure Marketplace is adding more and more Linux distro including FreeBSD images in their repo. Just to make things better, you can technically run it …
Read More »Configure sudo access for single user and group with NOPASSWORD
The sudo command offers a mechanism for providing trusted users with administrative access to a system without sharing the password of the root user. When users given access via this mechanism precede an administrative command with sudo they are prompted to enter their own password. Once authenticated, and assuming the …
Read More »