Home »
Archive by category Linux
Zsh is a shell designed for interactive use, although it is also a powerful scripting language Step1: Open a Linux terminal and run the following command sudo yum install zsh wget git -ychsh -s /bin/zsh rootNote: (bash: chsh: command not found) Rn the below commandsudo yum install util-linux-user -yecho...
Continue reading
May 3, 2021 nkcode
Linux
Commando VM 2.0, a new version of Windows-based security distribution released for penetration testing community The current version of Commando VM 2.0 received major changes including, the fixes of 61 bugs and added 26 new tools with three major new features and more. In order to install software,...
Continue reading
March 5, 2020 nkcode
Linux, Security
ross Site Request Forgery Attack is also known as CSRF or XSRF in short. Do not confuse it with Cross Site Scripting attack because it is totally different from that. Like SQL injection and XSS, CSRF is also one in top 10 OWASP web vulnerabilities for many...
Continue reading
March 5, 2017 nkcode
Linux, Security
wifite is created to to attack multiple WEP and WPA encrypted networks at the same time. This tool is customizable to be automated with only a few arguments and can be trusted to run without supervision. Features sorts targets by power (in dB); cracks closest access points first...
Continue reading
March 2, 2017 nkcode
Linux, Security
Simple definition of how the SSL handshake works: The SSL uses asymmetric encryption to privately share the common password to be used later in the communication for symmetric encryption. SSL Handshake: The client initiates the connection and says he wants to connect with the server. The server sends...
Continue reading
February 3, 2017 nkcode
Linux, Network, Security
Cyborg Hawk Linux is a Ubuntu (Linux) based Penetration Testing Linux Distro developed and designed for ethical hackers and penetration testers. Cyborg Hawk Distro can be used for network security and assessment and also for digital forensics. It also has various tools suited to the testing of Mobile...
Continue reading
January 26, 2017 nkcode
Linux, Security
This useful tool for Mx records,DNS records and More Lookup http://mxtoolbox.com/ All of your MX record, DNS, blacklist and SMTP diagnostics in one integrated tool. Input a domain name or IP Address or Host Name.Links in the results will guide you to other relevant tools and information. And you’ll have a chronological history of your...
Continue reading
January 10, 2014 nkcode
Linux, Network, Windows OS, Windows Servers
What is the Ping Command?: The ping command is a Command Prompt command used to test the ability of the source computer to reach a specified destination computer. The ping command is usually used as a simple way verify that a computer can communicate over the network with another computer or network...
Continue reading
December 22, 2012 nkcode
Hardware, Linux, Network, Windows OS, Windows Servers
Difference between TCP and UDP TCP UDP Reliability: TCP is connection-oriented protocol. When a file or message send it will get delivered unless connections fails. If connection lost, the server will request the lost part. There is no corruption while transferring a message. Reliability: UDP is connectionless protocol....
Continue reading
October 5, 2012 nkcode
Hardware, Linux, Network, Windows OS, Windows Servers
Continue reading
July 12, 2012 nkcode
Linux, Network, Windows OS, Windows Servers