What are Linux rootkits?
Rootkits help an attacker secure access to a compromised system, with an emphasis on maximizing the invisibility of the malware. To do this, they hide network connections, processes, folders, files, fake their contents. Usually, a rootkit carries hacker utilities for...
Every day we are deleting files for different reasons, so we are moving them to trash, but it's only away from our folder, not from our computer/laptop.
So what we can do in Linux to remove it permanently?
Maybe you heard about "Zero Filling", it's a method to overwrite something with zeros. It...
A typical Unix system consists of thousands of files. During the development of Unix certain rules have emerged in which directories which files are normally stored. These rules were adapted to the particularities of Linux and summarized in a separate document: the Filesystem hierarchy standard...
On Linux, the universal encryption tool is Werner Koch's Gnu Privacy Guard (GnuPG) package. Its main application command (gpg) brings back the memory of Pretty Good Privacy (PGP), an encryption tool released in 1991 by Phil Zimmermann. You can learn more about GPG in the article "GPG...
############################## # Day 1: Linux Fundamentals # ##############################
#####################################################
# 2021 Intro to Linux & Comptia Linux+ Exam Prep #
# By Joe McCray #...
If you use Linux you might miss ccleaner and it's utilities to clean windows. Well we have different tools on Linux which are free to use.
1️⃣ Install Stacer
For Debian and ubuntu users you can install stacer by command-line interface:
sudo apt install software-properties-common
sudo...
Today I want to show you how to clean Linux with bleachbit.
✍️ Note : For bleachbit you can choose between bleachbit and bleachbit root.
1️⃣ Install Bleachbit
sudo apt install bleachbit
2️⃣ Start Bleachtbit
To start bleachbit, you can either choose the terminal or search start method...
There are many ways to bypass blocking sites and ensure online privacy. Terms like TOR, VPN, and proxy are well-known. You don't need any special knowledge to connect and configure them, but there are also more elegant solutions. Today I will talk about the method of bypassing locks in Linux...
Building your own collection of hacker tools is great, but now it's customary to use one of the specialized distributions as a basis. This is usually Kali, but we will look at not only it, but also other distras for pentest, sometimes no less effective, and in some areas even more useful.
There...
December 4, 2020
Detailed description of the book https://www.amazon.com/AWS-Penetration-Testing-strategies-Metasploit/dp/1839216921
Reading software:
⬆️ Librera Reader is a highly customizable and feature-rich book reading app for Android devices,
which supports many formats: PDF, EPUB, MOBI...
February 28, 2019
? Detailed description of the book https://www.amazon.com/Hands-Penetration-Testing-Kali-NetHunter/dp/1788995171
? VT https://www.virustotal.com/gui/file/087aa6aa0baeb9eb06a70cff4f3ac28eb1ea85257ed56a249d1a708b06590c96/detection
Количество страниц: 348
Язык: Русский
Формат: PDF
Автор: Милосердов А.
Kali Linux является передовым Linux дистрибутивом для проведения тестирования на проникновение и аудита безопасности. Информация в данной книге предназначена для ознакомления или тестирования на проникновение собственных...
Всё что описано ниже - это мой личный опыт использования линуха в рабочих целях.
Уверен, что мой подход к безопасности неоптимален. Но большинство пренебрегает и такими мерами.
Если эта статья поспособствует росту моего контакт-листа в джаббе и сократит контакт в асе - значит я писал не зря...
https://ded.im
Order: https://ded.im/cart.php?gid=5
Contact: https://t.me/DEDim_Support
УСЛОВИЯ ИСПОЛЬЗОВАНИЯ СЕРВИСА DED.IM И ДОПОЛНИТЕЛЬНАЯ ИНФОРМАЦИЯ
1. Категорически запрещено грубое общение / оскорбления в адрес службы поддержки.
2. Манибэка/рефанда нет ни при каких условиях, но в...
В наше время Linux дистрибутивы по безопасности становятся более полезными и нужными, чем это было прежде, т.к. защита конфиденциальности онлайн на данный момент является одной из важнейших проблем, с которыми сегодня столкнулось наше поколение.
Проблема конфиденциальности сейчас является...
В этой статье будет приведено пошаговое руководство взлома фитнес-трекера с поддержкой Bluetooth и низким энергопотреблением средствами ОС Linux.
Эта история началась с моего поста в Facebook, посвященного проблеме отсутствия API для фитнес-трекеров, и почему сей факт мешает исследователям...
Linux servers with root access (ssh) - 20$ and more, only UK in stock now
cost will change after New Year!
For payment I accept: LR or "Perfect money"
For communication: first contact - PM
1. ENCRYPT
A. Your computer, in case it is seized. Use Truecrypt with hidden OS, so you can give up a password if you live in a place where not cooperating is a serious crime (aka: a police state).
B. Your communications, in case the vendor you work with has his E-mail being watched, which...