1, about Kali LinuxKali Linux is a Debian-based Linux distribution that is designed for digital forensics and penetration testing. Maintained and financed by Offensive Security Ltd. [1] The first Mati Aharoni and Devon Kearns by offensive security were completed by rewriting backtrack, a Linux distribution that they had previously written for forensic purposes.Ka
Now the time to tidy up the blog is less, mostly in the use for Notes collection and collation, a centralized point of the Linux related essays and a directory, is chronological. Each article is self-used after finishing, application scenarios have as far as possible explained, do not understand can q me, work time please try to avoid.======== Directory =========centos6.5 installation mongodb2.6Linux DB2 Database Installation tutorial[Installing
Many people ask me which operating system is most suitable for hackers. I will tell you that almost every professional hacker uses Linux or Unix. Although some intrusion can be achieved through Windows and Mac OS, almost all hacker tools are customized for Linux.
However, there are still exceptions. Software such as Cain and Abel, Havij, Zenmap, and Metasploit ar
Linux services)It is important for Linux users. Disabling unnecessary services can make Linux run more efficiently, but not all Linux services can be disabled. After installing centos Linux today, we found that many services were started when
suspicious activities and rootkits
◆ Call the server drive from external Mount
The following is a description.
Penetration Test
Penetration Testing helps you identify vulnerabilities on your servers and evaluate the overall security of your devices. This evaluation is the basis of any form of security audit. It provides practical conclusions on how to improve server security and provides important information about the scanning focus for the upcoming security audit.
To perform penetration testi
popular and advanced vulnerability scanning tool, you can still try other options, such as Nmap, although it is generally only a port scanner, it cannot be completely called a vulnerability scanner; Metasploit is powerful but complicated to use, expensive to use; or BackTrAck Linux is a collection of released Linux penetration testing tools. no matter which tool
Linux-(2) Basic file operations in Linux, linux-linux
In linux, everything is files, directories are files, and hardware is files. Therefore, basic file operations are especially important.
1. List the contents of the directory:
Ls
Parameters:
-A: displays all files (includ
Logout Exit SystemGedit Text Editor ToolsUname–r View kernel version information, uname–a more detailsCat/proc/cpuinfo viewing CPUsCat/proc/meminfo Viewing memoryHostname Viewing host namesIfconfig eth0 view eth0 IP AddressAlias ls= ' ls–ll ' setting aliasesTo view the path of the current terminal: TTYView current Shell:echo $SHELLAll Shell:cat/etc/shells under the current systemView CentOS System hostname Format: Echo $PS 1Distinguish internal or external commands: Type CDWhich find the locatio
suspicious activities and rootkits◆ Call the server drive from external MountThe following is a description.Penetration TestPenetration Testing helps you identify vulnerabilities on your servers and evaluate the overall security of your devices. this evaluation is the basis of any form of security audit. it provides practical conclusions on how to improve server security and provides important information about the scanning focus for the upcoming security audit.To perform penetration testing, w
.
As we all know,linux system everything is a file, so each process has its file descriptor, The Nginx process writes its own file descriptor to the Nginx.pid, and we need to tell Nginx to reopen a new log file (the configuration details of the log file can be seen here, simply by letting the log record what. So we need this directive:kill -USR1 `cat ${pid_path}`This instruction means: first cat to Nginx PID, is an integer, and then send the signal
Becoming a Senior Programmer proficient in Linux programming has always been the goal of many friends. According to statistics from chinacache, the monthly salary of Linux programmers in Beijing is 1.8 times that of Windows programmers, 2.6 times that of Java programmers, and 2.9 times that of Windows programmers. At the same time, the data shows that with the increase of work experience, the income gap bet
vulnerabilities. Common security testing methods such as BackTrack integration:
Figure 1: BackTrack Security Testing Method
BackTrack contains niche security tools that are difficult to download, compile, and install. Whether you are a Linux technical expert or novice, it is difficult to download the complete version of Linux and security testing tools. Shows the main BackTrack interfaces.
Figure 2: Back
ObjectiveMicrosoft Windows has the largest market share in business or personal applications, and you will often encounter many Windows workstations and servers during penetration testing. On the other hand, most penetration testers use a Linux-based distribution penetration test system, such as Kali Linux or Pentoo and Backbox. So you may need to have the ability to quickly compile Windows exploit on a
Tags: ble picture bug mes sea variable set an uppercaseWhat is a buffer overflow?Trained, or learned the Assembly should know that when the buffer boundary limit is not strict, because the variable passed into the malformed data or program run error, causing the buffer to "burst", thus covering the adjacent memory area of the dataSuccessful modification of memory data can result in process hijacking, executing malicious code, gaining control of the server, etc.Crossfire
Multiplayer Onli
This series of articles summarizes Linux network stacks, including:(1) Linux Network protocol Stack Summary(2) Network multipart offload technology Gso/tso/ufo/lro/gro in non-virtualized Linux environment(3) QEMU/KVM Network multipart offload technology in virtualized Linux environment Gso/tso/ufo/lro/gro1.
1, what is Linux?
To be exact, the Linux kernel (the core program of the system), whose kernel copyright belongs to Linus Torvalds, is issued under the GPL (GNU general public License) Copyright Agreement, and anyone can copy (copy) and modify ( Change), package distribution (distribute), sales, but can not add any restrictions at the time of distribution, and all the original code must be public, so anyone
Using NMAP to scan and identify servicesNmap is probably the most widely used port scanner in the world. He can be used to identify active hosts, scan TCP and UDP open ports, detect firewalls, get service versions running on remote hosts, or even use scripts to discover and exploit vulnerabilities.In this cheats, we use Nmap to identify all the services running on the target application. For instructional purposes, we will invoke Nmap several times to implement it, but this can be done with a s
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.