as follows: 1) VI mytask.sh Enter the following command Date>>/home/mydate3 Cp/home/mydate3/root 2) Grant mytask.sh Execute permission chmod 744 MYTASK.S H 3) Crontab-e 4) Re-enter the command: * * * * * */root/mytask.sh. (3) How to terminate a task crontab-r means to terminate a task schedule. After the command is executed, the tasks in the crontab-e are removed. CRONTAB-L indicates which task schedules are currently in the list.2, the Linux proces
Kail Linux Penetration Test Training manual Chapter 3rd information collectionInformation collection is one of the most important stages of cyber attack. To infiltrate an attack, you need to collect all kinds of information about the target. The more information gathered, the greater the probability of a successful attack. This chapter describes the tools for collecting information. This article is selected from the "Kail
HTTP://WWW.IBM.COM/DEVELOPERWORKS/CN/LINUX/L-LSM/PART1/1. Related background: Why and whatIn recent years, Linux system has been widely concerned and applied by computer industry because of its excellent performance and stability, the flexibility and expansibility of open Source feature, and the lower cost. But in terms of security, the Linux kernel only provides
Deploy War packages for Linux tomcat, deploy JavaWeb projects for Linux Tomcat, deploy War packages for Linux, and deploy tomcatjavaweb
Deploy the War package for Linux tomcat, deploy the JavaWeb project for Linux Tomcat, and deploy the War package for
Create a small Linux with network functions
First, copy the required basic network commands to a Linux instance.Copy Ping and ifconfigTo add a network function, you must be driven by the NIC. The NIC Driver is pcnet32.However, pcnet32 has a dependency module that is MII, and MII has no dependency module,So we only need to copy the two modules to ourIn Linux, chec
rsync penetration22. If you accidentally log on to history to record a command, what method will you take to handle it?23. instructions on how to use sslstrip and ettercap to break through the ssl sniffing Password24. now I am working with a computer on the Intranet. the ip address of the other party is 192.168.1.2. He is searching for information online. Please use ettercap to obtain the permission of the other party in the shortest time. What will you do, you don't need to write it in detail.
This tutorial will cover the process of installing OpenVAS 8.0 in Kali Linux. OpenVAS is an open source vulnerability assessment program that automates network security audits and vulnerability assessments. Note that vulnerability assessment (vulnerability assessment), also known as VA, is not a penetration test (penetration test), and penetration testing further verifies the existence of a discovered vulnerability. See what is penetration testing to
After this period of time to learn, I also have a certain understanding of Linux, today this blog on the previous knowledge of a summary it.The previous Linux learning blog, from the top down is learning in-depth process, my blog link is as follows:First: Analysis of the Linux operating system how the computer starts and how it operatesChapter Two: Analysis of
Never use Linux commands! | Linux China, linux ChinaYou only need a stupid move. You can even destroy a company worth billions of dollars, Just Like Apache Struts without patching. -- Steven Vaughan-Nicolas
In this article, navigate to rm-rf/11% faster fork bomb 39% faster junk data rewrite hard disk 47% faster erase hard disk! 54% Bytes/dev/null loss 63% bytes f
1.The number of files in/usr/include/Linux and/usr/src/Linux/include/Linux is notThe number of folders varies. For example, the/usr/include/Linux does not have the mosules folder, while the/usr/src/Linux/include/LinuxThis folder is available.
/Usr/src/
Document directory
I. Linux operating system source
Ii. Basic Linux knowledge
Iii. Introduction to C Programming in Linux
This article is original and must be reproduced with the following source:Http://blog.csdn.net/qinjuning
Starting from today, I made up my mind to step into the Linux Hall step by step. Wh
[Reprinted] Linux Startup Process details-Section 8 of "do not worry about Linux programming" and linux Startup Process details
This original article belongs to the "Linux greenhouse" blog, blog address for http://roclinux.cn. The author of this article is rocrocket.To prevent negative reprinting on some websites, we r
The starting point is the weak password of the Tomcat/manager/html administrator page.By the way, you can use google hack to search for tomcat pages.Enter intitle: Apache. Tomcat "Congratulations in the browser! "It indicates that the title Keyword is separated by a dot and the page content is matched by a colon.Of course, if the/manager/html page is deleted, or the Administrator does not configure the account password to be available, the management interface will not be accessible.Upload Deplo
Recon-NG framework of the kill Linux penetration test tutorial, kailrecon-ngRecon-NG framework information collection for the Kail Linux penetration test tutorial
Information collection is one of the most important stages of network attacks. To conduct penetration attacks, you need to collect various types of information about the target. The more information is collected, the higher the probability of succ
The Linux system crosses the FireWire-buffer overflowPrinciple: Crossfire 1.9. Version 0 There is a buffer overflow vulnerability when an inbound socket connection is accepted.Tools:
Debugging Tools: EDB;
# # #python在漏洞溢出方面的渗透测试和漏洞攻击中, with a great advantage
Experimental object: Crossfire "multiplayer online RPG game"
Operating platform: Kali i686 Virtual Machine "32-bit, the number of computer CPUs refers to
Compile the linux0.00 kernel (full Linux Kernel Analysis-based on the 0.12 kernel)
I have bought a fully-analyzed Linux kernel written by Zhao Ke-based on the 0.12 kernel. It seems that the principles of the first four chapters have never had the courage to practice them by myself. Recently, I have made up my mind to take a good look at this book, and I plan to write some study notes to record some gains an
Basics of Linux Learning
1, what is Linux?
To be exact, the Linux kernel (the core program of the system), whose kernel copyright belongs to Linus Torvalds, is issued under the GPL (GNU general public License) Copyright Agreement, and anyone can copy (copy) and modify ( Change), package distribution (distribute), sales, but can not add any restrictions at the tim
The Linux machine doesn't have to clean the hard drive at all, which is why you haven't seen the Linux user defragment the hard drive. Linux file system is a much better file system than Windows FAT, FAT32, NTFS, they can not only set permissions on the file, the implementation of full protection, and can be "used more neatly", "the less the more fragmented"! You
Record what you have learned O (∩_∩) o haha ~MakefileLINK.BIN:START.O MAIN.OArm-linux-ld-tlink.lds-o link.elf $^Arm-linux-objcopy-o binary link.elf Link.binarm-linux-objdump-d link.elf > Link_elf.disGCC Mkv210_image.c-o mkmini210./mkmini210 Link.bin 210.bin%.O:%. SArm-linux-gcc-o [email protected] $%.O:%.cArm-
The original English explanation of several important directories in Linux system:/etc/: Contains configuration Files of the installed tools/opt/: Contains Metasploit and its relevant modules/sys/: Contains configuration Files of external hardware and interfaces/root/: It is the root user directory/lib/: Contains libraries dependent on the operating systemTool Description:Dnsmap is a tool that can be used t
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.