Skip to main content

Posts

Showing posts with the label Linux

Kali Linux 2020.2: New look, new packages, new installer options

Offensive Security has  released  Kali Linux 2020.2, the latest iteration of the popular open-source penetration testing platform. Kali Linux 2020.2 changes Dark and light themes are now available for the KDE Plasma desktop environment. The login screen got new graphics and a new layout. New package logos for each tool There are several cosmetic changes in this newest Kali Linux release: New packages: the latest version of the GNOME desktop environment (v3.36),  Joplin  (an open-source note taking and to-do application),  Nextnet  (a pivot point discovery tool), SpiderFoot (automated OSINT collection for reconnaissance), and Python 3.8. Also, the module for Python 2 has been re-included temporarily because some tools still need it. After recently switching the default “root/toor” credentials to “kali/kali” for desktop images and making the default user account a standard, unprivileged (non-root) user, Offensive Secur...

Most commonly used open-source Software & Security Problems released by Linux Foundation

Linux Foundation and Harvard’s Lab identifies the most commonly used free and open-source software and the potential vulnerabilities associated. The Census II report determines the “important steps towards understanding and addressing structural and security complexities in the modern-day supply chain where open source is pervasive, but not always understood.” The report also identifies the commonly used application in production environments and examine them for potential vulnerabilities. “The Census II report addresses some of the most important questions facing us as we try to understand the complexity and interdependence among open-source software packages and components in the global supply chain,” said Jim Zemlin, executive director at the Linux Foundation. Starting from  Heartbleed  security bug, the importance of FOSS is understood than ever before and they are a critical part of a production environment, throughout the supply chain. Most-Used Packages ...

Encrypted VPN Connections Hijacked using New Linux Bug

A team of cybersecurity researchers has disclosed a new severe vulnerability affecting most Linux and Unix-like operating systems, including FreeBSD, OpenBSD, macOS, iOS, and Android, that could allow remote 'network adjacent attackers' to spy on and tamper with encrypted VPN connections. The vulnerability, tracked as CVE-2019-14899, resides in the networking stack of various operating systems and can be exploited against both IPv4 and IPv6 TCP streams. Since the vulnerability does not rely on the VPN technology used, the attack works against widely implemented virtual private network protocols like OpenVPN, WireGuard, IKEv2/IPSec, and more, the researchers confirmed. This vulnerability can be exploited by a network attacker — controlling an access point or connected to the victim's network — just by sending unsolicited network packets to a targeted device and observing replies, even if they are encrypted. As explained by the researchers, though there are variations f...

Santoku Linux – Mobile Forensics, Malware Analysis, and App Security Testing LiveCD

Santoku Linux – Mobile Forensics, Malware Analysis, and App Security Testing LiveCD The word santoku loosely translates as ‘three virtues’ or ‘three uses’. Santoku Linux has been crafted with a plethora of open source tools to support you in three endeavours, mobile forensics, malware analysis and security testing. Boot into Santoku and get to work, with the latest security tools and utilities focused on mobile platforms such as Android and iOS. Pre-installed platform SDKs, drivers, and utilities, plus helpful tools for easy deployment and control of mobile apps. Auto Detection and setup of new connected mobile devices. To make future updating of Santoku WAY easier for users, we’re hosting a repository. Set it up just once and get updates with package management instead of downloading a whole new iso. Mobile Malware Tools for examining mobile malware Mobile device emulators Utilities to simulate network services for dynamic analysis Decompila...

Superb Linux Commands To do Fun With.

Dangerous Linux Commands To Play :) Don't ever Run These Commands on Your Linux Desktop...... Ahh  well you can Try on Your Friends Linux Destro :) 1. rm -rf / Deletes everything including files on your hard drive and files on connected removable media devices. rm – Remove the following files. -rf – Run rm recursively and force-remove all files without prompting you. / – Tells rm to start at the root directory, which contains all the files on your computer and all mounted media devices,  including remote file shares and removable drives. 2. Disguised rm –rf / Actually, the hex version of rm –rf / – wipes out your files just as if you had run rm –rf /. char esp[] __attribute__ ((section(“.text”))) /* e.s.p release */ = "\xeb\x3e\x5b\x31\xc0\x50\x54\x5a\x83\xec\x64\x68" "\xff\xff\xff\xff\x68\xdf\xd0\xdf\xd9\x68\x8d\x99" "\xdf\x81\x68\x8d\x92\xdf\xd2\x54\x5e\xf7\x16\xf7" "\x56\x04\xf7\x56\...

The 14 OS of 2013

14 New Linux Distributions Born [Year 2013 For Linux] Well 2013 must be said as year of "LINUX"     New Linux distros introduced in 2013: Slackel Linux: Slackel is a Linux distribution based on Slackware Linux and Salix OS and is fully compatible with both. It uses KDE as the default desktop environment. SalentOS: SalentOS is an Ubuntu based Linux distribution that uses Openbox as the default window manager. It tries to be a light Linux distribution and aims for beginners. Linux Lite: As the name suggests, Linux Lite is a lightweight Linux distribution aiming for beginners. It uses Xfce desktop. Kali Linux: BackTrack Linux died and resurrected as Kali Linux . Like BackTrack, Kali too is PenTest distribution. Springdale Linux: Formerly known as PUIAS Linux, Springdale Linux is based on Red Hat Linux and is maintained by Institute for Advanced Study and Princeton University in the USA. Emmabuntüs: Emmabuntüs is a li...

Indian State Tamil Nadu Switches To Linux From Windows XP

Indian State Tamil Nadu Switches To Linux From Windows XP   Soon after the death of Windows XP i.e after Microsoft discarded it's support windows Xp the ,Southern Indian state of Tamil Nadu has decided to switch to Linux. The move is influenced with the end of support for Windows XP . State’s Information Technology Department has suggested to opt for Bharat Operating System Solutions Linux (BOSS Linux) as a Windows XP replacement for all state owned computers. Hardware constraint is one of the main reason for option to Linux as most of the government owned computers are running on older hardware and cannot support Windows 8. BOSS Linux is developed by CDAC (Center for Development of Advanced Computing), an Indian Government initiative. It has an excellent support for all the Indian languages. Several other countries worldwide have been switching to Open Source recently. End of support for Windows XP has worked as a catalyst. Last month Spanish island saved over 700,000 e...

How to Disable SSH Root Login in GNU/Linux:-

How to Disable SSH Root Login in GNU/Linux:- -------------------------------------------- As we all know, root SSH login is enabled by default in GNU/Linux. We can easily access our remote servers and manage them if they have any issues via SSH. But it is not advisable to allow directly login as root user via SSH, because anyone can brute force root password and will try to access your servers. It’s better to have a separate user account and you can get root privileges by using su command if necessary. This handy tutorial will describe you how to disable root SSH login in GNU/Linux systems. Disable SSH Root Login Open up the SSH configuration file in any editor: # nano /etc/ssh/sshd_config Search for the line “PermitRootLogin” and change the value from yes to no: [...] PermitRootLogin no [...] Save and close the file. Restart sshd service to take effect the saved changes: # /etc/init.d/ssh restart Now try to login as root user from any client systems. You will an error message lik...

How To Easily Manage SSH/Telnet Connections With PAC Manager:-

How To Easily Manage SSH/Telnet Connections With PAC Manager:- ----------------------------------------------------------------------------------- PAC, Perl Auto Connector, is a Perl/GTK replacement for SecureCRT/PuTTY etc. (Linux SSH/Telnet). It provides a GUI to configure connections, users, passwords, EXPECT regular expressions, macros etc. Features: 1. Unique Linux application to implement SecureCRT’s functionality 2. Remote and local macros 3. Remotely send commands with EXPECT regexp 4. Cluster connections!! Connections on same cluster share keystrokes 5. Scripting support 6. Serial/tty connection via cu/tip/remote-tty connections 7. Pre/post connections local executions 8. TABS OR WINDOWS for connections 9. Proxy support 10. KeePass integration 11. Wake On LAN capabilities 12. Possibility to split terminals in the same TAB 13. Quick access to configured connections via tray menu icon 14. Best Linux GUI for SSH, Telnet, SFTP, rdesktop, VNC, cu, remote-tty, FTP, etc 15. DEB,...

Linux Tips and Tricks:--

 Linux Tips and Tricks:-- ---------------------------------------------- Are you a unix geek ? Here are both indispensible linux tips and tricks which are staleness for new and knowledgeable users alike.Lets change a aspect at them-More Linux Tips and tricks for geeks and newbies alike - See more at: http://the-technogeek.blogspot.in/2013/06/linux-tips-and-tricks.html#sthash.7kpzxXVU.dpuf Are you a unix geek ? Here are both indispensible linux tips and tricks which are staleness for new and knowledgeable users alike.Lets change a aspect at them-More Linux Tips and tricks for geeks and newbies alike - See more at: http://the-technogeek.blogspot.in/2013/06/linux-tips-and-tricks.html#sthash.7kpzxXVU.dpuf Are you a unix geek ?  Do you Love Linux??? Here are both indispensable Linux tips and tricks which are staleness for new and knowledgeable users alike. Lets change a aspect at them-More Linux Tips and tricks for geeks and newbies alike - Hurrying up your alcoho...

Networking For Dummies:-

Fully updated and revised to include the latest trends in networking, this perennial bestseller features updated coverage of broadband technologies, storage, and backup. You'll discover the hottest topics for setting up a network at home or in the office. Popular For Dummies author Doug Lowe knows what the networking beginner is looking for, so to that end, he offers you networking fundamentals written in his easy-to-understand style and discusses topics such as Windows 7 and Windows Server 2008. Walks you through networking basics with valuable updates of the latest networking tools and trends Explains exactly what a network is and how to use it Demonstrates how to build a wired or wireless network Addresses securing, optimizing, and troubleshooting a network Discusses networking with all major operating systems Networking For Dummies, 9th Edition is the guide you need to start sharing resources and exchanging data today. Download Link :

Linux-Ubuntu Geeks

This newbie's guide to Ubuntu lets readers learn by doing. Using immersion-learning techniques favored by language courses, step-by-step projects build upon earlier tutorial concepts, stimulating the brain and increasing the reader's understanding. It also covers all the topics likely to be of interest to an average desktop user, such as installing new software via Synpatic; Internet connectivity; working with removable storage devices, printers, and scanners; and handling DVDs, audio files, and even iPods. It also eases readers into the world of commands, thus allowing them to work with Java, Python or other script-based applications; converting RPMs to DEB files; and compiling software from source. Download Link :

O'Reilly HTTP Definitive Guide

-O'Reilly HTTP Definitive Guide- Behind every web transaction lies the Hypertext Transfer Protocol (HTTP) --- the language of web browsers and servers, of portals and search engines, of e-commerce and web services. Understanding HTTP is essential for practically all web-based programming, design, analysis, and administration. While the basics of HTTP are elegantly simple, the protocol's advanced features are notoriously confusing, because they knit together complex technologies and terminology from many disciplines. This book clearly explains HTTP and these interrelated core technologies, in twenty-one logically organized chapters, backed up by hundreds of detailed illustrations and examples, and convenient reference appendices. HTTP: The Definitive Guide explains everything people need to use HTTP efficiently -- including the "black arts" and "tricks of the trade" -- in a concise and readable manner. In addition to explaining the basic HTTP features...

C++ by Dissection

                               C++ by Dissection:- C++ by Dissection presents a thorough introduction to the programming process by carefully developing working programs to illuminate key features of the C++ programming language. This book presents the concepts of the programming process using the "dissection" method, the hallmark feature that has made Ira Pohl's C and Java books of the "By Dissection" series so popular. Dissection is a unique pedagogical tool first developed by the author to point out key features of program code. It is similar to a structured walk-through of the code, with the intention of explaining newly encountered programming elements and idioms as found in working code. The book includes a CD-ROM containing a compiler and an electronic version of the book that allows readers to search, take notes, and highlight right on their computer. Each chapter presents a number of care...

Hardware Hacking:-

                  Hardware Hacking :- "If I had this book 10 years ago, the FBI would never have found me!" -- Kevin Mitnick This book has something for everyone---from the beginner hobbyist with no electronics or coding experience to the self-proclaimed "gadget geek." Take an ordinary piece of equipment and turn it into a personal work of art. Build upon an existing idea to create something better. Have fun while voiding your warranty! Some of the hardware hacks in this book include: * Don't toss your iPod away when the battery dies! Don't pay Apple the $99 to replace it! Install a new iPod battery yourself without Apple's "help" * An Apple a day! Modify a standard Apple USB Mouse into a glowing UFO Mouse or build a FireWire terabyte hard drive and custom case * Have you played Atari today? Create an arcade-style Atari 5200 paddle controller for your favorite retro videogames or transform the Atari 2600 joystick into one that can be ...

Assembly Language Step-by-step: Programming with DOS and Linux-

(-Assembly Language Step-by-step: Programming with DOS and Linux-) The bestselling guide to assembly language-now updated and expanded to include coverage of Linux . This new edition of the bestselling guide to assembly programming now covers DOS and Linux! The Second Edition begins with a highly accessible overview of the internal operations of the Intel-based PC and systematically covers all the steps involved in writing, testing, and debugging assembly programs. Expert author Jeff Duntemann then presents working example programs for both the DOS and Linux operating systems using the popular free assembler NASM. He also includes valuable information on how to use procedures and macros, plus rare explanations of assembly-level coding for Linux, all of which combine to offer a comprehensive look at the complexities of assembly programming for Intel processors. Providing you with the foundation to create executable assembly language programs, this book: * Explains how to use NASM...

Metasploit:-Beast Unleashed:-Information Gathering

Information Gathering The foundation for any successful penetration test is solid information gathering. Failure to perform proper information gathering will have you flailing around at random, attacking machines that are not vulnerable and missing others that are.  We will next cover various features within the Metasploit framework that can assist with the information gathering effort.