Introduction Knowing which run you are using on your system is an important piece of information. Your shell determines your login environment to a large extent as it controls which environment variables get exported, your shell prompt etc. On a Linux system it’s almost certain that you will using the bash shell unless the system […]
4 ways to hide your identity using linux
Being able to change your IP address and other network information is a useful skill because it will help you access other networks while appearing as a trusted device on those networks. For example, in a denial-of-service (DoS) attack, you can spoof your IP so that that the attack appears to come from another source, […]
Setting up a Basic File server Using simpleHTTPserver
Introduction In this article we will demonstrate a quick and easy method to use your local system as a basic File Server using simpleHTTPserver. The SimpleHTTPServer is a built in module that comes available with the default Python installation on a YUM based system. It is a simple HTTP server that provides standard GET and […]
Ansible playbook to replace multiple lines in a file
Introduction Commands like sed and awk allow us to harness the power of regular expressions to search for text-based patterns in files and manipulate the matched text as per our requirement. The thing about regular expressions is that they are confusing. To the new Linux user, regular expressions may as well be another language. Although […]
Using Seashells to display terminal output to a web browser
Introduction Having the ability to display your terminal output to a web browser would be a neat feature to have. In this article, we will be discussing a tool named Seashells that does exactly that. Seashells lets you pipe output from command-line programs to the web in real-time, even without installing any new software on […]
How To Install Kali Linux in Virtualbox
In our previous article, we have discussed about how to download the kali linux image file and how to install virtualbox. Now let’s get you started with the virtual machine. Step 01 : Open Virtualbox VirtualBox should open once it has installed. Now you should be greeted by the VirtualBox Manager Step 02 : Create […]
Kali Linux : The OS That Hackers Use
If you are familiar with cyber security stuff, you must have heard about kali linux. Kali linux is a operating system developed by offensive security and it was specifically targeted for penetration testers. This linux distribution is built on Debian and it comes pre installed with many more security tools. In this guide, we will […]
How to monitor user activity in Linux with Acct
Acct is an open source application that we can use to monitor user activity in Linux. This tool comes with the functionality of running in the background and tracking user activity. It also reports what are the system resources are being consumed by the users. In this guide, we will see how to install and […]
Install and use pip for python package management in Linux
Introduction Python is one of the most popular scripting languages in use today and due to its wide user base and community support, it has thousands to of modules available which help to add to its existing functionality. The version of python that comes pre-installed with Linux distributions has some modules already available. Modules for […]
SSH Command explained in 5 simple steps
Secure Shell (SSH) is a network protocol that is used to create a secure encrypted connection between 2 computer systems. Once the connection has been established, the user can do the following tasks on the remote system Execute commands on the server X11 tunneling Port forwarding, and more There are mainly 2 parties involved when […]