What is Vulnerability assessment? When Securing organization’s assets, knowledge is power. In today’s world as businesses grow, their dependency on...
Linux
What is penetration testing? In this article we are going to breakdown the basics of penetration testing. People who are new to information security and want...
Metasploit is an extensive pen-testing tool. It is a great framework for creating and maintaining your exploits. It can be little inconvenient if every time...
Being a system administrator, troubleshooting your DHCP server DHCPD is a common task that you come across frequently. There may be problems like desktop...
In this article we will explore a pentesting tool called fern WiFi cracker. fern WiFi cracker is an easy to use GUI based WiFi hacker tool which anyone can use...
In this piece we will be exploring how to configure apache virtual hosts on Linux(Debian or Ubuntu based system). In order to configure Apache Virtual Hosts we...
The Problem with Linux So this isn’t going to be me simply regurgitating about one of those Linux sucks articles. They are great and if you read them...
Install LAMP stack Install LAMP Server for Debian and Ubunut based system. LAMP stands for Linux, Apache, MySQL and PHP. It’s technology stack used to...
In this post we are going to cover up top 10 Linux interview questions. These are the most common Linux system administration job interview questions that...
When it comes to hacking or pen-testing. It’s not about mastering a single tool. One needs to gather information on target and do reverse engineering...