Woensdag 31 Mei 2023

Top System Related Commands In Linux With Descriptive Definitions


Commands are just like an instructions given to a system to do something and display an output for that instruction. So if you don't know how to gave an order to a system to do a task then how it can do while you don't know how to deal with. So commands are really important for Linux users. If you don't have any idea about commands of Linux and definitely you also don't know about the Linux terminal. You cannot explore Linux deeply. Because terminal is the brain of the Linux and you can do everything by using Linux terminal in any Linux distribution. So, if you wanna work over the Linux distro then you should know about the commands as well.
In this blog you will get a content about commands of Linux which are collectively related to the system. That means if you wanna know any kind of information about the system like operating system, kernel release information, reboot history, system host name, ip address of the host, current date and time and many more.

Note:

If you know about the command but you don't have any idea to use it. In this way you just type the command, then space and then type -h or --help or ? to get all the usage information about that particular command like "uname" this command is used for displaying the Linux system information. You don't know how to use it. Just type the command with help parameter like: uname -h or uname --help etc.

uname 

The "uname" is a Linux terminal command responsible of displaying the information about Linux system. This command has different parameter to display a particular part of information like kernel release (uname -r) or all the information displayed by typing only one command (uname -a).

uptime

This command is used to show how long the system has been running and how much load on it at current state of the CPU. This command is very useful when you system slows down or hang etc and you can easily get the info about the load on the CPU with the help of this command.

hostname

The "hostname" is the the command in Linux having different parameters to display the information bout the current host which is running the kernel at that time. If you wanna know about the parameters of hostname command then you just type hostname --help or hostname -h to get all the info about the command and the usage of the command.

last reboot

The "last reboot" is the command in Linux operating system used to display the reboot history. You just have to type this command over the Linux terminal it will display the reboot history of that Linux system.

date

The "date" is the command used in Linux operating system to show the date of the day along with the current time of the day.

cal

The "cal" command in Linux used to display the calendar which has the current date highlighted with a square box along with a current month dates and days just like a real calendar.

w

The "w" is the command used in Linux distro for the sake of getting the information about current user. If you type this command it will display who is online at the time.

whoami

The "whoami" is the command in Linux operating system used to show the information that who you are logged in as. For example if you are logged in as a root then it'll display "root" etc.

finger user

The "finger user" is the command used in Linux distribution to display the information about user which is online currently over that Linux system.

Related links


Web3 Smart Contract And Blockchain Hacking With Python Free Course Section 1

 Below is the full playlist and the outline for Section 1 the Web3 Hacking in Python course.. This is the most in-depth python based web3 material I have seen anywhere online. 

Section 1 is the foundational section of the course using python for web3 that covers the following topics and also assumes that you have already taken my smart contract hacking course from 2020.  


Smart Contract and Blockchain Web3 Hacking in Python: 

Section 1: 

Smart Contract Interactions: 

1.  Simple Smart Contract Interactions

2.  ERC20 Token Interactions

3.  Wallet Interactions

4.  Manual ByteCode Reversing

5.  ByteCode Function BruteForce Automation

6.  Automated Reversing and Disassembly

7.  Transaction Signing

8.  In Depth Manual Smart Contract Interactions

9.  Asynchronous programming to monitor Contract Events


Homework Assignments

1. Uniswap Pair nested Contract Interactions

2. Attacking Smart Contract Pathways Manually with python

3. Analyze Bytecode and Determine what it Interactions


Network Interactions: 

1. Blocks and transaction Filtering and Monitoring

2. Pending Transaction Subscriptions And Network Monitoring

3. Monitoring Smart Contract Mempool Transactions (Uniswap Routers)


Playlist: 

https://www.youtube.com/watch?v=UBK2BoFv6Lo&list=PLCwnLq3tOElrubfUWHa1qKrJv1apO8Aag&index=1

More info

  1. Pentest Tools Framework
  2. Hackrf Tools
  3. Pentest Tools
  4. What Is Hacking Tools
  5. Pentest Tools For Android
  6. Hacking Tools Windows
  7. Hacking Tools 2019
  8. Hack Tools Pc
  9. Hacking Tools For Windows 7
  10. Kik Hack Tools
  11. Pentest Tools Bluekeep
  12. Nsa Hacker Tools
  13. Hacker Tools 2019
  14. Pentest Tools For Windows
  15. Pentest Tools Alternative
  16. Hacker Tools For Ios
  17. Hacking Tools For Beginners
  18. Hack Tool Apk
  19. Hacking Tools Windows 10
  20. Physical Pentest Tools
  21. Hacking Tools Pc
  22. Hacker Tools Hardware
  23. Pentest Tools For Android
  24. Pentest Tools Website Vulnerability
  25. Hacking Tools For Windows 7
  26. Hacker Tools Free Download
  27. Hack Tool Apk
  28. Hack Tools Online
  29. Hack Tools Pc
  30. Hack Tools For Games
  31. Pentest Tools Apk
  32. Hacks And Tools
  33. Hack And Tools
  34. Pentest Tools Framework
  35. Github Hacking Tools
  36. Hacking Tools Pc
  37. Hacker Tools Free Download
  38. World No 1 Hacker Software
  39. Underground Hacker Sites
  40. Hacker Tools Linux
  41. Best Hacking Tools 2019
  42. Hacking Tools For Windows
  43. Bluetooth Hacking Tools Kali
  44. Best Hacking Tools 2020
  45. Android Hack Tools Github
  46. Black Hat Hacker Tools
  47. Top Pentest Tools
  48. Tools 4 Hack
  49. Hack Tools Online
  50. Hack Tools For Ubuntu
  51. Hackers Toolbox
  52. Hacker Tools Free
  53. Top Pentest Tools
  54. Hacking Tools For Windows Free Download
  55. Pentest Tools Website
  56. Hacking Tools 2019
  57. Hacker Tools For Ios
  58. Free Pentest Tools For Windows
  59. Pentest Tools Kali Linux
  60. Hack Rom Tools
  61. Hacker Tools
  62. Hack Tools For Games
  63. Best Hacking Tools 2020
  64. Hack Tools Mac
  65. Hacker Tools Mac
  66. Pentest Tools
  67. Hacking Tools Software
  68. Hacking Tools Kit
  69. Hacking Tools Windows 10
  70. Pentest Tools Free
  71. Physical Pentest Tools
  72. Hacker Tools 2020
  73. Pentest Box Tools Download
  74. Hack Tools For Mac
  75. Hacking Tools Kit
  76. Wifi Hacker Tools For Windows
  77. Hacking Tools Download
  78. Pentest Tools Nmap
  79. Hacker Tools Windows
  80. Pentest Tools For Ubuntu
  81. Pentest Tools For Windows
  82. Hacking Tools For Games
  83. What Is Hacking Tools
  84. Hacking Tools Hardware
  85. Hacker Tools Mac
  86. Hacker
  87. Hacker Hardware Tools
  88. Hacking Tools
  89. How To Make Hacking Tools
  90. Hacking Tools Pc
  91. Hacking Tools Name
  92. Hacking Tools Windows
  93. Hacker Security Tools
  94. Hacker Tools Mac
  95. Hacking App
  96. Pentest Tools Subdomain
  97. Wifi Hacker Tools For Windows
  98. Hack Tools 2019
  99. What Are Hacking Tools
  100. Best Hacking Tools 2019
  101. Pentest Tools Website Vulnerability
  102. Hacking Tools Name
  103. Bluetooth Hacking Tools Kali
  104. Hacking Tools For Beginners
  105. Hack App
  106. Pentest Tools For Mac
  107. Hacker Tools Mac
  108. Hacker Tools For Pc
  109. Hacker Tool Kit
  110. Hacker Tools Software
  111. Hacking Tools 2020
  112. Tools Used For Hacking

CEH: 10 Hacking Tools For Hackers


There are a lot of hacking tools available over the internet but mostly we need some of them. In this blog you'll learn about hacking tools which are typically used in the world of hacking by penetration testers.

SmartWhois

SmartWhois is an information-gathering program that allows you to find all available information about an IP address, hostname, or domain, including country, state or province, city, name of the network provider, administrator, and technical support contact information. SmartWhois is a graphical version of the basic Whois program.

SocksChain

SocksChain is a tool that gives a hacker the ability to attack through a chain of proxy servers. The main purpose of doing this is to hide the hacker's real IP address and therefore minimize the chance of detection. When a hacker works through several proxy servers in series, it's much harder to locate the hacker. Tracking the attacker's IP address through the logs of several proxy servers is complex and tedious work. If one of the proxy servers' log files is lost or incomplete, the chain is broken, and the hacker's IP address remains anonymous.

NeoTrace, VisualRoute, and VisualLookout

NeoTrace, VisualRoute, and VisualLookout are all packet-tracking tools with a GUI or visual interface. They plot the path the packets travel on a map and can visually identify the locations of routers and other internet working devices. These tools operate similarly to traceroute and perform the same information gathering; however, they provide a visual representation of the results.

Visualware's eMailTrackerPro

Visualware's eMailTrackerPro ( www.emailtrackerpro.com/ ) and MailTracking ( http://mailtracking.com/ ) are tools that allow an ethical hacker to track email messages. When you use these tools to send an email, forward an email, reply to an email, or modify an email, the resulting actions and tracks of the original email are logged. The sender is notified of all actions performed on the tracked email by an automatically generated email.

IPEye

IPEye is a TCP port scanner that can do SYN, FIN, Null, and XMAS scans. It's a command line tool.
IPEye probes the ports on a target system and responds with closed, reject, drop, or open. Closed means there is a computer on the other end, but it doesn't listen at the port. Reject means a firewall is rejecting the connection to the port (sending a reset back). Drop means a firewall is dropping everything to the port, or there is no computer on the other end. Open means some kind of service is listening at the port. These responses help a hacker identify what type of system is responding.

IPSecScan

IPSecScan is a tool that can scan either a single IP address or a range of addresses looking for systems that are IPSec enabled that means the system has IPSec enabled while disabled means that it either has IPSec disabled, the compatibility issue or the configuration issue that not reveal to you that it has IPSec enabled. Indeterminable means that the scanner isn't sure if IPSec is enabled or disabled.

Icmpenum

Icmpenum uses not only ICMP Echo packets to probe networks, but also ICMP Timestamp and ICMP Information packets. Furthermore, it supports spoofing and sniffing for reply packets. Icmpenum is great for scanning networks when the firewall blocks ICMP Echo packets but fails to block Timestamp or Information packets.

SNMP Scanner

SNMP Scanner allows you to scan a range or list of hosts performing ping, DNS, and Simple Network Management Protocol (SNMP) queries. This tool helps you to find out the current information about the device of SNMP nodes in the given network.

hping2 tool

The hping2 tool is notable because it contains a host of other features besides OS fingerprinting such as TCP, User Datagram Protocol (UDP), ICMP, and raw-IP ping protocols, traceroute mode, and the ability to send files between the source and target system.

THC-Scan, PhoneSweep, and TeleSweep

THC-Scan, PhoneSweep, and TeleSweep are tools that identify phone numbers and can dial a target to make a connection with a computer modem. These tools generally work by using a predetermined list of common usernames and passwords in an attempt to gain access to the system. Most remote-access dial-in connections aren't secured with a password or use very rudimentary security.Related links

Dinsdag 30 Mei 2023

WHAT IS ETHICAL HACKING

What is ethical hacking?

Ethical hacking is identifying weakness in computer system and/or computer networks and coming with countermeasures that protect the weakness.

Ethical hackers must abide by the following rules-
1-Get written permission from the owner of the computer system and/or computer network before  hacking.
2-Protect the privacy of the organisation been hacked etc.

Ethical Hacking and Ethical Hacker are terms used to describe hacking performed by a company or individual to help identity potential threats on a computer or network.
 

An Ethical Hacker attempts to byepass system security and search for any weak point that could be exploited by Malicious Hackers.
Related posts