nullbyte.png

Linux Basics

Article cover image
Feb 18, 2015

Welcome back, my amateur hackers!When you are using and administering Linux, it is important to be conversant in the use of the log files. As you know, log files are the repository for much informatio ...

Article cover image
Nov 14, 2014

Welcome back, my aspiring hackers!Those of you who use Windows in a LAN environment understand that Windows machines can share directories, files, printers, etc. using "shares." This protocol dates ba ...

Article cover image
Aug 14, 2014

Welcome back, my aspiring hackers!Many of you have installed Kali Linux as a virtual machine (VM) using VMware or VirtualBox, while others have installed Kali (or BackTrack) in a dual-boot system. The ...

Article cover image
Jun 26, 2014

Welcome back, my aspiring hackers!In recent tutorials, I have made reference to the name and location of the Linux devices in the file system, such as sda (first SATA or SCSI drive). Specifically, I h ...

Article cover image
Jun 12, 2014

Welcome back, my aspiring hackers!As you have probably discovered by now, the file system in Linux is structured differently from Windows. There are no physical drives—just a logical file system tree ...

Article cover image
May 18, 2014

Welcome back, my aspiring hackers!In previous tutorials, I have shown you how to scan the globe for vulnerable servers and write simple scripts in BASH and Perl to perform other reconnaissance tasks. ...

Article cover image
Mar 8, 2014

Welcome back, my aspiring hackers!Domain Name System (DNS) is one of those things we seldom think about unless it doesn't work. Then, it can be very frustrating when we attempt to navigate to a websit ...

Article cover image
Feb 24, 2014

Welcome back, my budding hackers!In previous tutorials, we've looked at some of the basic commands and concepts for using Linux. Along the way, I realized that I've failed to provide you with some bas ...

Article cover image
Feb 11, 2014

Welcome back, my budding hackers!In my continuing effort to build your basic Linux skills for hacking, I want to show you how to build a secure "tunnel" to MySQL.Of course, the techniques I use here c ...

Article cover image
Jan 17, 2014

Welcome back, my greenhorn hackers!This tutorial will be the fourtenth in the Linux for hackers series and will focus on the MySQL database. Although this is not strictly a Linux tutorial, MySQL is th ...