Welcome back, my amateur hackers!When you are using and administering Linux, it is important to be conversant in the use of the log files. As you know, log files are the repository for much informatio ...
Welcome back, my aspiring hackers!Those of you who use Windows in a LAN environment understand that Windows machines can share directories, files, printers, etc. using "shares." This protocol dates ba ...
Welcome back, my aspiring hackers!Many of you have installed Kali Linux as a virtual machine (VM) using VMware or VirtualBox, while others have installed Kali (or BackTrack) in a dual-boot system. The ...
Welcome back, my aspiring hackers!In recent tutorials, I have made reference to the name and location of the Linux devices in the file system, such as sda (first SATA or SCSI drive). Specifically, I h ...
Welcome back, my aspiring hackers!As you have probably discovered by now, the file system in Linux is structured differently from Windows. There are no physical drives—just a logical file system tree ...
Welcome back, my aspiring hackers!In previous tutorials, I have shown you how to scan the globe for vulnerable servers and write simple scripts in BASH and Perl to perform other reconnaissance tasks. ...
Welcome back, my aspiring hackers!Domain Name System (DNS) is one of those things we seldom think about unless it doesn't work. Then, it can be very frustrating when we attempt to navigate to a websit ...
Welcome back, my budding hackers!In previous tutorials, we've looked at some of the basic commands and concepts for using Linux. Along the way, I realized that I've failed to provide you with some bas ...
Welcome back, my budding hackers!In my continuing effort to build your basic Linux skills for hacking, I want to show you how to build a secure "tunnel" to MySQL.Of course, the techniques I use here c ...