Kali Linux is derived from Debian Linux flavor and its mainly used for penetration tasting. It has more than 300 pre-installed penetration-testing programs. It is a supported platform of the Metasploit Project’s Metasploit Framework, a tool for developing and executing security exploits. Let begin with hack windows with Kali Linux.Kindly note that , I am writing this post for education purpose only.
With AWS you can build free server on aws that to within a minute.amazon AWS offers free tier with a server “micro-instance” at no cost for one year.
Normally Linux servers are very much secured and illegal or unauthorised access is almost not possible with security policies in linux. However if linux can be installed on the laptop which makes it unsecured and worst situation occurs when you forget the laptop in public places such as trains, airports or bus where any proficient […]
Generally speaking Logs are very much important part of any troubleshooting activity, However these logs grows in size with time. In this case we need to perform log cleanup manually in order to reclaim the space and its tedious task to administer these logs. To overcome this we can configure logrotate utility available in Linux which automatically does […]
With the help of LVM snapshot backup we can freeze current state of an LVM volume. Making LVM snapshot backup make us to keep current state of volume and we can revert this state back if any needs arises during activity. A volume consists of two parts: file system metadata and the actual blocks containing data in a […]
Post about the hacking Linux OS using the user administration. We will discuss many linux hacks by which we can play around with user security. Blocking any normal user from logging into the system. You can perform any one of the below linux hack so that particular user cannot logging in to the system. 1. Replacing […]
In my earlier post about LVM you have seen how we can create LVM volume and mount it on linux server. Once you create mount point it’s started acquiring space depending upon usage from the users. In this case we need to extend linux mount point so that larger space can be given to mount point. LVM gives […]
For better performance of the system we must tune Linux kernel parameter. Once you know what to optimize it comes to doing it by writing a parameter to the /proc file system which will tune linux kernel parameter.This /proc filesystem is created by the kernel when your server comes up, and it normally contains the settings for […]