BUEN FIN DE CUATRIMESTRE...!! A DISFRUTAR DE ESTAS MERECIDAS VACACIONES.. NOS VEMOS EL PRÓXIMO :)

sábado, 29 de agosto de 2020

Top Users Command In Linux Operating System With Descriptive Definitions


Linux is a command line interface and has a graphical interface as well. But the only thing we should know how we interact with Linux tools and applications with the help of command line. This is the basic thing of Linux.  As you can do things manually by simple clicking over the programs just like windows to open an applications. But if you don't have any idea about commands of Linux and definitely you also don't know about the Linux terminal. You cannot explore Linux deeply. Because terminal is the brain of the Linux and you can do everything by using Linux terminal in any Linux distribution. So, if you wanna work over the Linux distro then you should know about the commands as well.
In this blog you will get a content about commands of Linux which are collectively related to the system users. That means if you wanna know any kind of information about the users of the system like username passwords and many more.

id

The "id" command is used in Linux operating system for the sake of getting knowledge about active user id with login and group. There may be different users and you wanna get a particular id of the user who is active at that time so for this you just have to type this command over the terminal.

last

The "last" command is used in Linux operating system to show the information about the last logins on the system. If you forget by which user id you have logged in at last time. So for this information you can search login detail by using this command.

who

The "who" command is used in Linux distributions to display the information about the current user which a an active profile over the Linux operating system. If you are in the system and you don't know about that active user and suddenly you have to know about that user detail so you can get the info by using this command.

groupadd

The "groupadd admin" is the command which is used in Linux operating system to add a group in the Linux system to gave the privileges to that group.

useradd

The "useradd" command is used in Linux operating system to add user or users to a specific group. If you wanna add a user name Umer so for this matter you just have to write a command i.e. useradd -c "Umer".

userdel

The "userdel" command is used in Linux operating system for the purpose to delete any user or users from the particular group present in the linux operating system. For example "userdel Umer" this command will delete the user named Umer.

adduser

The "adduser" command is a simple command used to create directly any user in the system. There is no need to make a group for this. You just have to type the command with user name like adduser Umer, it will created a user by name Umer.

usermod

The "usermod" is a command used in Linux operating system to modify the information of any particular user. You can edit or delete information of any particular user in the Linux operating system.


Read more

QakBot Banking Trojan Returned With New Sneaky Tricks To Steal Your Money

A notorious banking trojan aimed at stealing bank account credentials and other financial information has now come back with new tricks up its sleeve to target government, military, and manufacturing sectors in the US and Europe, according to new research. In an analysis released by Check Point Research today, the latest wave of Qbot activity appears to have dovetailed with the return of

via The Hacker News

Related news


Vulnerable-AD - Create A Vulnerable Active Directory That'S Allowing You To Test Most Of Active Directory Attacks In Local Lab


Create a vulnerable active directory that's allowing you to test most of active directory attacks in local lab.

Main Features
  • Randomize Attacks
  • Full Coverage of the mentioned attacks
  • you need run the script in DC with Active Directory installed
  • Some of attacks require client workstation

Supported Attacks
  • Abusing ACLs/ACEs
  • Kerberoasting
  • AS-REP Roasting
  • Abuse DnsAdmins
  • Password in AD User comment
  • Password Spraying
  • DCSync
  • Silver Ticket
  • Golden Ticket
  • Pass-the-Hash
  • Pass-the-Ticket
  • SMB Signing Disabled

Example
# if you didn't install Active Directory yet , you can try 
Install-ADDSForest -CreateDnsDelegation:$false -DatabasePath "C:\\Windows\\NTDS" -DomainMode "7" -DomainName "cs.org" -DomainNetbiosName "cs" -ForestMode "7" -InstallDns:$true -LogPath "C:\\Windows\\NTDS" -NoRebootOnCompletion:$false -SysvolPath "C:\\Windows\\SYSVOL" -Force:$true
# if you already installed Active Directory, just run the script !
IEX((new-object net.webclient).downloadstring("https://raw.githubusercontent.com/wazehell/vulnerable-AD/master/vulnad.ps1"));
Invoke-VulnAD -UsersLimit 100 -DomainName "cs.org"

TODO
  • Add More realistic scenarios
  • Click close issue button on github




via KitPloitRelated news

viernes, 28 de agosto de 2020

Steghide - A Beginners Tutorial




All of us want our sensitive information to be hidden from people and for that we perform different kinds of things like hide those files or lock them using different softwares. But even though we do that, those files  attractive people to itself as an object of security. Today I'm going to give you a slight introduction to what is called as Steganography. Its a practice of hiding an informational file within another file like you might have seen in movies an image has a secret message encoded in it. You can read more about Steganography from Wikipedia.


In this tutorial I'm going to use a tool called steghide, which is a simple to use Steganography tool and I'm running it on my Arch Linux. What I'm going to do is simply encode an image with a text file which contains some kind of information which I don't want other people to see. And at the end I'll show you how to decode that information back. So lets get started:


Requirements:

1. steghide
2. a text file
3. an image file

After you have installed steghide, fire up the terminal and type steghide




It will give you list of options that are available.


Now say I have a file with the name of myblogpassword.txt which contains the login password of my blog and I want to encode that file into an Image file with the name of arch.jpg so that I can hide my sensitive information from the preying eyes of my friends. In order to do that I'll type the following command in my terminal:


steghide embed -ef myblogpassword.txt -cf arch.jpg




here steghide is the name of the program

embed flag is used to specify to steghide that we want to embed one file into another file
-ef option is used to specify to steghide the name (and location, in case if its in some other directory) of the file that we want to embed inside of the another file, in our case its myblogpassword.txt
-cf option is used to specify the name (and location, in case if its in some other directory) of the file in which we want to embed our file, in our case its an image file named arch.jpg

After typing the above command and hitting enter it will prompt for a password. We can specify a password here in order to password protect our file so that when anyone tries to extract our embedded file, they'll have to supply a password in order to extract it. If you don't want to password protect it you can just simply hit enter.


Now myblogpassword.txt file is embedded inside of the image file arch.jpg. You'll see no changes in the image file except for its size. Now we can delete the plain password text file myblogpassword.txt.


In order to extract the embedded file from the cover file, I'll type following command in the terminal:


steghide extract -sf arch.jpg -xf myblogpass.txt




here steghide is again name of the program
extract flag specifies that we want to extract an embedded file from a stego file
-sf option specifies the name of the stego file or in other words the file in which we embedded another file, in our case here its the arch.jpg file
-xf option specifies the name of the file to which we want to write our embedded file, here it is myblogpass.txt
(remember you must specify the name of file with its location if its somewhere else than the current directory)

After typing the above command and hitting enter, it will prompt for a password. Supply the password if any or otherwise just simply hit enter. It will extract the embedded file to the file named myblogpass.txt. Voila! you got your file back but yes the image file still contains the embedded file.


That's it, very easy isn't it?


It was a pretty basic introduction you can look for other things like encrypting the file to be embedded before you embed it into another file and so on... enjoy
:)

Continue reading


  1. Github Hacking Tools
  2. Hacking Tools For Games
  3. Pentest Reporting Tools
  4. What Are Hacking Tools
  5. Pentest Tools Kali Linux
  6. What Is Hacking Tools
  7. Install Pentest Tools Ubuntu
  8. Hacking Tools Windows
  9. World No 1 Hacker Software
  10. Hack Tools Download
  11. Hacker Tools Mac
  12. Hacker Tools Linux
  13. New Hacker Tools
  14. Hacking Tools For Windows Free Download
  15. Pentest Tools For Mac
  16. Hacking Tools Pc
  17. Pentest Tools Alternative
  18. Kik Hack Tools
  19. Android Hack Tools Github
  20. Hack Tools For Ubuntu
  21. Pentest Tools Port Scanner
  22. New Hack Tools
  23. Hack Tools Online
  24. Hacking Tools And Software
  25. Pentest Automation Tools
  26. Hacker Tools Linux
  27. Hacker Tool Kit
  28. Hacker Search Tools
  29. Hack Tools For Pc
  30. Hacking Tools Download
  31. World No 1 Hacker Software
  32. Pentest Tools List
  33. Pentest Tools Review
  34. Pentest Tools For Android
  35. Pentest Tools
  36. Hacker Tools Hardware
  37. Hack Tools Pc
  38. Pentest Reporting Tools
  39. Hacker
  40. Hacking Tools Kit
  41. Hacking Tools Github
  42. Hack Rom Tools
  43. Pentest Tools Download
  44. Pentest Tools Website
  45. World No 1 Hacker Software
  46. Pentest Tools Online
  47. Free Pentest Tools For Windows
  48. Hacking Tools Pc
  49. How To Make Hacking Tools
  50. Underground Hacker Sites
  51. Pentest Tools Apk
  52. Hack Tools Online
  53. Tools Used For Hacking
  54. Hacking Tools And Software
  55. Best Pentesting Tools 2018
  56. Pentest Tools Free
  57. Hacking Tools Name
  58. Best Hacking Tools 2020
  59. Pentest Tools Find Subdomains
  60. Tools For Hacker
  61. Hacker Tools 2020
  62. Hack Tools For Pc
  63. Pentest Recon Tools
  64. Pentest Tools Review
  65. Pentest Recon Tools
  66. Hacking Tools For Kali Linux
  67. Pentest Tools For Ubuntu
  68. New Hacker Tools
  69. Pentest Tools Kali Linux
  70. Hacking Tools Free Download
  71. Hack Tools
  72. Hacker Tools Online
  73. Pentest Tools For Windows
  74. Hack Tools
  75. Hack Tools Mac
  76. Hacking App
  77. Pentest Tools Bluekeep
  78. Nsa Hack Tools
  79. Hackers Toolbox
  80. Hak5 Tools
  81. Hak5 Tools
  82. Pentest Tools Nmap
  83. Pentest Tools Website Vulnerability
  84. Pentest Tools Review
  85. Hack Tools For Ubuntu
  86. Best Pentesting Tools 2018
  87. Hack Tools Mac
  88. Pentest Tools Bluekeep
  89. World No 1 Hacker Software
  90. Pentest Tools For Windows
  91. Best Hacking Tools 2019
  92. Hack Tools Mac
  93. Android Hack Tools Github
  94. Hacker Tools Free Download
  95. Hacking Tools Pc
  96. Hack Tools Mac
  97. What Is Hacking Tools
  98. Hacker Tools Github
  99. Pentest Tools Tcp Port Scanner
  100. Best Hacking Tools 2020
  101. Pentest Reporting Tools
  102. Pentest Tools Kali Linux
  103. Hack App
  104. Hacking Tools For Windows Free Download
  105. Hacking Tools Name
  106. Pentest Tools Subdomain
  107. Pentest Automation Tools
  108. Termux Hacking Tools 2019
  109. Hacking Tools Kit
  110. Hacker Tools Free Download
  111. Tools For Hacker
  112. Hacking Tools For Kali Linux
  113. Hacker Tools Hardware
  114. Hacking Tools 2019
  115. Hack Apps
  116. Hacker Tools Apk
  117. Hacker Security Tools
  118. Pentest Tools Website
  119. Hack Tools Github
  120. Pentest Tools Website Vulnerability
  121. Hacking Tools 2019
  122. Pentest Tools Url Fuzzer
  123. Hacking Tools 2019
  124. Hacking Tools For Windows
  125. Hacker Tools For Pc
  126. Hacking Tools Software
  127. Hack Apps
  128. Hacker Tool Kit
  129. Hack Tools Pc
  130. Hack Tool Apk
  131. Pentest Tools For Mac
  132. Hackrf Tools
  133. Hack Tools For Mac
  134. Hacking Tools For Mac
  135. Hack Tools Mac
  136. Pentest Tools Free
  137. Hackrf Tools
  138. Hackers Toolbox
  139. What Is Hacking Tools
  140. Hack Tools For Ubuntu
  141. Hacker Tools 2019
  142. Growth Hacker Tools
  143. What Is Hacking Tools
  144. Pentest Tools For Android
  145. Free Pentest Tools For Windows
  146. Hacking Apps
  147. Wifi Hacker Tools For Windows
  148. Black Hat Hacker Tools
  149. Hack Tools Mac
  150. Hacking Tools For Beginners
  151. What Is Hacking Tools
  152. Hacker Tools Windows
  153. Pentest Tools Open Source
  154. Hack Tools 2019

Escríbe tus dudas, comentarios o sugerencias a:

Historia de la Educación

recetas de cocina