Posts

Ultimate Ethical Hacking Course By Udemy

 Lecture 10 Basic Commands  pwd, cd, ls, touch, less, history, cp, mv, echo, cat, whoami, mkdir, rmdir, rm ,locate, man, which, whatis, whereis, alias rm -rf :- r stands for recursive (means it will delete nested folder) Note:-  sudo updatedb:- it is a command use to update filesystem database. which:- it is a command use to find anything(programming)is intsalled or not on the system.eg:- which python  whatis:- it is a command use to know about any command.eg:- whatis ls  history -c :- it is use to clear all history of commands   whereis:- where command is the name of the command you want to search for    Lecture 11 0-stdin,  1-stdout, 2-stderr,   pipe, tee, cut, head, tail, sort, grep, uniq , wc, nl, file  .................................................................................................................... To find files from entire computer:-  find / -type f -name filename.txt 2>/dev/null find- stands for search /- it means search entire computer -type f name - i

How-to - Cracking ZIP and RAR protected files with John the Ripper

Image
 After seeing how to compile John the Ripper to use all your computer's processors  now we can use it for some tasks that may be useful to digital forensic investigators: getting around passwords. Today we will focus on cracking passwords for ZIP and RAR archive files. Luckily, the JtR community has done most of the hard work for us. For this to work you need to have built the community version of John the Ripper since it has extra utilities for ZIP and RAR files. For this exercise I have created password protected RAR and ZIP files, that each contain two files. test.rar: RAR archive data, v1d, os: Unix test.zip: Zip archive data, at least v1.0 to extract The password for the rar file is 'test1234' and the password for the zip file is 'test4321'. In the 'run' folder of John the Ripper community version (I am using John-1.7.9-jumbo-7), there are two programs called 'zip2john' and 'rar2john'. Run them against their respective file ty

This might be useful for many

Image
This might be useful for many Top 10 Sites for your career 1. Linkedin 2. Indeed 3. Naukri 4. Monster 5. JobBait 6. Careercloud 7. Dice 8. CareerBuilder 9. Jibberjobber 10. Glassdoor 10 Tech Skills in demand 1. Machine Learning 2. Mobile Development 3. SEO/SEM Marketing 4. Data Visualization 5. Data Engineering 6. UI/UX Design 7. Cyber-security 8. Cloud Computing/AWS 9. Blockchain 10. IOT 11 Sites for Free Online Education 1. Coursera 2. edX 3. Khan Academy 4. Udemy 5. iTunesU Free Courses 6. MIT OpenCourseWare 7. Stanford Online 8. Codecademy 9. ict iitr 10 ict iitk 11 NPTEL 10 Sites to learn Excel for free 1. Microsoft Excel Help Center 2. Excel Exposure 3. Chandoo 4. Excel Central 5. Contextures 6. Excel Hero b. 7. Mr. Excel 8. Improve Your Excel 9. Excel Easy 10. Excel Jet 10 Sites to review your resume for free 1. Zety Resume Builder 2. Resumonk 3. Resume dot com 4. VisualCV 5. Cvmaker 6. ResumUP 7. Resume Genius 8. Resumebuilder 9. Resume Baking 10. Enhancy 10 Sites for Interview

OWASP API Security Top 10 THM

Image
 INTRODUCTION OWASP - Open Web Application Security Project (OWASP) is a non-profit and collaborative online community that aims to improve application security via a set of security principles, articles, documentation etc. Back in 2019, OWASP released a list of the top 10 API vulnerabilities, which will be discussed in detail, along with its potential impact and a few effective mitigation measures.  We have split this room into two parts. In Part 1 ,   you will study the top 5 principles, and in Part 2 , you will learn the remaining principles. Learning Objectives Best practices for API authorisation & authentication. Identification of authorisation level issues. Handling excessive data exposure. Lack of resources and rate-limiting issues. Learning Pre-requisites An understanding of the following topics is recommended before starting the room: How websites work . HTTP protocols & methods . Principles of security . OWASP top 10 web vulnerabilities . Connecting to the Ma