Skip to main content

Posts

Recursion

“So, what’s your number?” he asked me with innocent eyes, contemplating a number low enough to render me virtuous but high enough to guarantee some skill. In other words, n - 1.  I sighed and looked at ceiling. The scene was all too familiar. This time however, I wasn’t with a graduate student. Or an engineer. I was with a DJ.  “One time, I wrote a C program to remove the voice from a sound file,” I said shyly as he leaned in and grazed my earlobe.  Suddenly, he pulled back with disappointment.  “I’m really sorry, but I have to go to my show,” he said as he stuffed his headphones into his backpack. “I’ll see you later.”  The door slammed in the distance. I sighed and hung my head in shame. For I was embarking on the same destructive behavior, watching helplessly as my actions iterated miserably in a never-ending loop. Like recursion, a new romance temps with the promise of a memory address, such as the $user = “girlfriend” string assignment embodied by the
Recent posts

Analyzing Different Log Files And Knowing Their Importance - Linux

  Viewing Logs Analyzing Different Log Files And Knowing Their Importance While on the  terminal shell  within the  Ubuntu system ,  type  the  command  below to view the  content  of the  auth.log file  and  press   Enter . This file logs system authorization information. root@Ubuntu:/home/student#  cat /var/log/auth.log | less Press   q  to exit. While on the  terminal shell  within the  Ubuntu system ,  type  the  command  below to view the content of the  auth.log file  and  press   Enter  to find  flag6 . root@Ubuntu:/home/student# grep -i "flag6" /var/log/auth* NOTE: The output of this command may vary slightly depending on which log the answer is in. CHALLENGE #6 Type  the  command  below to view the  content  of the  last.log file  and  press   Enter . This file logs recent login information. root@Ubuntu:/home/student#  lastlog Type  the  command  below to view the  content  of the  btmp log file  and  press   Enter . This file logs failed login attempts. root@Ubuntu:/

Social Engineering Toolkit

  Exploiting Java to Attack a Remote System Using Social Engineering Toolkit (SET) Click  on the  Kali icon  on the topology diagram. If the VM window is black, simply  click  somewhere in the  window .  For the  Username ,  type   root . When prompted for the  password ,  type   toor .  Press   Enter . Note: The password of  toor  will not be displayed when you type it for security purposes. Open  a new  terminal window  by  clicking  on the  terminal icon  located on the  left menu pane . Initiate  the  ifconfig command  to verify if the  loopback interface  is up and running. root@Kali-Attacker:~#  ifconfig If it is not active,  initiate  the  command  below to bring the  loopback interface  up. root@Kali-Attacker:~#  ifconfig lo up Initiate  the  ifconfig command  to verify if the  loopback interface  is up and running. root@Kali-Attacker:~#  ifconfig Type  the below  command  and  press   Enter  to initialize the database for Metasploit. root@Kali-Attacker:~#  service postgresql s

RDP

  What is the name of the tool that we can use to initiate a desktop projection to our host using the terminal?  Answer: xfreerdp   Remember, RDP works for Windows machines. What is the name of the admin account on Windows? It is "Administrator'   You can attempt to RDP to windows machines using this: xfreerdp /v:10.129.1.13 /u:Administrator Press enter when prompted for password (might be poorly configured, and let you use an empty password).   How to use freerdp To install freerdp on Debian, Kali Linux, Linux Mint, Ubuntu and derivatives, run the command: sudo apt install freerdp2-x11 freerdp2-shadow-x11 If the freerdp2-x11 and freerdp2-shadow-x11 packages are not found, look for a package named freerdp . To install freerdp on Arch Linux and derivatives, run the command: 1 sudo pacman -S freerdp How to connect with freerdp command To connect to the remote desktop using xfreerdp , run a command of the form: 1 xfreerdp /f /u :USERNAME /p :PASSWORD /

Redis

  Redis is an in-memory database. To run redis on local server: $ redis-cli To connect to remore redis instance:   $ redis-cli -h host -p port -a password   Example: $redis-cli -h 127.0.0.1 -p 6379 -a "mypass"    Once inside, you can use commands like: INFO INFO KEYSPACE KEYS * GET <KEY>