Container technology – Part2

How to make container from scratch Prerequisite: https://pengs.win/container-technology/ If you want to learn behind the scene about containers you are in the right place. Firstly, you need to know your materials to create a container. Generally, users thought containers as lightweight virtual machines, but containers are isolated groups of processes running on a single host. That isolation can be creatable with underlying Technologies built into the Linux kernel: namespaces, cgroups, chroot, etc. “Everything is a File” in Linux. Before going into the syscalls you need to create a tiny file…

Hide Files Inside Images

Hiding in plain sight is sometimes the best tactic.   For instance, this lovely young lady   Rather unassuming, right? Well, read on and you’ll learn how to extract a hidden message from that picture!   Steganography is “the practice of concealing a file, message, image, or video within another file, message, image, or video.” (Source: Wikipedia) In Linux, the ever-so-handy Steghide allows us to do just that. I know that you and your imagination will come up with all sorts of creative ways to utilize this awesome little program.…

Cracking Passwords With Hashcat

Cracking Passwords With Hashcat

Hashcat is praised as one of the most advanced, thorough, and powerful password cracking programs available today. It’s also a personal favorite of mine, and we will be going over the basics so you can get started. By the end of this guide, you will attempt to crack as many passwords as you can from a list of many, many hashes created for this tutorial. When you’re done, post a comment below to tell us how many you got, and see how many passwords other people were able to find!…

Container technology – Part1

container technology

Outline; What is container (containers 101) How it works (Sample) This article can be seen as a start for people who are curious about how Container technology works and who want to develop it. I used Dockers container content in my article, that’s because I found it most presentable. What is container? Container technologies basically an approach to software development in which pieces of code are packaged in a standardized way. By this way, they can quickly be plugged in and run on the pre-defined operating system. Container, “A container…

Why you need to secure your Linux Servers

Do you need security for a linux server?

Whats the problem? In the current day and age anyone can build a Linux server. A Google search and a YouTube tutorial and suddenly you have a device that hosts a webpage. It is honestly amazing and it is wonderful to live in a time where anyone can learn about Linux and host a server within minutes. Do any of these tutorials tell you how to secure your server?   Very few of the tutorials I found  warned of the risk of not securing your device. Therefore I set out…

Best websites to learn hacking | Penetration testing | Ethical

best websites to learn hacking

Hi guys, in this post, I’m willing to give you my list of best websites to learn hacking. Only the freemium ones. So let’s get started, I hope you enjoy! NOTE: ALL OUR TUTORIALS ARE ONLY MEANT FOR EDUCATIONAL PURPOSES. DO NOT BREAK THE LAW. Best websites to learn hacking 1. Hack This Site! This will be always be my personal favorite, it contains awesome challenges from easy to very hard. If you want to start using your brains, try it, it’s worth it. All you need is to do…

How to use the Snort IDS – Part 1

how to use snort

When the defense of your device against attack is at stake, the name of antiviruses and IDSs must come up. And IDS, or an intrusion detection system, tries to detect malicious activity on your computer andinforms you about it. Snort is one of the most well-known IDSs today. In this tutorial,  I will show you how to use it to protect your system against intrusion. Let’s forgo the disclaimer, because this is constructive. Step 1: Snort is a Linux application. If you use Ubuntu,  the repositories for installing Snort should…

How to make a persistent Android backdoor using Metasploit

How to make a persistent android backdoor using Metasploit

Metasploit is one of the most powerful pentesting and exploitation tools out there,  and in this tutorial,  I’ll show you how to use it to create an access backdoor on any android phone and gain control over it. DISCLAIMER: All the information in this article is intended for educational purposes only. I am not responsible for any misuse.  Step 0: Fire up Metasploit If you’re using Kali Linux/BackBox/BackTrack, metasploit comes pre-installed with the system. Otherwise,  you can download it from: https://www.metasploit.com To start it,  go to your terminal and type: msfconsole…

Clear recently accessed files in Linux Nautilus / GNOME File Manager

clear recently accessed files in linux

Hi, on this little guide, you will learn how to clear recently accessed files in Linux Nautilus. Nautilus is the file manager built for GNOME. There are a lot of reasons why you will need this command. Maybe you’re accessing sensitive data or maybe you don’t want your grandma to see your nasty little videos? Anyway, just fire up your terminal and write or copy paste the following command as root or using a sudoer. sudo rm ~/.local/share/recently-used.xbel And that is all you need to do for clearing that list.…

Create bootable USB on Linux terminal

create bootable usb on linux terminal

On this tutorial we will create bootable USB on Linux terminal. Distribution I will be using is Debian 9, but this method should work on almost any distro. Stick in your USB drive and make sure it has enough space to extract your .iso file whatever it is. I’m going to use debian.iso as example. Then you will need to find the path to your .iso file. In my case it’s /home/h/Downloads/debian.iso Then find your USB device path by executing the following command in your terminal as root or sudo…