IT Techy Minds -- We run and explore the IT

Basic Kali linux commands

Hello Readers,

Here are list of basic commands you should know before working further on kali linux

 

1. passwrd  (change password for account)

2. ls (list directory & files)

3. cd (to change directory location)

4. touch (create new files)

5. echo (create and write on file)

6. nano (file editor)

7. grep (filter data as per conditions or keywords)

8. cat (read files content)

9. pwd (check the your current directory)

10. ifconfig (check ethernet & ip details)

11. mkdir (make new directory or many)

12. rmdir (remove directory)

13. rm (remove files)

14. cp (copy files)

15. mv (move files and folder)

16. zip or unzip (zip or unzip the files and folders)

17. head (print the few 1st lines of file)

18. tail (print the few last lines of files)

19. sort (sort list files based on alphabets)

20. cut  (cut the defined lines from files)

21. diff (compare the content of files & show differences)

22. tee  (tee command output the result of another command)

23. locate (fine the files and print its path)

24. find (find the file in current directory)

25. sudo (get admin access evaluation to session)

26 whoami (who logged in user name)

27. chmod (change the permissions of files & directories)

28. chwon ( allow to change ownership of files & folders)

29. useradd & userdel (add & delete user)

30. df (check the linux system disk usage)

31. top (show running all the service , process and usage)

32. systemctl (allow to manage the services on linux system)

33. dig (show details about domain)

34. In (command link files & directory to shortcut)

35. apt (very useful command to install & other operations with application package on system)

36. service (check the status of any service and other operations)

37. ping (check ICMP connectivity with other systems)

38. hostname (check the hostname of machine)

39. kill (kill the process of system)

40. shutdown (poweroff the system)

 

There are many more commands but these are useful command which we are going to use a lot during Cybersecurity lessions so study about it and don't forget to watch live lab video for these commands.

Video Link : Coming Soon.

Thanks

Admin

 

How to hide yourself when browsing dark web & Stay 100% anonymous online

Dear User,

if you are working with cybersecurity or as Ethical hacking stuff, its important to Hide your presense on internet and stay 100% Anonymous.

Here are 3 ways to Hide your presense on internet.

1. By using open VPN

2. Tor proxy

3. free proxy chain

Lets learn each one by one.

Open VPN :-

you can download open vpn from many free websites like https://spys.one/en/ or Openvpnbook.com ..just google and you will find many. its important to hide your public ip over internet with browsing darkweb or other cubersecurity related stuff and secure yourself. many get hacked by not following small things and face problems.

1. Download open VPN connection details from site

2. connect to open vpn 

3. check your public ip and it should be differnet than your original public ip.

4. sometime it will not work and problem could be related to your DNS Server so change the DNs server to free DNS server and try again.

undefined

Video Link: https://youtu.be/u2I47A9Ak1g

 

Tor Proxy :

1. Install tor on Kali linux

2. apt install tor

3. check service is running for Tor

service tor status

4. Edit proxychain file

5. connect via proaxy chain and check your public . it will change to differnet one and location.

Video Link:

Proxy Chain:

Stay 100% anonymous from internet via using proxy chain.

its imposible for anyone to track you down by using proxy chain

Connecting via Tor proaxy + another proxy + another proxy + another proaxy ..and so on.

1. Down load free proxy list from https://github.com/amitkumaripec/PROXY-List or https://free-proxy-list.net

2. find the working proxy and verify it from https://hide.mn/en/proxy-checker/

3. Edit the proxychain or proxychain4 file

4. Enable dynamic proxy & disable static one

5. Enable proxy DNS

6. Add the proxy in list as give example in file 

7. start proxy chain and check your public ip

Video Link : 

 

Note: The goal of the article is to teach you so how you can hide yourself when browsing dark web or doing any cybersecurity stuff. using any of tips illegally if your own responsibility and could have consequences

Thanks

Webadmin

Learn about Netdiscover Tool

Hello,

Netdiscover is Active / Passive reconnaissance tool . its used to discover devices in your wireless & wired network.

 

undefined

Example :

Scan all the available devices in network under this range.

#netdiscover -r 10.0.3.0/24 

search for only 10 devices then add switch

#netdiscover -r 10.0.3.0/24 -c 10

Have many network card in your machine and want to use specific nic for discovery 

#netdiscover -i eth0 -r 10.0.3.0/24 -c 10 (is not it simple?)

here is another example 

#netdiscover -i eth0 -r 10.0.3.0/24 -c 10 -s 5

want to read more about netdiscover.  

run the following command in kali linux

#man netdiscover

Enjoy excercise video for same :

 

Thanks

webmaster

 

 

How to use apt command & tips in linux or kali

Hello ,

Its important to keep your applications and OS updated in order to avoid any risk & get new features. apt is command which should be used to perform below operations.

1. apt list  (show all the installed packages)

2. apt search XXXXX (package name to search)

3. apt show XXXX (write package name to get more details)

undefined

4. apt update (list all the avaliable package,which were installed and no longer needed)

5. apt upgrade (update all the packages)

6. apt install xxxxx (Install the specific package)

7. apt reinstall xxxxx (reinstall the specific package)

8. apt remove xxxxx (remove the specifc package)

9. apt autoremove (auto remove all the unused package)

10. apt full-upgrade (upgrade the system by install / removeing /upgrade package )

11. apt edit-sources (edit the source for package)

12. apt satisfy (satisfy the dependancy string)

 

Dont forget to read more on other articles and upgrade your skills.

 

follow my group on linked in https://www.linkedin.com/groups/14529294/

Thanks

Webmaster

 

Hacker Methodology

Its very important to understand the hacker methodology and build security on these levels in order to protect your system or corporate network.

Many Ethical hacker names these steps with different words but overall background concept it almost same.

if you are a ethical hacker then you need to write a contract with company before performing any penetrate testing. its does not matter what level of testing you are doing but it has to be officially approved by authorised person. (wireless penetrate testing,webserver, network , System or application).

 

undefined

Phases of Ethichal Hacking

1. Reconnaissance : In this phase of analysis , Ethical hacker gather information about system in passive mode without giving any alert to System .

2. Scanning : Ethical hacker perform active scanning to system by using tool like Nmap (free tool), Nessus(its paid tool). there is high chance that you will alert system administrator.

3. Identify Volunerability: identify the application version or Os version used in system and find the volunerability mentioned in Rapid7 or exploitdb.com database for more details and how to exploit system

4. Gain Access : Get access to system by exploiting the open volunerabilty of system. open session with target device and get access to files, folders and sensitive informations.

5. Maintain access : this is very important phase , dangerous hacker mostly extend their access to multiple system in this phase and maintain it. it may be one system get fixed but their spread access into network system so loosing one access to system does not much affect them. being a ethical hacker its reposbilities to close these gaps for black hat hackers.

6. Report : In this final phase , Ethical hacker submit a report back to company so they can fix the risk areas.

once all the testing is completed , ethical hacker must clear all the logs and traces of penetrate testing from performed system.

 

follow my linked in group https://www.linkedin.com/groups/14529294/

Thanks

Webmaster

 

 

 

Home ← Older posts