Linux PE (Privilege Escalation) Exploiting a bug, a design defect, or a configuration oversight in an operating system or software program to acquire elevated access to resources that are typicall...
Notes | Password Cracking
Password Cracking We are now in an era where password that you will find will not be in clear text and ready to use (most of the time). They will be “hashed”. You may have heard terms like “hash”,...
Notes | Brute Force
Brute Force According to Wikipedia, “Brute Force attack consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly”. It may not be effective in...
Notes | Linux Fondamentals
Linux Fondamentals First of all, why learn Linux? Well, when it comes to computing, Linux is a very useful operating system. It has many useful tools and offers high performance on different netwo...