Monthly Archive: December 2018

0

Lazy Bash Scripting: Monitoring mode

Bash scripting can be a very useful and powerful way of automating a bit of the boring stuff for you. Over these small segments, we are going to be creating little scripts that can...

1

Web vulnerability scanning with Nikto

What is Nikto? Nikto Web Scanner is a Web server scanner that tests Web servers for dangerous files/CGIs, outdated server software and other problems. It performs generic and server types specific checks. It also...

0

Crunch: The Wordlist Generator

Crunch is used for generating a large word list based on different parameters that we specify. We can save the word list to a file or we could even send it directly to the...

0

Getting started with Steganography using Steghide

Steghide is a data hiding tool that allows you to hide data in various kinds of supported picture and audio files. Features include the compression of the embedded data, encryption of the embedded data...

3

Good Old Zip Bomb

A zip bomb is usually a small file to avoid suspicion. However, when the zip file is decompressed, the contents of the zip file is more than the system can handle. It’s commonly known...

0

Getting started with GPG Part 1/2

GNU Privacy Guard(GPG) is an open source implementation of the Pretty Good Privacy (PGP) standed. GPG is a command line program which can be easily integrated with different applications. GPG comes pre-installed on most...