Пропускане към основното съдържание


Показват се публикации от септември, 2016


Advanced Penetration Testing Payloads

Penetration Testing with Kali Linux

Cracking the Perimeter (CTP)

Advanced Web Attacks and Exploitation

Penetration Testing Labs

RedHat Objectives

RECOMMENDED: FOR ANY KIND OF "COLLEAGUES" ###RedHat Objectives### ---------------------------------------------------------- . Boot, reboot, and shutdown the system normally . Diagnose and correct problems at boot . Boot systems into different runlevels for troubleshooting and system maintenance . Use single-user mode to gain access to a system for which the root password is not known . Diagnose and correct misconfigured networking settings . Diagnose and correct hostname resolution problems . Diagnose and address permissions problems and SELinux policy violations . Diagnose and correct non-hardware disk storage problems . Adding new partitions, logical volumes, filesystems, and swap areas to a system non- destructively . Manually open, mount, unmount, and close LUKS-encrypted filesystems . Extend existing unencrypted ext4-formatted logical volumes . Login or switch user to the root account . Use ssh and VNC to access remo

Kali Linux in the Azure Marketplace

Anatomy of Security-(SELinux)

Introduction: Public networks like the Internet are dangerous places. Anyone who has a computer attached to the Internet (even transiently) understands these dangers. Attackers can exploit insecurities to gain access to a system, to obtain unauthorized access to information, or to repurpose a computer in order to send spam or participate in attacks on other high-profile systems (using SYN floods, as part of a Distributed Denial of Service attacks). Distributed Denial of Service (DDoS) attacks are orchestrated from many systems across the Internet (so-called zombie computers) to consume resources on the target system and make it unusable for legitimate users (exploiting TCP's three-way handshake). For more information on a protocol that removes this ability by using a four-way handshake with cookies (Stream Control Transmission Protocol [SCTP]), see the Resources section. The origin of SELinux SELinux is a product of government and industry, with design and development provid