Posts Tagged: @tutorials

Explore posts tagged with "tutorials". Discover insights and shared knowledge on this topic. Don't miss out on the action! Subscribe to our newsletter to get the latest updates.

CYBER Mar 01, 2024 | Comments: 0

This TOOL Makes You Disappear on KALI LINUX // FULL Beginner TUTORIAL

In this Kali Linux tutorial for beginners, we delve into the intricacies of achieving complete anonymity on Kali using the powerful WHOAMI tool. As cyber security professionals, we understand the critical importance of operational security (OpSec), when conducting penetration testing or ethical hacking. Maintaining anonymity is not just a best …

DEV Jun 06, 2024 | Comments: 0

3 Amazing Tools for Troubleshooting Linux Web Servers

Managing Linux web servers efficiently involves not only handling HTTP requests but also ensuring optimal performance, network configuration, and effective logging. This guide introduces three essential tools that enhance server management: syslog-ng for advanced logging, net-tools for network management, and zram-tools for efficient use of RAM. Each tool provides specific …

CYBER Jun 05, 2024 | Comments: 0

DDoS ICMP and HTTP Flood Attack Mitigation on Debian-Based Servers

Hello Cyber Defenders! This article provides step-by-step instructions on how to mitigate ICMP and HTTP flood attacks using iptables, sysctl, Fail2Ban, and other security measures on a Debian-based system. These steps help protect against ping and HTTP flood attacks with spoofed IP addresses. 1. Configuring iptables to Mitigate ICMP Flood …

CYBER May 03, 2024 | Comments: 0

Remotely Control Any PC Kali Linux Tutorial

Hey, what's up guys, Dan here. In this video, I'll show you how to control any PC. This demonstration is purely for educational purposes in a lab, and I'll walk you through each step to ensure you understand how the tools work. For this tutorial, you'll need a Windows PC …

DEV Sep 03, 2024 | Comments: 0

Set Up Remote Backups Using this Amazing Website Rsync Backup Script

This tutorial will guide you through the process of setting up remote backups for your website using our awesome Website Rsync Backup Script. We'll cover creating an SSH key, configuring the backup server, and running the backup script remotely. Prerequisites A Linux-based backup server with root access SSH access to …

CYBER Sep 21, 2024 | Comments: 0

Expose Your Computer to The Internet in Seconds - Full Tutorial

Using Cloudflare Tunnel Without an Account 1. Install Cloudflared If cloudflared is not already installed on your system, follow these steps to download and set it up: For Debian-based systems (like Debian 12, Ubuntu, etc.): wget https://github.com/cloudflare/cloudflared/releases/latest/download/cloudflared-linux-amd64 sudo mv cloudflared-linux-amd64 /usr/local/bin/cloudflared sudo chmod +x /usr/local/bin/cloudflared Verify the installation: cloudflared --version …

Download Tutorial Resources!
CYBER Sep 24, 2024 | Comments: 0

Hack The Box - Ignition Walkthrough Video Tutorial

In this video tutorial, I’ll walk you through Hack The Box’s Ignition box. This machine is part of the Starting Point series, designed for beginners in penetration testing. These notes will reinforce what we've covered, focusing on some essential pentesting techniques. Service Discovery: We used nmap to scan for open …

DEV Oct 08, 2024 | Comments: 0

How to Expand an EBS Volume and Resize a Filesystem on AWS

This tutorial will guide you through the process of expanding an EBS volume, resizing the partition, and extending the filesystem on an AWS instance running Debian-based Linux systems. Prerequisites: You have an AWS EC2 instance running. The instance has an EBS volume attached, which you want to expand. You are …

DEV Nov 13, 2024 | Comments: 0

How to Remove Old Folders and Keep the Latest in Linux terminal

Managing files and folders is a common task, especially in environments where backups, logs, or daily data create a growing list of directories. In this guide, we'll cover how to efficiently delete folders except for the most recent ones. This script is particularly useful in maintaining a clean directory and …

DEV Nov 20, 2024 | Comments: 0

How to Update Dockerized Applications Without Losing Your Data

Updating Dockerized applications can seem tricky, especially when you want to ensure your data and configurations stay intact. This step-by-step guide walks you through the process, offering best practices and troubleshooting tips to seamlessly upgrade your containers without compromising your valuable data. Overview of the Process Prerequisites Steps to Update …

DEV Nov 23, 2024 | Comments: 0

Build a Public IP Checker in Django

This tutorial walks you through creating a Django web application that allows users to check their public IP address. It features a home page with a button and a dedicated page to display the user’s IP address. The project uses Bootstrap 5 for styling and FontAwesome for icons. Files and …

AI  |  CYBER Nov 23, 2024 | Comments: 0

🔥 Build Your Own "EtHiCaL" Hacking AI – RIGHT NOW! 🚀

You’ve heard about hacking. You’ve heard about AI. Now it’s time to combine the two and create something epic! 💻🤖 In this no-BS live stream, we’re diving deep into how to build your own AI-powered hacking assistant that’ll blow your mind (ethically, of course 😉). We’ll be: ⚡ Installing an …

DEV  |  AI Nov 28, 2024 | Comments: 0

NVIDIA GPU Passthrough to Debian VM on Proxmox

Overview This guide documents the complete process of setting up NVIDIA GPU passthrough to a Debian VM on Proxmox, including detailed troubleshooting steps and real error resolution. This is based on actual implementation experience with an RTX 3050 GPU. Initial Setup Verification (ProxMox) 1. Host System Requirements Check First, verify …

CYBER Dec 04, 2024 | Comments: 0

How to Use Chisel for Reverse Tunneling

Chisel is a fast TCP/UDP tunnel over HTTP, secured via SSH. It’s a simple tool often used for creating secure tunnels to forward ports or access internal networks from external systems. Chisel supports reverse tunneling, making it particularly useful for penetration testing, remote administration, and secure communications. Key Features Port …

DEV  |  CYBER Dec 09, 2024 | Comments: 0

Privilege Escalation via Log File Injection and Mitigation Techniques

Overview In this tutorial, I’ll demonstrate how to escalate privileges on a vulnerable Linux system by exploiting the ability to execute arbitrary commands during log analysis. Specifically, we’ll inject a malicious command into the application's log file processing flow to grant administrative privileges to a user. At the end of …

DEV Dec 10, 2024 | Comments: 0

Master Your Linux Server With These Powerful Systemd Commands!

Systemd is an init system and service manager that’s widely used on modern Linux distributions, including Debian. It’s designed to handle the startup, running, and shutdown of your services and daemons in a more efficient and parallelized manner than older init systems. With systemd, you have a unified way to …

DEV  |  CYBER Dec 11, 2024 | Comments: 0

🚨 This Simple Script Can Steal $100M in Crypto 💀

🔥 Crypto scams are everywhere these days. While Coffeezilla, Oompaville, and Mutahar are busy exposing the drama like the Hawk Tuah girl rug pull, we’re here to break down the tech behind Crypto Hacking. In this video, we’re diving into clipboard hijacking—a low-tech yet devastating attack that silently swaps your …

CYBER Dec 12, 2024 | Comments: 0

🎯 Subdomain Fuzzing with Quick Host Fuzzer

Welcome to the Quick Host Fuzzer tutorial! This guide will walk you through using the Quick Host Fuzzer to uncover subdomains effectively. This tool is designed to be simple, lightweight, and efficient, making it ideal for ethical hacking and penetration testing. You can find the tool on GitHub: Quick Host …

DEV  |  AI Jan 04, 2025 | Comments: 0

I Built an AI Blog/Article TL;DR Summarizer. Here's How I Did It.

Introduction Welcome to the Two-Pass TL;DR Summarizer tutorial. This script condenses the content of a single webpage into a single-paragraph summary—stripping out bullet points, disclaimers, and enumerations. It harnesses the power of Ollama to run various local models (e.g., LLaMA, Qwen, Whiterabbit) and uses a two-pass approach to ensure the …

DEV Jan 08, 2025 | Comments: 0

Advanced Linux Server Access Management for YOUR Developers

Introduction Imagine you have a robust server infrastructure, and you want your talented web developers to collaborate seamlessly without compromising security. The best way to achieve this balance is through Secure Server Access Management. This guide provides a detailed, step-by-step approach to managing developer access securely, ensuring that your server …

DEV  |  AI Jan 23, 2025 | Comments: 0

WOW! The Oracle Cloud Free Tier is A Game-Changer in Cloud Computing

With giants like AWS, Google Cloud, and Azure dominating the market, newcomers often find it challenging to offer competitive alternatives. However, Oracle Cloud is shifting the paradigm with its Always Free tier, delivering an impressive array of resources that surpass many of its competitors. In this comprehensive analysis, we'll delve …

CYBER Feb 02, 2025 | Comments: 0

STOP Wasting Your MAC's Potential as a Hacking LAB!

⭐️ 15% OFF PARALLELS! 👉 This will allow you to run KALI Linux alongside your macOS, giving you the best of both worlds. Whether you're a penetration tester, security researcher, or just a Linux enthusiast, this video will show you how to get started with KALI on your Mac. So, …

DEV Feb 20, 2025 | Comments: 0

How to Create a Bootable Linux USB on a Debian-Based System

Creating a bootable Linux USB drive is essential for installing or repairing a Unix-based system. This guide walks through the process of identifying a USB drive, formatting it, and flashing a Linux-based ISO onto it using the terminal. No specialized software needed! Prerequisites A Debian-based system (e.g., Debian, Ubuntu, or …

CYBER Feb 22, 2025 | Comments: 0

🔥 My Ultimate KALI Linux Setup for Epic HACKING!

This is my Kali Linux professional approach to penetration testing and ethical hacking! 😎 In this video, I walk you through my multi-environment setup using AWS, Proxmox, and Parallels Desktop—each tailored for specific use cases. Whether I'm connecting via SSH or using remote desktop, I ensure a robust setup for …

CYBER Mar 01, 2025 | Comments: 0

UPGRADE Your KALI Linux Terminal Experience For Ethical Hacking

Upgrade your Kali Linux terminal setup with this tutorial on customizing your shell for ethical hacking and cybersecurity. In this video, you’ll learn to install Git Bash on Windows personalize terminal colors, fonts, and themes, connect via SSH, configure oh-my-zsh for a professional, efficient work environment.

DEV  |  CYBER Mar 01, 2025 | Comments: 0

Pen-Test Lab PART 1 - Setting Up QEMU, KVM, Cockpit, SPICE, and KALI Linux

This guide will walk you through setting up a complete virtualization environment on Debian 12, including QEMU/KVM for virtual machines, Cockpit for web-based management, and SPICE for improved virtual desktop performance. While this tutorial focuses on Debian 12, these instructions should work on any Debian-based distribution with minimal adjustments. Prerequisites …

DEV  |  CYBER Mar 01, 2025 | Comments: 0

Pen-Test Lab PART 2 - Installing a Windows VM on QEMU/KVM

This guide will walk you through installing a Windows virtual machine with QEMU/KVM and setting up the necessary drivers for enhanced functionality like copy/paste, shared folders, and better performance. Prerequisites Before starting, make sure you have: - A Windows ISO file (Windows 10 or 11) - You can download Windows …

DEV  |  CYBER Mar 01, 2025 | Comments: 0

Pen-Test Lab PART 3 - Installing an Ubuntu VM on QEMU/KVM

This guide will walk you through installing an Ubuntu virtual machine using QEMU/KVM. Prerequisites Ubuntu ISO file (already downloaded and moved to /home/<USER>/ISO/Linux/ubuntu-24.04.2-desktop-amd64.iso) QEMU/KVM environment set up (from the main tutorial) Step 1: Create the Ubuntu VM sudo virt-install \ --name ubuntu-vm \ --memory 4096 \ --vcpus 2 \ --cpu …

CYBER Mar 22, 2025 | Comments: 0

Advanced Web Application Penetration Testing: The Database Access Playbook

Web applications often house their most sensitive data in databases, making database exploration a critical skill for penetration testing and CTF challenges. This comprehensive guide provides methodical techniques for accessing and exploiting database content in web applications when direct SQL injection might not be possible but code execution is available. …

DEV Apr 01, 2025 | Comments: 0

Anatomy of a Django Project: A Comprehensive Guide to Files and Structure

Django's conventional project and app structure is a cornerstone of its "batteries-included" philosophy, fostering rapid development, maintainability, and seamless collaboration. While the initial startproject and startapp commands generate a standardized foundational layout, real-world applications quickly evolve beyond these basics, incorporating a diverse array of files and directories to manage complexity …