Explore posts tagged with "tutorials". Discover insights and shared knowledge on this topic. Don't miss out on the action! Subscribe to our newsletter to get the latest updates.
In this Kali Linux tutorial for beginners, we delve into the intricacies of achieving complete anonymity on Kali using the powerful WHOAMI tool. As cyber security professionals, we understand the critical importance of operational security (OpSec), when conducting penetration testing or ethical hacking. Maintaining anonymity is not just a best …
Introduction Welcome to our complete guide on installing, configuring, and securing a LAMP (Linux, Apache, MySQL, PHP) stack on Debian 12 (Bookworm). This series is designed to take you through the entire process of setting up a robust, secure, and efficient web server environment using the latest Debian release. The …
Installing and configuring the core components of a LAMP stack on your Debian 12 system Continuing our complete series on setting up a secure LAMP stack, this second part focuses on the installation and configuration process. Building upon the Debian 12 (Bookworm) EC2 instance we set up in Part 1, …
Managing Linux web servers efficiently involves not only handling HTTP requests but also ensuring optimal performance, network configuration, and effective logging. This guide introduces three essential tools that enhance server management: syslog-ng for advanced logging, net-tools for network management, and zram-tools for efficient use of RAM. Each tool provides specific …
Hello Cyber Defenders! This article provides step-by-step instructions on how to mitigate ICMP and HTTP flood attacks using iptables, sysctl, Fail2Ban, and other security measures on a Debian-based system. These steps help protect against ping and HTTP flood attacks with spoofed IP addresses. 1. Configuring iptables to Mitigate ICMP Flood …
Hey, what's up guys, Dan here. In this video, I'll show you how to control any PC. This demonstration is purely for educational purposes in a lab, and I'll walk you through each step to ensure you understand how the tools work. For this tutorial, you'll need a Windows PC …
This tutorial will guide you through the process of setting up remote backups for your website using our awesome Website Rsync Backup Script. We'll cover creating an SSH key, configuring the backup server, and running the backup script remotely. Prerequisites A Linux-based backup server with root access SSH access to …
If you’re still using passwords for managing your servers, it’s time to switch to a more secure and efficient method—SSH keys. This guide will walk you through setting up key-based authentication between two Linux servers. Why SSH Key-Based Authentication? Passwords are vulnerable to being stolen, guessed, or brute-forced. In contrast, …
Using Cloudflare Tunnel Without an Account 1. Install Cloudflared If cloudflared is not already installed on your system, follow these steps to download and set it up: For Debian-based systems (like Debian 12, Ubuntu, etc.): wget https://github.com/cloudflare/cloudflared/releases/latest/download/cloudflared-linux-amd64 sudo mv cloudflared-linux-amd64 /usr/local/bin/cloudflared sudo chmod +x /usr/local/bin/cloudflared Verify the installation: cloudflared --version …
In this video tutorial, I’ll walk you through Hack The Box’s Ignition box. This machine is part of the Starting Point series, designed for beginners in penetration testing. These notes will reinforce what we've covered, focusing on some essential pentesting techniques. Service Discovery: We used nmap to scan for open …
In this guide, I'll walk you through how to create a simple Python tool, I call metaX, that extracts metadata from images, including EXIF data like camera information. date taken and GPS coordinates. Why Python for Metadata Extraction? Python is an extremely versatile language, and its ease of use makes …
This tutorial will guide you through the process of expanding an EBS volume, resizing the partition, and extending the filesystem on an AWS instance running Debian-based Linux systems. Prerequisites: You have an AWS EC2 instance running. The instance has an EBS volume attached, which you want to expand. You are …
Managing files and folders is a common task, especially in environments where backups, logs, or daily data create a growing list of directories. In this guide, we'll cover how to efficiently delete folders except for the most recent ones. This script is particularly useful in maintaining a clean directory and …
Updating Dockerized applications can seem tricky, especially when you want to ensure your data and configurations stay intact. This step-by-step guide walks you through the process, offering best practices and troubleshooting tips to seamlessly upgrade your containers without compromising your valuable data. Overview of the Process Prerequisites Steps to Update …
This tutorial walks you through creating a Django web application that allows users to check their public IP address. It features a home page with a button and a dedicated page to display the user’s IP address. The project uses Bootstrap 5 for styling and FontAwesome for icons. Files and …
You’ve heard about hacking. You’ve heard about AI. Now it’s time to combine the two and create something epic! 💻🤖 In this no-BS live stream, we’re diving deep into how to build your own AI-powered hacking assistant that’ll blow your mind (ethically, of course 😉). We’ll be: ⚡ Installing an …
Overview This guide documents the complete process of setting up NVIDIA GPU passthrough to a Debian VM on Proxmox, including detailed troubleshooting steps and real error resolution. This is based on actual implementation experience with an RTX 3050 GPU. Initial Setup Verification (ProxMox) 1. Host System Requirements Check First, verify …
1. BACKUP: Protect Your Models and Configuration Ollama stores its models and metadata in ~/.ollama/models. To ensure you don’t lose models during a downgrade or reinstallation: Step 1.1: Check Existing Models Run the following command to list all models currently available in Ollama: ollama list Example output: NAME ID SIZE …
Chisel is a fast TCP/UDP tunnel over HTTP, secured via SSH. It’s a simple tool often used for creating secure tunnels to forward ports or access internal networks from external systems. Chisel supports reverse tunneling, making it particularly useful for penetration testing, remote administration, and secure communications. Key Features Port …
Overview In this tutorial, I’ll demonstrate how to escalate privileges on a vulnerable Linux system by exploiting the ability to execute arbitrary commands during log analysis. Specifically, we’ll inject a malicious command into the application's log file processing flow to grant administrative privileges to a user. At the end of …
Systemd is an init system and service manager that’s widely used on modern Linux distributions, including Debian. It’s designed to handle the startup, running, and shutdown of your services and daemons in a more efficient and parallelized manner than older init systems. With systemd, you have a unified way to …
🔥 Crypto scams are everywhere these days. While Coffeezilla, Oompaville, and Mutahar are busy exposing the drama like the Hawk Tuah girl rug pull, we’re here to break down the tech behind Crypto Hacking. In this video, we’re diving into clipboard hijacking—a low-tech yet devastating attack that silently swaps your …
Welcome to the Quick Host Fuzzer tutorial! This guide will walk you through using the Quick Host Fuzzer to uncover subdomains effectively. This tool is designed to be simple, lightweight, and efficient, making it ideal for ethical hacking and penetration testing. You can find the tool on GitHub: Quick Host …
Introduction Welcome to the Two-Pass TL;DR Summarizer tutorial. This script condenses the content of a single webpage into a single-paragraph summary—stripping out bullet points, disclaimers, and enumerations. It harnesses the power of Ollama to run various local models (e.g., LLaMA, Qwen, Whiterabbit) and uses a two-pass approach to ensure the …
Introduction Imagine you have a robust server infrastructure, and you want your talented web developers to collaborate seamlessly without compromising security. The best way to achieve this balance is through Secure Server Access Management. This guide provides a detailed, step-by-step approach to managing developer access securely, ensuring that your server …
With giants like AWS, Google Cloud, and Azure dominating the market, newcomers often find it challenging to offer competitive alternatives. However, Oracle Cloud is shifting the paradigm with its Always Free tier, delivering an impressive array of resources that surpass many of its competitors. In this comprehensive analysis, we'll delve …
⭐️ 15% OFF PARALLELS! 👉 This will allow you to run KALI Linux alongside your macOS, giving you the best of both worlds. Whether you're a penetration tester, security researcher, or just a Linux enthusiast, this video will show you how to get started with KALI on your Mac. So, …
Creating a bootable Linux USB drive is essential for installing or repairing a Unix-based system. This guide walks through the process of identifying a USB drive, formatting it, and flashing a Linux-based ISO onto it using the terminal. No specialized software needed! Prerequisites A Debian-based system (e.g., Debian, Ubuntu, or …
1. Install Zsh Run the following command: sudo apt update && sudo apt install zsh -y 2. Set Zsh as Your Default Shell To make Zsh your default shell, use: chsh -s $(which zsh) Then log out and log back in, or reboot for the change to take effect. To …
This is my Kali Linux professional approach to penetration testing and ethical hacking! 😎 In this video, I walk you through my multi-environment setup using AWS, Proxmox, and Parallels Desktop—each tailored for specific use cases. Whether I'm connecting via SSH or using remote desktop, I ensure a robust setup for …
Upgrade your Kali Linux terminal setup with this tutorial on customizing your shell for ethical hacking and cybersecurity. In this video, you’ll learn to install Git Bash on Windows personalize terminal colors, fonts, and themes, connect via SSH, configure oh-my-zsh for a professional, efficient work environment.
This guide will walk you through setting up a complete virtualization environment on Debian 12, including QEMU/KVM for virtual machines, Cockpit for web-based management, and SPICE for improved virtual desktop performance. While this tutorial focuses on Debian 12, these instructions should work on any Debian-based distribution with minimal adjustments. Prerequisites …
This guide will walk you through installing a Windows virtual machine with QEMU/KVM and setting up the necessary drivers for enhanced functionality like copy/paste, shared folders, and better performance. Prerequisites Before starting, make sure you have: - A Windows ISO file (Windows 10 or 11) - You can download Windows …
This guide will walk you through installing an Ubuntu virtual machine using QEMU/KVM. Prerequisites Ubuntu ISO file (already downloaded and moved to /home/<USER>/ISO/Linux/ubuntu-24.04.2-desktop-amd64.iso) QEMU/KVM environment set up (from the main tutorial) Step 1: Create the Ubuntu VM sudo virt-install \ --name ubuntu-vm \ --memory 4096 \ --vcpus 2 \ --cpu …
Web applications often house their most sensitive data in databases, making database exploration a critical skill for penetration testing and CTF challenges. This comprehensive guide provides methodical techniques for accessing and exploiting database content in web applications when direct SQL injection might not be possible but code execution is available. …
Django's conventional project and app structure is a cornerstone of its "batteries-included" philosophy, fostering rapid development, maintainability, and seamless collaboration. While the initial startproject and startapp commands generate a standardized foundational layout, real-world applications quickly evolve beyond these basics, incorporating a diverse array of files and directories to manage complexity …