background preloader

Linux and Open source Understanding Nmap Commands: In depth Tutorial with examples

Linux and Open source Understanding Nmap Commands: In depth Tutorial with examples
Article by James Hawkins As we all know, Nmap (Network Mapper) is a stealth port scanner widely used by network security experts (including forensics & Pen-testing Experts). In this article we’ll see the different types of Nmap Scans, its techniques, understanding the purpose and goals of each scan , its advantages or disadvantages over other scanning tools, which could be better at evading firewalls & IDS (To a certain extent) and much more. In this first part, I have made my best to explain the basic scanning techniques, Host discovery options, port scanning options, techniques used in detecting Operating system & services running on the system. i also give Nmap as already installed on your system. Let’s start with one of the most basic and default scan, the one without using any parameters. This is a basic scan of the local IP address 192.168.1.34, we use sudo to gain administrator privileges, and then we give the target to Nmap. Discovery Port scanning options Performing Fast scan: Related:  Commands (GNU/Linux UNIX)

Kill All Processes with ps ax|grep pl|awk '{print $1}'|xargs kill Introduction Many times we write programs which runs many instances of itself, either while using fork or we manually run many copies of the same program, so during the development stage we may need to kill all running instances and modify the program and re-run, or there may be other situations where we may need to kill a ll perl programs running, etc etc. Till a few months back I used to do this job of killing manually process id by process id, like this Code: [root@pradeep test]# kill 31372 But recently I devised a command to kill all processes matching a pattern, I am sure someone else must have already done this, but there must any other to whom this might be helpful. The Command The command looks like this ps ax|grep pl|awk '{print $1}'|xargs kill Well, to some it might look confusing, let me break up the command a explain. [root@pradeep test]# ps ax|grep pl 31372 ? awk '{print $1}' Prints the first column returned by the previous command, in this case the PID e.g. - 31671

Sybil attack Description[edit] In a Sybil attack the attacker subverts the reputation system of a peer-to-peer network by creating a large number of pseudonymous identities, using them to gain a disproportionately large influence. A reputation system's vulnerability to a Sybil attack depends on how cheaply identities can be generated, the degree to which the reputation system accepts inputs from entities that do not have a chain of trust linking them to a trusted entity, and whether the reputation system treats all entities identically. Evidence shows large-scale Sybil attack can be carried out in a very cheap and efficient way in the realistic system like BitTorrent Mainline DHT. [4][5] An entity on a peer-to-peer network is a piece of software which has access to local resources. A faulty node or an adversary may present multiple identities to a peer-to-peer network in order to appear and function as multiple distinct nodes. Prevention[edit] See also[edit] Ballot stuffing References[edit]

df(1): report file system disk space usage Name df - report file system disk space usage Synopsis df [OPTION]... [FILE]... Description This manual page documents the GNU version of df. df displays the amount of disk space available on the file system containing each file name argument. If an argument is the absolute file name of a disk device node containing a mounted file system, df shows the space available on that file system rather than on the file system containing the device node (which is always the root file system). Options Show information about the file system on which each FILE resides, or all file systems by default. Mandatory arguments to long options are mandatory for short options too. -a, --all include dummy file systems -B, --block-size=SIZE use SIZE-byte blocks --direct show statistics for a file instead of mount point --total produce a grand total -h, --human-readable print sizes in human readable format (e.g., 1K 234M 2G) -H, --si likewise, but use powers of 1000 not 1024 -i, --inodes -k like --block-size=1K -l, --local --no-sync

trustedsec/social-engineer-toolkit man df - Fournit la quantité d'espace occupé des systèmes de fichiers. df - Fournit la quantité d'espace occupé des systèmes de fichiers. df [options] [fichier...] Options POSIX : [-kP] [--] Options GNU (versions courtes) : [-ahikmPv][-t type_fs][-x type_fs][--print-type][--no-sync][--sync][--help] [--version] [--] df indique les quantités d'espaces disques utilisées et disponibles sur les systèmes de fichiers. Sans argument, df indiquera les quantités correspondant à tous les systèmes de fichiers montés, quels que soient leurs types. Les valeurs sont indiquées en unités de 512 octets par défaut, mais si l'option -k est utilisée, l'unité est 1024 octets. Les valeurs sont fournies en unités de 1024 octets par défaut, sauf si la variable d'environnement POSIXLY_CORRECT existe, auquel cas le comportement POSIX est adopté. Si un fichier indiqué en argument est un périphérique disque contenant un système de fichiers monté, df affichera l'espace disponible sur ce système de fichiers plutôt que sur celui contenant le noeud du périphérique. -k -a, --all --block-size=nb

The Lazy Guide to Installing Knoppix on a USB Key Knoppix, the famous live Linux CD that practically started the live CD trend, needs no introduction to most people. One of the things that's so great about it is that you can take it with you and boot to a familiar Linux environment on almost any modern computer, without touching the OS that's already installed on it. Of course, it can be even more portable when it runs entirely off of an inexpensive USB key. So let's install it to a 1 GB USB key, and create a persistent home directory in which to store files. Only let's do it the lazy way, and keep use of the command prompt to a bare minimum. You will need a copy of the latest Knoppix CD (v5.1.1 as of this writing) and, of course, a 1 GB USB key. A note about the mysterious art of booting from USB keys. Generally speaking, there are two ways of booting from a USB key. The current way is to simply treat the USB key as if it were a hard drive. To get started, boot from the Knoppix CD. 1. 2. Next, insert your USB key. 3. 4. 5. 6. 7. 8. 9.

tee MAN Page Redirect output to multiple files, copies standard input to standard output and also to any files given as arguments. This is useful when you want not only to send some data down a pipe, but also to save a copy. Syntax tee [options]... [file]... If a file being written to does not already exist, it is created. Related: echo - Display message on screen head - Output the first part of file(s) less - Display output one screen at a time more - Display output one screen at a time pg - Display one page at a time Equivalents in NT Batch/Perl Script - TEE Scripts

Backtrack alternative Xiaopan OS is a small Tiny Core Linux based operating system specific for wireless penetration testing, it comes with the XFE desktop environment, a very lightweight graphical front end, the distribution can run as a live CD, from a USB thumbdrive with Unetbootin or used inside a virtual machine. Numerous wireless card controllers are supported, including Atheros and Broadcom, the most widely used chipsets. As a result of the distribution being based on Tiny Core Linux all of the .tcz precompiled packages available for Tiny Core can be installed in Xiopan using the TCL Appbrowser, non hacking utilities like games, media player, CD burner, VoIP software and Truecrypt can all be optionally added to Xiopan OS. Wifi hacking Linux distribution Xiaopan This Linux live CD is first class penetration testing tool to audit wireless access points security and replaces Beini, a very similar distribution no longer active. Xiaopan Linux WPA2 hacking Visit Xiaopan OS homepage

Manpage of TUNE2FS Ajuste le nombre maximal de montages entre deux vérifications du système de fichiers. Si max-mount-counts vaut 0 ou -1, le nombre de fois que le système de fichiers a été monté sera ignoré par e2fsck(8) et par le noyau. Varier le compteur de montages au bout duquel les systèmes de fichiers seront obligatoirement vérifiés permet d'éviter que les systèmes de fichiers ne soient tous vérifiés en même temps lors de l'utilisation de systèmes de fichiers journalisés. Vous devez être conscient des conséquences si vous désactivez entièrement la vérification dépendante du compteur de montage. Des disques, câbles, mémoires défectueux ou des bogues du noyau peuvent corrompre un système de fichiers sans que celui-ci ne soit marqué comme « sale » ou « erroné ». Voir aussi l'option -i pour les vérifications fonction du temps écoulé.

SpinRite SpinRite is a computer software program for scanning magnetic data storage devices such as hard disks, recovering data from them and refreshing their surfaces. The first version was released in 1988. Version 6.0, still current as of March 2014[update], was released in 2004.[1] SpinRite is run from a bootable medium (floppy disc, optical disc, bootable external storage device such as a USB stick) on a PC-compatible computer; it uses its own operating system and ignores the one installed, whether functional or not. History[edit] Features[edit] SpinRite tests the data surfaces of writeable magnetic disks, including IDE, SATA, and floppy disks. SpinRite attempts to recover data from hard disks with damaged portions that may not be readable via the operating system. Certain claims made by SpinRite's makers have proved controversial. SpinRite 2.0, circa 1991. Version 6 is rather different from previous versions. The price as of December 2012[update] was US$89. Issues[edit] Large drives[edit]

Related: