background preloader

25 Best SSH Commands / Tricks

25 Best SSH Commands / Tricks
OpenSSH is a FREE version of the SSH connectivity tools that technical users of the Internet rely on. Users of telnet, rlogin, and ftp may not realize that their password is transmitted across the Internet unencrypted, but it is. OpenSSH encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other attacks. The encryption that OpenSSH provides has been strong enough to earn the trust of Trend Micro and other providers of cloud computing.Additionally, OpenSSH provides secure tunneling capabilities and several authentication methods, and supports all SSH protocol versions. SSH is an awesome powerful tool, there are unlimited possibility when it comes to SSH, heres the top Voted SSH commands 1) Copy ssh keys to user@host to enable password-less ssh logins. ssh-copy-id user@host To generate the keys use the command ssh-keygen 2) Start a tunnel from some machine’s port 80 to your local post 2001 ssh -N -L2001:localhost:80 somemachine Have Fun

http://blog.urfix.com/25-ssh-commands-tricks/

Firefox Extensions for the Web Developer - www.htmlgoodies.com Raindrops on roses and whiskers on kittens...yada yada yada (I mentioned the kittens). Here are a few of my favorite Firefox things: Web Developer, Pixel Perfect, ColorZilla, Measure It and Pixl Grabber. If you are not yet using the Firefox extension Firebug, run--don't walk--to downloadville. It is a must-have Web tool, especially if you are working with content management systems where the cascading stylesheets tend to look like Victoria Falls. While the extensions in this series do not rely upon it, some will integrate with it. If you are asking "What is Firebug?"   GHDB Welcome to the Google Hacking Database (GHDB)! We call them 'googledorks': Inept or foolish people as revealed by Google. Whatever you call these fools, you've found the center of the Google Hacking Universe! Advisories and Vulnerabilities (215 entries) These searches locate vulnerable servers.

SCRIPT COMPARE a side-by-side reference sheet sheet one: version | grammar and execution | variables and expressions | arithmetic and logic | strings | regexes | dates and time | arrays | dictionaries | functions | execution control | exceptions | threads sheet two: streams | asynchronous events | files | file formats | directories | processes and environment | option parsing | libraries and namespaces | objects | inheritance and polymorphism | reflection | net and web | gui | databases | unit tests | logging | debugging

Skip Graduate School, Save $32,000, Do This Instead Three years ago, I invested $32,000 and the better part of two years at the University of Washington for a master's degree in International Studies. The verdict? It wasn't a complete waste of time and money. Once I accepted that 80% of the course requirements were designed to keep people busy, I enjoyed the other 20% of the work. If you're strictly interested in learning, however, you may want to get a better return-on-investment than I did. Here's how to save $32,000 (or more) through your own self-directed, alternative program.Here's how to save $32,000 (or more) through your own self-directed, alternative program.

How To Use Rssocks And Rcsocks ( Reverse Socks5 Server) During this video I explain how from a shell I run a socks5 server with a reverse connection to bypass firewall restriction and scan the subnet using rssocks and rcsocks. For remember: - rssocks is the server is connect back to your client (need to be execute on the remote shell) - rcsocks is the client you run it PS: The reverse tools of ssocks are actually a POC, some improvements will arrive soon Nebraska Fusion Center Implementing New Search Tool Photo courtesy of the U.S. Department of Homeland Security. Following 9/11 and the gaps in information sharing those attacks exposed, the federal government began encouraging the development of fusion centers within each of the states as well as major cities to facilitate connecting pieces of information that help identify potential threats.

How to use Google for Hacking Google serves almost 80 percent of all the search queries on the Internet, proving itself as the most popular search engine. However, Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post, you will find the information on how to use Google for exploiting security vulnerabilities that exists within many websites. The following are some of the ways to use Google for hacking:

Linux Directory Structure (File System Structure) Explained with Examples by Ramesh Natarajan on September 8, 2010 Have you wondered why certain programs are located under /bin, or /sbin, or /usr/bin, or /usr/sbin? For example, less command is located under /usr/bin directory. Why not /bin, or /sbin, or /usr/sbin? What is the different between all these directories? In this article, let us review the Linux filesystem structures and understand the meaning of individual high-level directories.

Related: