Author: spectnullbyte

0

Using Gobuster to Find Hidden Web Content

Directories and Files enumeration is one of the first steps that an attacker performs during web application pentesting. This step is necessary to identify potential hidden areas of a website that aren’t supposed to...

SQL Injection 0

Introduction to SQL Injection

SQL injection is often referenced as the most common type of attack on websites. It is being used extensively by hackers and pen-testers on web applications. The OWASP Top Ten lists SQL Injection (or...

find files in linux 0

Chapter 6 – Find Files in Linux

You should already be aware of how much a search for a file can sometimes feel like looking for a needle in a haystack. Fortunately, finding files on Linux is not that hard. In...

0

Introduction to Malware Analysis

In this article, we will try to learn what malware is and how malware analysis works. It is aimed at complete beginners who have never tried malware analysis before. If that’s you, then this...

1

Chapter 5 – Users and Permissions

So far, you’ve been using the same user account you’ve created during the installation of Linux. That’s fine as long as you’re the only one using your machine. But what if you want to...

0

Chapter 3 – The Linux Command-Line

In this chapter, you will make your first steps in the Linux command-line environment. If you’re a long time Windows user, then this is your chance to explore a new way to interact with...

0

How To Use Nmap: A Beginner’s Guide

Nmap is an open-source network mapping tool developed by Gordon Lyon. It is widely used as a port scanner and a host discovery tool by network administrators and hackers world-wide. The reason for its...

2

Chapter 2 – How To Install Linux Mint

This chapter provides a step-by-step guide on how to install the Linux Mint distribution on your machine. I included a screen capture for every step so that the whole process is clear. Download the...

1

Overthewire, Learn Hacking By Playing Games

If you’ve spent enough time on the web searching for practical resources to learn how to hack, then you should know by now what a hustle it is to find the right place to...