Step 1
We will start to navigate Linux security from zerohow to protect your system from unauthorized users, and how to monitoring your Linux system (demons, ports, processes and services installed on your...
View ArticleNMAP 1
NMAP 1nmap or Network Mapper ,it's a security scanner ,used to (scan ports , OS fingerprinting ,banners and others ) in range of network or a specific machine .it's written by FaydorNow we want to use...
View ArticleNMAP 2
NMAP 2Let's try using nmap to scan and how to use it to lockdown and stop unused services (may attacker used this services to attack by exploiting these services )by using command nmap -sS localhost to...
View ArticleTCP Wrapper
TCP Wrapperinetd : it’s daemon listens on specific ports such as (telnet 23 , ftp 21), when it receive a packet ,it's lunches the appropriate program to handle the connection.Xinetd : it's make the...
View ArticleSSH 1
SSH 1SSH (secure shell) :used for making encrypted connection between 2 computers by using a secure Channel between these computers for (remote access, copying files, etc.. ).SSH is based on client...
View ArticleSSH 2
SSH 2Configuring SSH : generate keys by command ssh-keygen -t rsa And then follow the default configurationGenerating public/private rsa key pair.Enter file in which to save the key...
View ArticleSSH 3
SSH 3 (Port Forwarding)SSH Port Forwarding or SSH tunneling allow to establish SSH session (secured connection) , And then making TCP connection (unsecured connection) inside the tunnel or through it...
View ArticleGPG 1
GNU Privacy guard GNU Privacy Guard (GPG/PGP) use for encrypting messages by using PKI or asymmetric key.Asymmetric key mechanism uses public and private key sender side:public key use to encrypt...
View ArticleGPG 2
GNU Privacy guard 2 Encryption and DecryptionWe now try to encrypt messages or text file by using GPG , For Example i have a file (example.txt) containTesting GPG encryption 1 2 3 4 5 6 7 8 9 1011 12...
View ArticleFile Integrity Check
File Integrity CheckWe will use a program to check integrity to ensure that all my system files contain the right files and to ensure that i don't have back-doors (rootkit) and check changes in...
View ArticleIPTables 1
IPTablesIPTables is a front-end to control and manage netfilter.Netfilter (firewall) is a framework integrated in Linux Kernel.IPTables is consist of 3 tables (Filter,NAT,Mangle).We will focus on layer...
View ArticleIPTables 2
IPTables 2Matching in IPTables IPTables basically based on matching all packets with rules in IPTables tables (Filter,NAT,Mangle).So we can manage matching based...
View ArticleIPTables 3
IPTables 3Adding new chain :You can use this flag (-N)exampleiptables -N LANPractical example :To manage your Intranet easily you should write a new chain and write Intranet rules in this chain. 1-...
View ArticleConverting Binary to shellcode
Converting a Binary to shellcodeNow we will talk about converting a binary to shellcodeby using this program binary2shellcode (FOR LINUX AND UNIX)1- Compile & Run :To build binary2shellcode cd...
View ArticleMetasploit 1
Metasploit 1Introduction Metasploit framework is a penetration testing framework that contain a lot of tools (port scanners , vulnerability scanners ...etc) .Now we will start with the important step...
View ArticleMetasploit 2
Metasploit 2Scanning By ModulesMetasploit contains a lot of modules such as (port scanners , banner grabbers for services ... etc).We will use here some of these modulesNote: to get port scanner...
View ArticleMetasploit 3
Metasploit 3Advanced Commands Now we will introduce some advanced commands in metasploit (msfconsole)1- show exploitsmsf> show exploitsDisplay all exploites available in metasploit2- show...
View ArticleMetasploit 4
Metasploit 4Meterpreter part 1What is meterpreter ?Meterpreter is payload that uses DLL injection technique in memory so ,Antiviruses software can't detect it because meterpreter writes nothing to...
View ArticleMetasploit 5
Metasploit 5Meterpreter part 28- checkvmTo check if the remote system is a Vitrual machinerun checkvmThe target system is actually a virtual machine ruuning on VMware9- killavTo kill antivirusrun...
View ArticleCryptography1
Cryptography 1Introduction to cryptography :Now let's talk in details about 3 major concepts i- Computer Security , ii- OSI Security Architecture , iii- Cryptographyi - Computer securityA definition of...
View Article