906 private links
Parlons un peu de ma tâche et mon job sur le blog via mon entreprise https://kor51.org. Moi mon boulot c'est de sécuriser les ordinateurs, avec les meilleurs techniques, à la pointe de la sécurité informatique. D’où que j'apprends dans ma formation à la cybersécurité à utiliser Arch Linux pour mes clients qui est l'outil de travail pour déployer la sécurité informatique. Allons y. N'hésitez pas à parler de moi, le bouche à oreille sur mes compétences.
On va faire un tour des bonnes pratiques "blue team" de la sécurité informatique sur son réseau et son ordinateur sous Arch Linux. Je conseil pour tous hacktivistes qui à besoin de sécuriser des données. Sécuriser et auditer un ordinateur sous Arch Linux implique plusieurs étapes couvrant la configuration du système, l'installation de logiciels de sécurité, la mise en place de pratiques sécurisées et l'utilisation d'outils d'audit.
Après les messages et les signaux, voici enfin un nouvel article dans la série Bash avancé. Avec presque deux ans de retard, il serait temps me direz-vous! Mais mieux vaut tard que jamais non?
Cette article me servira de prétexte pour utiliser massivement la commande interne
printf
et vous montrer quelques cas d’usages. Nous verrons aussi la substitution de processus, la substitution de paramètre et d’autres mécanismes offerts par Bash.
L’idée ici est de proposer trois types de messages dans un fichier que nous pourrons ensuite inclure dans nos scripts à l’aide de la commande
source
.Ces messages seront de 3 types différents:
- messages standards envoyés sur la sortie standard
- messages de débogage affichés si une variable
DEBUG
est positionnée et envoyés vers la sortie d’erreur- message d’erreur envoyés sur la sortie d’erreur.
Nous utiliserons quelques spécificité de bash nous permettant d’agrémenter nos sorties.
Physically sharing computers with other people can be a challenge. While they only need temporary access to access the web, work on some files or even play a game, this may impose a security risk. For example, your personal files may be accessible because your account is already logged in. While on one hand you want to share your device, on another hand you may also want to some privacy.
If this is a concern for you, keep reading. We will see how to use guest accounts on Linux Mint and how to customize them for your needs.
If you’ve dual-booted Linux with another operating system like Windows and are stuck with the traditional GRUB boot manager, it’s time to switch to rEFInd, IMMEDIATELY!
This tutorial shows how to automatically create, delete files/folders, and/or write parameters into config files at startup in Ubuntu and other Linux using systemd.
This can be useful if some configuration do not persistent and reset to default on every boot, or you want to clean up something either on every boot or after every time period.
Pilote générique PCL 6 pour Linux
Learn how to monitor a directory recursively and execute a command whenever the files and directories within it change.
f3 is a simple tool that tests flash cards capacity and performance to see if they live up to claimed specifications. It fills the device with pseudorandom data and then checks if it returns the same on reading.
F3 stands for Fight Flash Fraud, or Fight Fake Flash.
How do I capture a specific protocol or port, such as 80 (HTTP) or 443 (HTTPS), using the TCPDump tool under Linux/UNIX? How do I record traffic with TCPDump and find problems later on with my network or server issues? Let’s dive into the nitty-gritty of capturing and analyzing your network traffic for trapshooting network and server issues.
The next generation Linux workstation, designed for reliability, performance, and sustainability.
Bluefin Administration Guide - Bluefin and Aurora - Universal Blue
rpm-ostree rebase ostree-image-signed:docker://ghcr.io/ublue-os/bluefin:latest
Iptables is a firewall that plays an essential role in network security for most Linux systems. While many iptables tutorials will teach you how to create firewall rules to secure your server, this one will focus on a different aspect of firewall management: listing and deleting rules.
In this tutorial, we will cover how to do the following iptables tasks:
- List rules
- Clear Packet and Byte Counters
- Delete rules
- Flush chains (delete all rules in a chain)
- Flush all chains and tables, delete all chains, and accept all traffic
Documentation basée sur BookStack.
just
is a handy way to save and run project-specific commands.
Bringing the console gaming experience to PC
Bazzite is a custom image built on Fedora Atomic technology that brings the best of Linux gaming to all of your devices (yep, even your favorite handheld).
Nmap is short for Network Mapper. It is an open-source security tool for network exploration, security scanning, and auditing. However, the Nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users. The purpose of this guide is to introduce a user to the Nmap command line tool to scan a host or network to find out the possible vulnerable points in the hosts. You will also learn how to use Nmap for offensive and defensive purposes. Let us see some common and practial nmap examples running on Linux or Unix-like systems.
Modern UNIX shells like bash (default on Linux) and zsh (default on macOS) keep a history of all the commands you enter. The easiest way to access this history is by pressing the up and down cursor keys to browse through the last commands.
But this is only the tip of the iceberg. There are many more powerful history features that are easy to overlook. Learning them and making them second nature will help you to become much faster with a shell.
Exegol is a community-driven hacking environment, powerful and yet simple enough to be used by anyone in day to day engagements. Exegol is the best solution to deploy powerful hacking environments securely, easily, professionally. No more unstable, not-so-security-focused systems lacking major offensive tools. Kali Linux (and similar alternatives) are great toolboxes for learners, students and junior pentesters. But professionals have different needs, and their context require a whole new design.
Chaque minute, nombreuses sont les tentatives d'intrusion sur l'ensemble des ordinateurs connectées à Internet.
Parmi les attaques les plus virulentes, il y a bien sûr les tentatives d'accès SSH, l'exploitation de failles de sécurité sur des services Web (Wordpress, PhpMyAdmin ...) et l'exploitation des failles de sécurité sur des services contenant des failles de sécurité connues : services SMB (139), service RDP(3389), service Docker(2376), bases MongoDB ... Ces tentatives d'attaques sont pour la majorité automatisées depuis des serveurs eux-mêmes vulnérables.