System Administration & Configuration

Test WordPress Logins With Hydra on Kali Linux

Introduction There are web forms all over the Internet. Even sites that don't usually allow regular users to log in probably have an admin area. It's important when running and deploying a site to make sure that the passwords gating access to sensitive controls and admin panels are as secure as possible. There are different ways to attack a web application, but this guide is going to cover using Hydra to perform a brute force attack on a log in form. The target platform of choice is WordPress....
Read More...

SSH Password Testing With Hydra on Kali Linux

Introduction Hail Hydra! Okay, so we're not talking about the Marvel villains here, but we are talking about a tool that can definitely do some damage. Hydra is a popular tool for launching brute force attacks on login credentials. Hydra has options for attacking logins on a variety of different protocols, but in this instance, you will learn about testing the strength of your SSH passwords. SSH is present on any Linux or Unix server and is usually the primary way admins use to access and...
Read More...

Creating Wordlists with Crunch on Kali Linux

Introduction Wordlists are a key part of brute force password attacks. For those readers that aren't familiar, a brute force password attack is an attack in which an attacker uses a script to repeatedly attempt to log into an account until they receive a positive result. Brute force attacks are fairly overt and can cause a properly configured server to lock out an attacker or their IP. This is the point of testing the security of log in systems this way. Your server should ban attackers that...
Read More...

Introduction to Nmap on Kali Linux

Introduction Nmap is a powerful tool for discovering information about machines on a network or the Internet. It allows you to probe a machine with packets to detect everything from running services and open ports to the operating system and software versions. Like other security tools, Nmap should not be misused. Only scan networks and machines that you own or have permission to investigate. Probing other machines could be seen as an attack and be illegal. That said, Nmap can go a long way in...
Read More...

Filtering Packets In Wireshark on Kali Linux

Introduction Filtering allows you to focus on the exact sets of data that you are interested in reading. As you have seen, Wireshark collects everything by default. That can get in the way of the specific data that you are looking for. Wireshark provides two powerful filtering tools to make targeting the exact data you need simple and painless. There are two way that Wireshark can filter packets. It can filter an only collect certain packets, or the packet results can be filtered after they...
Read More...

Basics of network protocol analyzer Wireshark On Linux

Wireshark is just one of the valuable tools provided by Kali Linux. Like the others, it can be used for either positive or negative purposes. Of course, this guide will cover monitoring your own network traffic to detect any potentially unwanted activity. Wireshark is incredibly powerful, and it can appear daunting at first, but it serves the single purpose of monitoring network traffic, and all of those many options that it makes available only serve to enhance it's monitoring ability....
Read More...

Hosting Django With Nginx and Gunicorn on Linux

Introduction Hosting Django web applications is fairly simple, though it can get more complex than a standard PHP application. There are a few ways to handle making Django interface with a web server. Gunicorn is easily one of the simplest. Gunicorn(short for Green Unicorn) acts as in intermediary server between your web server, Nginx in this case, and Django itself. It handles serving the application itself while Nginx picks up the static content. Gunicorn Installation Installing Gunicorn is...
Read More...

Record and Replay Terminal Session with Asciinema on Linux

Introduction Asciinema is a lightweight and very efficient alternative to a Script terminal session recorder. It allows you to record, replay and share your JSON formatted terminal session recordings. The main advantage in comparison to desktop recorders such as Recordmydesktop, Simplescreenrecorder, Vokoscreen or Kazam is that Asciinema records all standard terminal input, output and error as a plain ASCII text with ANSI escape code . As a result, JSON format file is minuscule in size even...
Read More...

Protecting Your Privacy With Firefox on Linux

Introduction Privacy and security are becoming increasingly important topics. Though it's impossible to be 100% secure, there are measures that you can take, especially on Linux, to help defend your online privacy and security when browsing the web. Firefox is probably your best option when selecting a browser for these purposes. Google Chrome cannot be trusted. It's owned by Google, a company known for data collection, and it's closed source. Chromium may be okay, but can't be guaranteed....
Read More...

How to install Google Chrome Browser on Kali Linux

Objective The objective is to install Google Chrome web browser on Kali Linux. See an appendix for a possible issue troubleshooting. Requirements Privileged access to your Kali Linux installation or Live system is required. Difficulty EASY Conventions
Read More...

How to install SSH ( secure shell ) service on Kali Linux

Objective The objective is to install SSH ( secure shell ) service on Kali Linux. Requirements Privileged access to your Kali Linux installation or Live system is required. Difficulty EASY Conventions
Read More...

VIM - Unable to paste - E353: Nothing in register " error - Solution

Symptoms The following error message appears after a paste attempt is made using middle mouse button: E353: Nothing in register " This error first appeared with VIM version 8:
Read More...

Check your Local and Public IP address

Your Local IP address is: - Above is your local/private IP address(es) assigned to your internal hardware or virtual network card on your computer. Depending on your LAN configuration the above IP addresses may be static or dynamic. In case you can't find any address above, to check your internal IP address manually on Linux with ifconfig or ip command execute: # ifconfig | grep -w inet | awk '{ print \$2}' OR # ip a s | grep -w inet | awk '{ print \$2}' var userip; document.write(" Your...
Read More...

LEMP ( Linux, Nginx, MySQL, PHP7 ) stack Docker image deployment

About The automated build docker LEMP image linuxconfig/lemp-php7 can be used as a testing and also as a production environment for a dynamic PHP applications. It comprises of Debian GNU/Linux, lightweight and yet powerful Nginx webserver, MySQL relational database management system and PHP scripting language. At the time of writing, Debian Linux does not come with PHP 7 as a part of a its standard repository. From this reason PHP 7 was compiled from the source code during docker image build...
Read More...

Simple way for unattended bulk user creation in Linux

Introduction As a Linux system administrator, you will sometimes have to add new user account to your system. To do so, adduser command is often used. When it comes to multiple users' creation, adduser command may become boring and time-consuming. This short article intends to provide the Linux system administrator with a simple and unattended way for bulk user creation. The newusers command will help you to create multiple users by getting their info from a prefilled file. Requirements...
Read More...

Play Netflix on Linux with Firefox

Introduction Netflix and Linux have a somewhat troubled past. For years, Netflix actively blocked Linux users. More recently, support for Google Chrome was added. Firefox users, however, have been out of luck until just recently. As of Firefox 49, the option of using Google's DRM from the Chrome browser to play DRM content has been made optionally available to Firefox users. This has made it possible to watch Netflix, and potentially other DRM streaming services, using Firefox and without...
Read More...

How to increase screen resolution on XenServer 7 GUI Virtual Machine (VM)

Objective If your intention is to use XenServer's virtual machine as a remote desktop, the default screen resolution may not be satisfactory for your purposes.
Read More...

Configuring WINE with Winetricks

Introduction If winecfg is a screwdriver, winetricks is a power drill. They both have their place, but winetricks is just a much more powerful tool. Actually, it even has the ability to launch winecfg . While winecfg gives you the ability to change the settings of WINE itself, winetricks gives you the ability to modify the actual Windows layer. It allows you to install important components like .dlls and system fonts as well as giving you the capability to edit the Windows registry. It also...
Read More...

Using WINE Prefixes

Introduction It's probably best to think of WINE prefixes sort of like virtual machines. They're not virtual machines, but they do behave somewhat similarly. A WINE prefix is a folder that contains all of the WINE configurations as well as all of the Windows pieces that WINE uses for compatibility, including libraries and a registry. The default WINE prefix is ~/.wine , but different and multiple prefixes can be used.
Read More...

Configuring WINE with Winecfg

Introduction Many programs work under WINE with absolutely no configuration. The second WINE is installed, it can flawlessly run them. Unfortunately, that isn't always the case, and applications are constantly being updated, so the list of flawless applications is always changing. It's a good thing that WINE can be configured to accommodate potentially troublesome programs. There are two main utilities for doing so, winecfg and winetricks . This guide will cover the former, and a future guide...
Read More...