Security – Page 20 – POFTUT

Dymerge Dictionary Merge Tool

During penetration test one of the test component is brute forcing critical data like password, hash, key etc. One way to brute force is using dictionaries or word list. There are a lot of dictionary in the internet and we generally need to merge them. Dymerge is a security tool used to merge different wordlists … Read more

Google Dork or Search Hacking Tutorial

There are a lot of different tools that helps us while making security tests, security assessment or hacking ;). These tools are sometimes open source sometimes paid software. Google is one of the tool that is used for security tests. It may seem ridicules but it is correct. We will see how google can be … Read more

How To Find Out Which Proccess is Listening On A Port for Windows?

System or Network administrators looks ports and applications to solve problems. Getting port and application info in Linux can be done lsof command. But in Windows? netstat is a very popular and useful tool used to get network and port-related information. List Listening Port with netstat Command We will use <a href=”https://www.poftut.com/how-to-check-and-list-listening-ports-with-netstat-in-linux/” target=”_blank” rel=”noopener noreferrer”>netstat</a> … Read more

Grep and Filter IP Address In Linux

Searching IP address in a text file or a console output may become cumbersome. This little command named grep will help you in this way. Example Data We have a file or output which includes the IP address and we want to extract just IP addresses nothing other. This file is created with a nmap … Read more

How To Create and Setup SSH Keys For Passwordless and Public Key Based Authentication In Linux?

How To Create and Setup SSH Keys For Passwordless and Public Key Based Authentication In Linux?

Ssh is a protocol designed to make network connections between hosts secure. Ssh is a defacto standard for Linux and related operating systems. Ssh encrypts the connection between sides. Ssh gives terminal access between host and server. To get a terminal there need to be an authentication process. The authentication process is generally password-based but … Read more