System – Page 7 – POFTUT

Category: System

0

How To Generate Self Signed X.509 Certificates with OpenSSL?

Hi, x509 certificates are used widely by a lot of applications. Generating x509 certificates seem to be hard and rocket science, but it is not. We will generate a key named t1.key and then create a signing request from this key. After that to signed our request we will generate a self signed CA key and certificate. After that we will sing our request and generate ready to use certificate....

0

Linux Su Command Tutorial With Examples

The su short for substitute super user command using to change currently logged user.  This makes things practical because the user change made without login. Su command can be used to get root privileges too. Su and sudo commands have different ways to act for similar aims. Syntax

Man Man page of the command can be seen like below.

Help To get fast and simple help the -h parameter can...

0

How To Create RSA Public and Private Key?

RSA is an algorithm used for Cryptography. It was patented until 2000 in USA (not whole world) where now it can be used freely. RSA has a lot of usage examples but it is mainly used for encryption of small pieces of data like key and Digital signatures. RSA is based integer factorization problem. As it is known that asymmetric ciphers are very slow against symmetric ciphers. So it is...

0

How To Use GPG To Create, List Keys and Sign Files?

GnuPG or GPG is Gnu version of Open PG standard implementation. It is very popular especially at personal use for mails etc. Here I will look basic usage of gpg2 in Linux command line interface. gpg2 is the second major version of gpg. Create/Generate Private GPG Keys Here we will create public and private keys for key-ring. Required information asked while certificate generation process. Real name and Email address is...

0

Crash Linux System With A Bash Fork Bomb

Our aim is to create a lot of process with single and simple commands. So every created process will eat some RAM and CPU. If we loop it forever actually not forever because our system resources are limited system will crash. So we can ask this question why would I crash my system . As stated before we can use this as a test case for different purposes. Recursive Functions...

0

How To Install Tenable Nessus into Kali?

Nessus is very good tool to manage vulnerabilities or vulnerability scanning. How can I install Nessus into my dpkg based pentest box? My distro my Debian, Ubuntu, Kali etc. Get License Key First step is license key. In old days Nessus was provided by Kali distribution as home version. There was no day limit of the Nessus. But the days gone and we are now here. To use Nessus we...

0

Dymerge Dictionary Merge Tool

During penetration test one of the test component is brute forcing critical data like password, hash, key etc. One way to brute force is using dictionaries or word list. There are a lot of dictionary in the internet and we generally need to merge them. Dymerge is a security tool used to merge different wordlists and dictionaries. Get DyMerge Latest version of the dymerge can be get from github by using...

Enjoy this blog? Please spread the word :)