Linux Basics for Hackers, the Make Command: Compiling and Installing Software from Source in Linux

Welcome back, aspiring Linux enthusiasts!   In our journey through the Linux ecosystem, we often encounter situations where the software we need isn’t available through standard package managers like apt or yum. Or perhaps we need a bleeding-edge version with features not yet available in the repositories. When this happens, knowing how to compile and […]

Continue Reading

Database Hacking: SQLite Essentials and Attack Strategies

Welcome back, aspiring cyberwarriors!   SQLite is one of the most commonly used database engines, embedded in countless applications, mobile devices, and web services. Its compact design makes it a popular choice for developers, but it’s also an attractive target for hackers. Whether you’re a penetration tester, cyberwarrior, or security researcher, mastering SQLite can open […]

Continue Reading

Vulnerability Scanning: Automatic Search For Known CVEs With CVEScannerV2

Welcome back, aspiring cyberwarriors!   During reconnaissance, our goal is to identify vulnerable services within our target’s network. To streamline this process, CVEScannerV2 was developed – a powerful Nmap script that bridges the gap between network scanning and vulnerability assessment. This tool enhances the capabilities of the widely-used Nmap scanner, offering security professionals a comprehensive […]

Continue Reading

Vagrant: Building Secure Testing Environments

Welcome back, aspiring cyberwarriors!   Creating and managing virtual machines has traditionally been a tedious and time-consuming process. System administrators and developers often struggled with the challenges of replicating virtual environments across different servers, a task that becomes exponentially more complex when dealing with multiple VMs. This complexity not only slowed development cycles but also […]

Continue Reading