Linux

By rashid, 6 August, 2022

Linux uses logical labels for drives that are then mounted on the filesystem. These logical labels will vary depending on where the drives are mounted, meaning the same hard drive might have different labels at different times, depending on where and when it’s mounted.

When systems have more than one hard drive, Linux simply names them serially by incrementing the last letter in alphabetical order, so the first drive is sda, and the second drive is sdb, the third drive is sdc, and so on.

Tags

By rashid, 6 August, 2022

The dd command makes a bit-by-bit copy of a file, a filesystem, or even an entire hard drive. This means that even deleted files are copied (yes, it’s important to know that your deleted files may be recoverable), making for easy discovery and recovery. Deleted files will not be copied with most logical copying utilities, such as cp.

Tags

By rashid, 27 July, 2022

Imagine the rwx permissions as three ON/OFF switches, so when all permissions are granted, this equates to 111 in binary. Each file or directory has three basic permission types:

Tags

By rashid, 23 July, 2022

To request an IP address from DHCP, simply call the DHCP server with the command dhclient followed by the interface you want the address assigned to. Different Linux distributions use different DHCP clients, but Kali is built on Debian, which uses dhclient. Therefore, you can assign a new address like this:

kali >dhclient eth0

The dhclient command sends a DHCPDISCOVER request from the network interface specified
(here, eth0). It then receives an offer (DHCPOFFER) from the DHCP server and confirms the IP assignment to the DHCP server with a dhcp request.

Tags

By rashid, 23 July, 2022

We can also use ifconfig to change our device MAC address (or HWaddr). The MAC address is globally unique and is often used as a security measure to keep hackers out of networks or to trace them. Changing the MAC address to spoof a different MAC address is almost trivial and neutralises those security measures. Thus, it’s a very useful technique for bypassing network access controls.