Quite like the TaskScheduler utility of Windows, one can utilize the Cron utility to schedule jobs in Linux to run periodically at fixed intervals of time. Used typically for automating system maintenance or administration jobs like backing up data, updating packages and much more, any Linux sysadmin would vouch for its importance. Job scheduling in Linux: Basic Guide What is Cron? The Cron service is a time-based job scheduling service that is typically started when the system boots. It checks every minute for any scheduled jobs and runs them if they exist. What is Crontab? In order to manipulate the job schedules, we use the Crontab program in Linux. Crontab, short for ‘cron table,‘ is a configuration file. Each line of the Crontab represents a job and contains information on what t
Kali Linux is the favorite operating system of ethical hackers. Last year, the developers of this ethical hacking toolset decided to switch to the rolling release model. This means that instead of being based on the standard Debian releases, Kali Linux rolling distro ensures that it’s regularly being updated with latest features and patches. But, in the rolling model, the release of updated images isn’t much important. But, the latest release, i.e., Kali Rolling 2017.1, brings in a bunch of exciting features and updates. So, let’s take a look at the major highlights: Kali Linux 2017.1 new features RTL8812AU Wireless Card Injection support This release brings wireless injection support to 802.11ac standard. This has happened due to the implementation of drivers for RTL88
Earlier this year in March, Parrot Security OS 3.5 was released, which was powered by Linux kernel 4.9.13 and Debian GNU/Linux 9 Stretch. Now, after few months of hard work, the Parrot Security team is here with the next release of this Kali Linux alternative, i.e., Parrot 3.6. Parrot Security OS 3.6 doesn’t come with many noticeable new features and functionalities. The announcement post of this ethical hacking distro also mentions this. With this release, the developers have aimed to make the existing tools and environment better. Changes and improvements in Parrot Security OS 3.6: Apart from the polishing part, work has been done to make Parrot Security OS 3.6 less memory-hungry. This was done by tuning up startup daemons management system and minor fixes. As a result, Parrot 3.6 Li
The Broken Web Applications (BWA) Project produces a Virtual Machine running a variety of applications with known vulnerabilities for those interested in: learning about web application security testing manual assessment techniques testing automated tools testing source code analysis tools observing web attacks testing WAFs and similar code technologies All the while saving people interested in doing either learning or testing the pain of having to compile, configure, and catalog all of the things normally involved in doing this process from scratch. Release notes for the Open Web Application Security Project (OWASP) Broken Web Applications Project, a collection of vulnerable web applications that is distributed on a Virtual Machine in VMware format compatible...
You can stop Google from tracking your searches and browsing activity, places you go, information from your devices, your voice searches and commands, videos you search for on YouTube and Videos you watch on YouTube. Here in this blog post, I am going to show you how can you stop Google from snooping in your data but let me tell you first, they claim that the data they collect is for enhancing the user experience on the web, so you need not to disable all the options. Here are the steps to disable Google tracker. Step 1: The first step in order to do this is to login to Google Web and App Activity Page. Now click on Gear icon which will open some options. Step 2: Now Click on Settings, it will open your accounts history settings. You can disable the searches and browsing activ
The Open Web Application Security Project (OWASP) is a non-profit organization dedicated to providing unbiased, practical information about application security. The OWASP Top 10 represents a broad consensus on the most critical web application security flaws. The errors on this list occur frequently in web applications, are often easy to find, and easy to exploit. They are dangerous because they will frequently allow attackers to completely take over your software, steal data, or prevent your software from working at all. Meeting OWASP Compliance Standards is the First Step Toward Secure Code Web application attacks are now the most frequent pattern in confirmed breaches (2016 Verizon Data Breach Investigations Report). Yet many organizations struggle to implement an application securit...
It’s time to pause the archaic Windows vs. OS X vs. Linux discussion and switch over to some advanced operating systems dedicated to pen testing and ethical hacking. A security-focused operating system is a hacker’s best friend as it helps them to detect the weaknesses in computer systems or computer networks. In this article, we have listed 2017’s top 12 operating systems for ethical hacking and penetration testing. Here is the list of 12 best Linux distributions for hacking along with their download links. All of these are based on Linux Kernel and free to use. Let’s take Best Operating Systems For Ethical Hacking And Penetration Testinga look: | 2017 Edition Kali Linux: Developed by Offensive Security as the rewrite of BackTrack, Kali Linux distro tops our list of t
How to get free Wi-Fi is one of the most searched terms when it comes to network hacks. Out of those methods to get free internet, I talked about coffee shops, restaurants, and hotels that offer free Wi-Fi. But, many employ time limits on them to control how long a customer uses the Wi-Fi. This trick is also used by the business owners to ensure that a person doesn’t spend too much time in their establishment. How To Bypass Wi-Fi Time Limits? There are a couple of methods to circumvent this Wi-Fi time limit to continue using the free Wi-Fi. Please note that these methods are a little devious, so employ them only in critical situations. Mac Address Spoofing: The solution to this problem is very simple. All you need to do is use an app that can spoof a new MAC address and allow you to
You might have heard the word Social Engineering. But, what exactly is Social Engineering? What are the types of Social Engineering techniques? It can be assumed as a set of techniques primarily intended by the people who want to hack other people or make them do some particular task to benefit the attacker. However, to do this, they don’t want to depend largely on the coding part. Social Engineering scams are the art of deception used by evil minded people to nourish their greed for money or something else. So, What is Social Engineering? You might’ve received phone calls or emails from people giving credit card offers. They try to take people into confidence and make them pay a hefty amount to claim the offers. We call such things as a fraud. That’s an example/type of social engineeri
For most of us, the web is limited to ten twenty or maybe fifty websites. Most of this limited collection is in the form of Google sites and services. In reality, the internet is enormous, and it has around one billion websites existing on servers around the globe. Even with those billion websites, the web isn’t complete. Many believe the world wide web we see is only the tip of an iceberg. Two terms Darknet and Deep Web, in some sense, justify the presence of this hidden web about which most people are unaware. And those who know about the darknet often confuse it with deep web. Whereas, both are completely separate. What is Deep Web? Over the centuries, when the technology became advanced, humans built machines capable of diving to the depths of the oceans. That’s how we were abl