Bizness Writeup HTB
Adding IP and domain to ‘hosts’ file. Nmap scan: From above results, you can see the open are 22, 443, 80 Now, open website “https://bizness.htb/“After moving around ,couldn’t find much useful. Dirb Scan I’m using common dictionary here, which is set by default. Otherwise, you can use any dictionary you wanted. Here is collection of…
Linux Root Filesystem
The Linux Filesystem ‘/’ – The Root Directory The root directory on a Linux system is represented by the ‘/’ character, everything on Linux system is located under this directory.It is as similar as ‘C:\’ directory on Windows- but it does not have drive letters instead other partition would appear in another folder under ‘/’…
Basic Shell to Fully Functional Shell
In the course of Penetration Testing or Ethical Hacking, gaining initial system access often involves acquiring a basic shell. To enhance your capabilities, it may be necessary to elevate this basic shell to a fully interactive one. This upgrade facilitates a more comfortable and functional command-line interface, enabling improved command execution and system exploration. The…
Why Linux?
Widespread Use in Cybersecurity: Linux is widely used in the cybersecurity field. Many security tools, frameworks, and servers run on Linux. Understanding Linux is essential for anyone working in cybersecurity roles such as penetration testing, ethical hacking, and system administration. Foundation for Cybersecurity Skills: Linux provides a strong foundation for learning essential cybersecurity skills. Many…