Credential Hunting on Linux Systems

Cole Hartnettlinux

Big Picture Let’s say you’re on a penetration test for a random company and you are able to phish a basic user’s credentials and remotely connect to their workstation. This user doesn’t have any admin privileges so it’s hard to do cool things and move laterally across the network. Luckily you’ve stumbled across this article and after reading, will have …

Setting up a Firewall — IP Tables

Cole Hartnettlinux

Big Picture  Linux firewalls provide a security mechanism to filter incoming and outgoing traffic based on predefined rules, protocols, ports, and other criteria. IPtables is the current de facto standard for Linux firewalls and is implemented into the Netfilter framework of the Linux Kernel. Within IPtables the Tables are used to organize/categorize firewall rules.  Chains The way you make rules …

System Logs in Linux

Cole Hartnettlinux

Linux system logs are text files that record system events, user activities, authentication attempts, application errors, and security incidents. They are constantly login events from applications and kernel activity. For cybersecurity professionals logs are critical for detecting suspicious activity like failed login attempts, privilege escalations, and unauthorized access although attackers often try to modify logs to hide their tracks. Here …

Linux Keyboard Shortcuts

Cole Hartnettlinux

Here are some basic Linux keyboard shortcuts and other quick tips that I use to help me while on Linux systems. Cursor Movement [CTRL] + A – Move the cursor to the beginning of the current line. [CTRL] + E – Move the cursor to the end of the current line. [CTRL] + [←] / [→] – Jump at the …