You can register an iTabCode account to be able to view iTabCode without ads. ( Registration is Free ) Register Now

linux system

  1. x32x01

    How to Install VSCode on Kali Linux

    There are so many code editors in the market, but now many developers found liking Virtual Studio Code. In this community we have seen many of friends switched on Visual Studio Code (VSCode) from Atom and Sublime Text. VSCode is an awesome code editor, it's totally free also. In this brief...
  2. x32x01

    How to use Proxychains in Kali Linux OS

    There are a lot of hackers and crackers around the world, some are good, and some are evil. Hackers always want to be anonymous while doing their work. Tools can be used in order to hide the hacker’s identity from being exposed such as VPN (Virtual Private Network), Proxy Servers and RDP (Remote...
  3. x32x01

    Manipulating MAC and IP addresses with MICH in Linux

    You must be familiar with the term IP address. Just like your home has a mailing address in the same way any computer or device connected to the internet have a mailing address called the IP address and the distinctive address that identifies a NIC is called the Media Access Control (MAC)...
  4. x32x01

    Find Public IP Address From Command Line - 12 Examples

    The public IP address is what you see online when you access them from your computer. If you want to try to connect to your computer via a remote connection that isn’t on the same network, you’ll need the public IP address. You can easily determine the IP address or addresses of your Linux...
  5. x32x01

    Find Virtual Machine IP Through Kali Linux - 3 Methods

    While solving CTF or bug bounty challenges, sometimes you need to find out the IP address of the machine because that machine is not logged in at that time. We realize that some people who like to break stuff haven’t had experience in building stuff. No matter how good our skills are, we need...
  6. x32x01

    Get Linux IP Address from Command Line - 5 Ways

    What is IP Address A unique number consisting of four parts separated by dots. Every device on the Internet (and on any network) must have a unique IP address to participate and be part of it. An example of an IP address is: 192.168.1.1. This article will show you how to find the IP address of...
  7. x32x01

    Simple Random Password Generator - Command Line (LINUX)

    A brute-force attack is when all possible keys are checked against encrypted data until the right key is found. Brute-force attacks are extremely costly from a resource and time perspective because the attacker is exploiting vulnerabilities in the encryption by taking advantage of key length and...
  8. x32x01

    Test Your Internet Speed With Command Line Tool

    Would you like to know how fast your internet connection is? This can be done with an internet speed test. There are various tests on the internet to measure the speed of your connection. The below command line tool can easily show your up and download speed. When starting an Internet speed...
  9. x32x01

    Generate Random Password in Linux - Command Line

    There are plenty of ways to make your password secure, but most people just don’t bother. It is much easier to set a password that is easy to remember, but hackers rely on this to break into insecure sites. Try to at least make it hard to guess by making it eight characters or more, and throw...
  10. x32x01

    How to use kill, pkill and killall Commands to Kill any Linux Process

    UNIX treats every object in the operating system as a file. We can find the files associated with every action performed and can make use of them for different system- or process-related manipulations. A process, also known as a task, is the running form of a program. Programs are stored on...
  11. x32x01

    Privilege Escalation with PowerShell Empire and SETOOLKIT [Kali Linux]

    In a previous tutorial, we used PowerShell Empire v2.3.0 for post exploitation of Windows Operating System. The same can also be done with one of the most popular toolkit named as Social Engineering Toolkit (SETOOLKIT) which is already pre-installed in every Kali Linux flavor. In order to...
  12. x32x01

    Change Password Forcefully on Next Login (LINUX)

    Password is a key or a Secret word or a string of characters which is used to protect your assets or information from others in the cyber world. It is used for authentication, to prove our identity or to gain access to our own resources. It should be kept secret to prevent access by unauthorized...
  13. x32x01

    20 Useful Tar Commands For Extraction and Compression

    The Linux tar command stands for tap archive, is not a compressed file and commonly called as a collection (which contains the contents of many files) of a single file. Tar is the most commonly used command in Linux for creating a archive file. It saves multiple files, folders & other file...
  14. x32x01

    Linux System Reconnaissance [Top Linux Commands]

    In the early 90’s GNU/Linux systems consisted of little more than a beta – quality Linux kernel and a small collection of software ported from the GNU project. It was a true hacker’s operating system. There were no CD?ROM’s or GUI installation tools; everything had to be compiled and configured...
  15. x32x01

    Linux Privilege Escalation With Kernel Exploit [8572.c]

    In a previous tutorial, we used Metasploit Framework to gain a low-level shell through meterpreter on the target system (Metasploitable2 Machine) by exploiting the ShellShock vulnerability. But that low level shell is not root shell, it means you can’t run all system level command. To run all...
  16. x32x01

    Auto Login Root User - Kali Linux (At System Startup)

    Kali Linux is a Linux-based penetration testing arsenal that aids security professionals in performing assessments in a purely native environment dedicated to hacking. Kali Linux is a distribution based on the Debian GNU/Linux distribution aimed at digital forensics and penetration testing use...
  17. x32x01

    Encryption and Decryption of Files in Linux with GnuPG

    GnuPG is a complete and free implementation of the OpenPGP standard as defined by RFC4880 (also known as PGP). GnuPG allows you to encrypt and sign your data and communications; it features a versatile key management system, along with access modules for all kinds of public key directories...
  18. x32x01

    Connect Wi-Fi Network From Terminal - Kali Linux

    Today, Wireless Network has become more and more present in open area or large companies and security enhancement is needed to control authentication and confidentiality. The 802.11 Working Group introduced the 802.11i amendment as the final stage of the Robust Security Network standard...
  19. x32x01

    Set IP Address in Linux - Static / DHCP

    When you write a letter to someone, you usually put a complete address on the envelope specifying the country, state, and Zip Code. After you put it in the mailbox, the post office will deliver it to its destination: it will be sent to the country indicated, where the national service will...
  20. x32x01

    Top 10 Linux System Monitoring and Performance Tools

    System performance analytics seems to be a frequent question on forums and mailing lists. Finding out why something is slow is generally nontrivial as there are many factors to consider. It’s really very tough job for every System or Network administrator to monitor and debug Linux System...
Top