Posts

Showing posts from June, 2023

Digital signatures explained - Asymmetric encryption

In simple terms, digital signatures are a way to verify the authenticity and integrity of digital documents or messages. They use cryptographic techniques to provide a secure and tamper-proof method of verifying the identity of the signer and ensuring that the content of the document has not been altered. Here's a simplified explanation of how digital signatures work: Signing process: The person or organization who wants to sign a document generates a unique pair of cryptographic keys: a private key and a corresponding public key. The private key is kept secret and should only be known by the signer. The document or message that needs to be signed is put through a mathematical function called a hashing algorithm. This function generates a fixed-size unique value, often referred to as a hash or digest, which is specific to the content of the document. The private key is then used to encrypt the hash of the document. This encrypted hash, along with the public key, is attached to the

Linux Distros & Reverse Shell In Pentesting

Linux Distro Explanation What is a distro In the context of computer software, a "distro" is short for distribution. It refers to a specific variant or version of an operating system (OS) that has been customized and packaged with a particular set of software applications and configurations. Distributions are most commonly associated with the Linux operating system, although the term can also be used for other Unix-like systems. Linux distributions are created by individuals, organizations, or communities who take the source code of the Linux kernel (the core component of the operating system) and combine it with various other software packages, utilities, and desktop environments to create a complete operating system. Each distribution typically has its own goals, design principles, and target audience. Different Linux distributions can vary significantly in terms of their default software selection, package management systems, desktop environments, installation methods, and

tiny 10 iso file download

tiny 10 iso file download? What is tiny10 in windows?

Gobuster and how its used

GoBuster wordlist option. - wordlist option in gobuster tool The -wordlist option in the GoBuster tool allows you to specify a file containing a list of words or paths that will be used during the directory and file brute-forcing process. GoBuster uses this wordlist to generate various combinations and test them against the target website or server to discover hidden directories, files, or other resources. Here's an example of how you can use the -wordlist option with GoBuster: gobuster dir -u http://example.com -w wordlist.txt In the above command, dir specifies that GoBuster should perform directory brute-forcing. -u is used to specify the target URL ( http://example.com in this case), and -w is used to provide the path to the wordlist file ( wordlist.txt in this case). The wordlist file should contain one word or path per line, which GoBuster will use to construct URLs and check their existence on the target. It's important to have a comprehensive and well-curated wo