<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Boni Yeamin</title>
    <description>The latest articles on DEV Community by Boni Yeamin (@boniyeamincse).</description>
    <link>https://dev.to/boniyeamincse</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F734040%2Fc3ac2de5-3fca-47be-b95c-dac23b03dd35.jpeg</url>
      <title>DEV Community: Boni Yeamin</title>
      <link>https://dev.to/boniyeamincse</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/boniyeamincse"/>
    <language>en</language>
    <item>
      <title>Linux Commands Cheat Sheet</title>
      <dc:creator>Boni Yeamin</dc:creator>
      <pubDate>Mon, 05 Feb 2024 11:11:13 +0000</pubDate>
      <link>https://dev.to/boniyeamincse/linux-commands-cheat-sheet-3581</link>
      <guid>https://dev.to/boniyeamincse/linux-commands-cheat-sheet-3581</guid>
      <description>&lt;p&gt;Linux Commands Cheat Sheet&lt;br&gt;
Did you know that there are hundreds of Linux commands? Even on a bare-bones Linux server install there are easily over 1,000 different commands.&lt;/p&gt;

&lt;p&gt;The interesting thing is that most people only need to use a very small subset of those commands. Below you’ll find a Linux “cheat sheet” that breaks down some of the most commonly used commands by category.&lt;/p&gt;

&lt;p&gt;To get your own PDF and printable copy, scroll to the bottom of the page.&lt;/p&gt;

&lt;p&gt;Enjoy!&lt;br&gt;
1 – SYSTEM INFORMATION&lt;/p&gt;

&lt;h1&gt;
  
  
  Display Linux system information
&lt;/h1&gt;

&lt;p&gt;uname -a&lt;/p&gt;

&lt;h1&gt;
  
  
  Display kernel release information
&lt;/h1&gt;

&lt;p&gt;uname -r&lt;/p&gt;

&lt;h1&gt;
  
  
  Show operating system information such as distribution name and version
&lt;/h1&gt;

&lt;p&gt;cat /etc/os-release&lt;/p&gt;

&lt;h1&gt;
  
  
  Show how long the system has been running + load
&lt;/h1&gt;

&lt;p&gt;uptime&lt;/p&gt;

&lt;h1&gt;
  
  
  Show system host name
&lt;/h1&gt;

&lt;p&gt;hostname&lt;/p&gt;

&lt;h1&gt;
  
  
  Display all local IP addresses of the host.
&lt;/h1&gt;

&lt;p&gt;hostname -I&lt;/p&gt;

&lt;h1&gt;
  
  
  Show system reboot history
&lt;/h1&gt;

&lt;p&gt;last reboot&lt;/p&gt;

&lt;h1&gt;
  
  
  Show the current date and time
&lt;/h1&gt;

&lt;p&gt;date&lt;/p&gt;

&lt;h1&gt;
  
  
  Show this month's calendar
&lt;/h1&gt;

&lt;p&gt;cal&lt;/p&gt;

&lt;h1&gt;
  
  
  Display who is online
&lt;/h1&gt;

&lt;p&gt;w&lt;/p&gt;

&lt;h1&gt;
  
  
  Who you are logged in as
&lt;/h1&gt;

&lt;p&gt;whoami&lt;br&gt;
2 – HARDWARE INFORMATION&lt;/p&gt;

&lt;h1&gt;
  
  
  Display messages in kernel ring buffer
&lt;/h1&gt;

&lt;p&gt;dmesg&lt;/p&gt;

&lt;h1&gt;
  
  
  Display CPU information
&lt;/h1&gt;

&lt;p&gt;cat /proc/cpuinfo&lt;/p&gt;

&lt;h1&gt;
  
  
  Display memory information
&lt;/h1&gt;

&lt;p&gt;cat /proc/meminfo&lt;/p&gt;

&lt;h1&gt;
  
  
  Display free and used memory ( -h for human readable, -m for MB, -g for GB.)
&lt;/h1&gt;

&lt;p&gt;free -h&lt;/p&gt;

&lt;h1&gt;
  
  
  Display PCI devices
&lt;/h1&gt;

&lt;p&gt;lspci -tv&lt;/p&gt;

&lt;h1&gt;
  
  
  Display USB devices
&lt;/h1&gt;

&lt;p&gt;lsusb -tv&lt;/p&gt;

&lt;h1&gt;
  
  
  Display DMI/SMBIOS (hardware info) from the BIOS
&lt;/h1&gt;

&lt;p&gt;dmidecode&lt;/p&gt;

&lt;h1&gt;
  
  
  Show info about disk sda
&lt;/h1&gt;

&lt;p&gt;hdparm -i /dev/sda&lt;/p&gt;

&lt;h1&gt;
  
  
  Perform a read speed test on disk sda
&lt;/h1&gt;

&lt;p&gt;hdparm -tT /dev/sda&lt;/p&gt;

&lt;h1&gt;
  
  
  Test for unreadable blocks on disk sda
&lt;/h1&gt;

&lt;p&gt;badblocks -s /dev/sda&lt;br&gt;
3 – PERFORMANCE MONITORING AND STATISTICS&lt;/p&gt;

&lt;h1&gt;
  
  
  Display and manage the top processes
&lt;/h1&gt;

&lt;p&gt;top&lt;/p&gt;

&lt;h1&gt;
  
  
  Interactive process viewer (top alternative)
&lt;/h1&gt;

&lt;p&gt;htop&lt;/p&gt;

&lt;h1&gt;
  
  
  Display processor related statistics
&lt;/h1&gt;

&lt;p&gt;mpstat 1&lt;/p&gt;

&lt;h1&gt;
  
  
  Display virtual memory statistics
&lt;/h1&gt;

&lt;p&gt;vmstat 1&lt;/p&gt;

&lt;h1&gt;
  
  
  Display I/O statistics
&lt;/h1&gt;

&lt;p&gt;iostat 1&lt;/p&gt;

&lt;h1&gt;
  
  
  Display the last 100 syslog messages  (Use /var/log/syslog for Debian based systems.)
&lt;/h1&gt;

&lt;p&gt;tail -100 /var/log/messages&lt;/p&gt;

&lt;h1&gt;
  
  
  Capture and display all packets on interface eth0
&lt;/h1&gt;

&lt;p&gt;tcpdump -i eth0&lt;/p&gt;

&lt;h1&gt;
  
  
  Monitor all traffic on port 80 ( HTTP )
&lt;/h1&gt;

&lt;p&gt;tcpdump -i eth0 'port 80'&lt;/p&gt;

&lt;h1&gt;
  
  
  List all open files on the system
&lt;/h1&gt;

&lt;p&gt;lsof&lt;/p&gt;

&lt;h1&gt;
  
  
  List files opened by user
&lt;/h1&gt;

&lt;p&gt;lsof -u user&lt;/p&gt;

&lt;h1&gt;
  
  
  Display free and used memory ( -h for human readable, -m for MB, -g for GB.)
&lt;/h1&gt;

&lt;p&gt;free -h&lt;/p&gt;

&lt;h1&gt;
  
  
  Execute "df -h", showing periodic updates
&lt;/h1&gt;

&lt;p&gt;watch df -h&lt;br&gt;
4 – USER INFORMATION AND MANAGEMENT&lt;/p&gt;

&lt;h1&gt;
  
  
  Display the user and group ids of your current user.
&lt;/h1&gt;

&lt;p&gt;id&lt;/p&gt;

&lt;h1&gt;
  
  
  Display the last users who have logged onto the system.
&lt;/h1&gt;

&lt;p&gt;last&lt;/p&gt;

&lt;h1&gt;
  
  
  Show who is logged into the system.
&lt;/h1&gt;

&lt;p&gt;who&lt;/p&gt;

&lt;h1&gt;
  
  
  Show who is logged in and what they are doing.
&lt;/h1&gt;

&lt;p&gt;w&lt;/p&gt;

&lt;h1&gt;
  
  
  Create a group named "test".
&lt;/h1&gt;

&lt;p&gt;groupadd test&lt;/p&gt;

&lt;h1&gt;
  
  
  Create an account named john, with a comment of "John Smith" and create the user's home directory.
&lt;/h1&gt;

&lt;p&gt;useradd -c "John Smith" -m john&lt;/p&gt;

&lt;h1&gt;
  
  
  Delete the john account.
&lt;/h1&gt;

&lt;p&gt;userdel john&lt;/p&gt;

&lt;h1&gt;
  
  
  Add the john account to the sales group
&lt;/h1&gt;

&lt;p&gt;usermod -aG sales john&lt;br&gt;
5 – FILE AND DIRECTORY COMMANDS&lt;/p&gt;

&lt;h1&gt;
  
  
  List all files in a long listing (detailed) format
&lt;/h1&gt;

&lt;p&gt;ls -al&lt;/p&gt;

&lt;h1&gt;
  
  
  Display the present working directory
&lt;/h1&gt;

&lt;p&gt;pwd&lt;/p&gt;

&lt;h1&gt;
  
  
  Create a directory
&lt;/h1&gt;

&lt;p&gt;mkdir directory&lt;/p&gt;

&lt;h1&gt;
  
  
  Remove (delete) file
&lt;/h1&gt;

&lt;p&gt;rm file&lt;/p&gt;

&lt;h1&gt;
  
  
  Remove the directory and its contents recursively
&lt;/h1&gt;

&lt;p&gt;rm -r directory&lt;/p&gt;

&lt;h1&gt;
  
  
  Force removal of file without prompting for confirmation
&lt;/h1&gt;

&lt;p&gt;rm -f file&lt;/p&gt;

&lt;h1&gt;
  
  
  Forcefully remove directory recursively
&lt;/h1&gt;

&lt;p&gt;rm -rf directory&lt;/p&gt;

&lt;h1&gt;
  
  
  Copy file1 to file2
&lt;/h1&gt;

&lt;p&gt;cp file1 file2&lt;/p&gt;

&lt;h1&gt;
  
  
  Copy source_directory recursively to destination. If destination exists, copy source_directory into destination, otherwise create destination with the contents of source_directory.
&lt;/h1&gt;

&lt;p&gt;cp -r source_directory destination&lt;/p&gt;

&lt;h1&gt;
  
  
  Rename or move file1 to file2. If file2 is an existing directory, move file1 into directory file2
&lt;/h1&gt;

&lt;p&gt;mv file1 file2&lt;/p&gt;

&lt;h1&gt;
  
  
  Create symbolic link to linkname
&lt;/h1&gt;

&lt;p&gt;ln -s /path/to/file linkname&lt;/p&gt;

&lt;h1&gt;
  
  
  Create an empty file or update the access and modification times of file.
&lt;/h1&gt;

&lt;p&gt;touch file&lt;/p&gt;

&lt;h1&gt;
  
  
  View the contents of file
&lt;/h1&gt;

&lt;p&gt;cat file&lt;/p&gt;

&lt;h1&gt;
  
  
  Browse through a text file
&lt;/h1&gt;

&lt;p&gt;less file&lt;/p&gt;

&lt;h1&gt;
  
  
  Display the first 10 lines of file
&lt;/h1&gt;

&lt;p&gt;head file&lt;/p&gt;

&lt;h1&gt;
  
  
  Display the last 10 lines of file
&lt;/h1&gt;

&lt;p&gt;tail file&lt;/p&gt;

&lt;h1&gt;
  
  
  Display the last 10 lines of file and "follow" the file as it grows.
&lt;/h1&gt;

&lt;p&gt;tail -f file&lt;br&gt;
6 – PROCESS MANAGEMENT&lt;/p&gt;

&lt;h1&gt;
  
  
  Display your currently running processes
&lt;/h1&gt;

&lt;p&gt;ps&lt;/p&gt;

&lt;h1&gt;
  
  
  Display all the currently running processes on the system.
&lt;/h1&gt;

&lt;p&gt;ps -ef&lt;/p&gt;

&lt;h1&gt;
  
  
  Display process information for processname
&lt;/h1&gt;

&lt;p&gt;ps -ef | grep processname&lt;/p&gt;

&lt;h1&gt;
  
  
  Display and manage the top processes
&lt;/h1&gt;

&lt;p&gt;top&lt;/p&gt;

&lt;h1&gt;
  
  
  Interactive process viewer (top alternative)
&lt;/h1&gt;

&lt;p&gt;htop&lt;/p&gt;

&lt;h1&gt;
  
  
  Kill process with process ID of pid
&lt;/h1&gt;

&lt;p&gt;kill pid&lt;/p&gt;

&lt;h1&gt;
  
  
  Kill all processes named processname
&lt;/h1&gt;

&lt;p&gt;killall processname&lt;/p&gt;

&lt;h1&gt;
  
  
  Start program in the background
&lt;/h1&gt;

&lt;p&gt;program &amp;amp;&lt;/p&gt;

&lt;h1&gt;
  
  
  Display stopped or background jobs
&lt;/h1&gt;

&lt;p&gt;bg&lt;/p&gt;

&lt;h1&gt;
  
  
  Brings the most recent background job to foreground
&lt;/h1&gt;

&lt;p&gt;fg&lt;/p&gt;

&lt;h1&gt;
  
  
  Brings job n to the foreground
&lt;/h1&gt;

&lt;p&gt;fg n&lt;br&gt;
7 – FILE PERMISSIONS&lt;br&gt;
Linux chmod example&lt;br&gt;
        PERMISSION      EXAMPLE&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;     U   G   W
    rwx rwx rwx     chmod 777 filename
    rwx rwx r-x     chmod 775 filename
    rwx r-x r-x     chmod 755 filename
    rw- rw- r--     chmod 664 filename
    rw- r-- r--     chmod 644 filename
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;
&lt;h1&gt;
  
  
  NOTE: Use 777 sparingly!
&lt;/h1&gt;
&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;    LEGEND
    U = User
    G = Group
    W = World

    r = Read
    w = write
    x = execute
    - = no access
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;8 – NETWORKING&lt;/p&gt;

&lt;h1&gt;
  
  
  Display all network interfaces and IP address
&lt;/h1&gt;

&lt;p&gt;ip a&lt;/p&gt;

&lt;h1&gt;
  
  
  Display eth0 address and details
&lt;/h1&gt;

&lt;p&gt;ip addr show dev eth0&lt;/p&gt;

&lt;h1&gt;
  
  
  Query or control network driver and hardware settings
&lt;/h1&gt;

&lt;p&gt;ethtool eth0&lt;/p&gt;

&lt;h1&gt;
  
  
  Send ICMP echo request to host
&lt;/h1&gt;

&lt;p&gt;ping host&lt;/p&gt;

&lt;h1&gt;
  
  
  Display whois information for domain
&lt;/h1&gt;

&lt;p&gt;whois domain&lt;/p&gt;

&lt;h1&gt;
  
  
  Display DNS information for domain
&lt;/h1&gt;

&lt;p&gt;dig domain&lt;/p&gt;

&lt;h1&gt;
  
  
  Reverse lookup of IP_ADDRESS
&lt;/h1&gt;

&lt;p&gt;dig -x IP_ADDRESS&lt;/p&gt;

&lt;h1&gt;
  
  
  Display DNS IP address for domain
&lt;/h1&gt;

&lt;p&gt;host domain&lt;/p&gt;

&lt;h1&gt;
  
  
  Display the network address of the host name.
&lt;/h1&gt;

&lt;p&gt;hostname -i&lt;/p&gt;

&lt;h1&gt;
  
  
  Display all local IP addresses of the host.
&lt;/h1&gt;

&lt;p&gt;hostname -I&lt;/p&gt;

&lt;h1&gt;
  
  
  Download &lt;a href="http://domain.com/file" rel="noopener noreferrer"&gt;http://domain.com/file&lt;/a&gt;
&lt;/h1&gt;

&lt;p&gt;wget &lt;a href="http://domain.com/file" rel="noopener noreferrer"&gt;http://domain.com/file&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  Display listening tcp and udp ports and corresponding programs
&lt;/h1&gt;

&lt;p&gt;netstat -nutlp&lt;br&gt;
9 – ARCHIVES (TAR FILES)&lt;/p&gt;

&lt;h1&gt;
  
  
  Create tar named archive.tar containing directory.
&lt;/h1&gt;

&lt;p&gt;tar cf archive.tar directory&lt;/p&gt;

&lt;h1&gt;
  
  
  Extract the contents from archive.tar.
&lt;/h1&gt;

&lt;p&gt;tar xf archive.tar&lt;/p&gt;

&lt;h1&gt;
  
  
  Create a gzip compressed tar file name archive.tar.gz.
&lt;/h1&gt;

&lt;p&gt;tar czf archive.tar.gz directory&lt;/p&gt;

&lt;h1&gt;
  
  
  Extract a gzip compressed tar file.
&lt;/h1&gt;

&lt;p&gt;tar xzf archive.tar.gz&lt;/p&gt;

&lt;h1&gt;
  
  
  Create a tar file with bzip2 compression
&lt;/h1&gt;

&lt;p&gt;tar cjf archive.tar.bz2 directory&lt;/p&gt;

&lt;h1&gt;
  
  
  Extract a bzip2 compressed tar file.
&lt;/h1&gt;

&lt;p&gt;tar xjf archive.tar.bz2&lt;br&gt;
10 – INSTALLING PACKAGES&lt;/p&gt;

&lt;h1&gt;
  
  
  Search for a package by keyword.
&lt;/h1&gt;

&lt;p&gt;yum search keyword&lt;/p&gt;

&lt;h1&gt;
  
  
  Install package.
&lt;/h1&gt;

&lt;p&gt;yum install package&lt;/p&gt;

&lt;h1&gt;
  
  
  Display description and summary information about package.
&lt;/h1&gt;

&lt;p&gt;yum info package&lt;/p&gt;

&lt;h1&gt;
  
  
  Install package from local file named package.rpm
&lt;/h1&gt;

&lt;p&gt;rpm -i package.rpm&lt;/p&gt;

&lt;h1&gt;
  
  
  Remove/uninstall package.
&lt;/h1&gt;

&lt;p&gt;yum remove package&lt;/p&gt;

&lt;h1&gt;
  
  
  Install software from source code.
&lt;/h1&gt;

&lt;p&gt;tar zxvf sourcecode.tar.gz&lt;br&gt;
cd sourcecode&lt;br&gt;
./configure&lt;br&gt;
make&lt;br&gt;
make install&lt;br&gt;
11 – SEARCH&lt;/p&gt;

&lt;h1&gt;
  
  
  Search for pattern in file
&lt;/h1&gt;

&lt;p&gt;grep pattern file&lt;/p&gt;

&lt;h1&gt;
  
  
  Search recursively for pattern in directory
&lt;/h1&gt;

&lt;p&gt;grep -r pattern directory&lt;/p&gt;

&lt;h1&gt;
  
  
  Find files and directories by name
&lt;/h1&gt;

&lt;p&gt;locate name&lt;/p&gt;

&lt;h1&gt;
  
  
  Find files in /home/john that start with "prefix".
&lt;/h1&gt;

&lt;p&gt;find /home/john -name 'prefix*'&lt;/p&gt;

&lt;h1&gt;
  
  
  Find files larger than 100MB in /home
&lt;/h1&gt;

&lt;p&gt;find /home -size +100M&lt;br&gt;
12 – SSH LOGINS&lt;/p&gt;

&lt;h1&gt;
  
  
  Connect to host as your local username.
&lt;/h1&gt;

&lt;p&gt;ssh host&lt;/p&gt;

&lt;h1&gt;
  
  
  Connect to host as user
&lt;/h1&gt;

&lt;p&gt;ssh user@host&lt;/p&gt;

&lt;h1&gt;
  
  
  Connect to host using port
&lt;/h1&gt;

&lt;p&gt;ssh -p port user@host&lt;br&gt;
13 – FILE TRANSFERS&lt;/p&gt;

&lt;h1&gt;
  
  
  Secure copy file.txt to the /tmp folder on server
&lt;/h1&gt;

&lt;p&gt;scp file.txt server:/tmp&lt;/p&gt;

&lt;h1&gt;
  
  
  Copy *.html files from server to the local /tmp folder.
&lt;/h1&gt;

&lt;p&gt;scp server:/var/www/*.html /tmp&lt;/p&gt;

&lt;h1&gt;
  
  
  Copy all files and directories recursively from server to the current system's /tmp folder.
&lt;/h1&gt;

&lt;p&gt;scp -r server:/var/www /tmp&lt;/p&gt;

&lt;h1&gt;
  
  
  Synchronize /home to /backups/home
&lt;/h1&gt;

&lt;p&gt;rsync -a /home /backups/&lt;/p&gt;

&lt;h1&gt;
  
  
  Synchronize files/directories between the local and remote system with compression enabled
&lt;/h1&gt;

&lt;p&gt;rsync -avz /home server:/backups/&lt;br&gt;
14 – DISK USAGE&lt;/p&gt;

&lt;h1&gt;
  
  
  Show free and used space on mounted filesystems
&lt;/h1&gt;

&lt;p&gt;df -h&lt;/p&gt;

&lt;h1&gt;
  
  
  Show free and used inodes on mounted filesystems
&lt;/h1&gt;

&lt;p&gt;df -i&lt;/p&gt;

&lt;h1&gt;
  
  
  Display disks partitions sizes and types
&lt;/h1&gt;

&lt;p&gt;fdisk -l&lt;/p&gt;

&lt;h1&gt;
  
  
  Display disk usage for all files and directories in human readable format
&lt;/h1&gt;

&lt;p&gt;du -ah&lt;/p&gt;

&lt;h1&gt;
  
  
  Display total disk usage off the current directory
&lt;/h1&gt;

&lt;p&gt;du -sh&lt;br&gt;
15 – DIRECTORY NAVIGATION&lt;/p&gt;

&lt;h1&gt;
  
  
  To go up one level of the directory tree.  (Change into the parent directory.)
&lt;/h1&gt;

&lt;p&gt;cd ..&lt;/p&gt;

&lt;h1&gt;
  
  
  Go to the $HOME directory
&lt;/h1&gt;

&lt;p&gt;cd&lt;/p&gt;

&lt;h1&gt;
  
  
  Change to the /etc directory
&lt;/h1&gt;

&lt;p&gt;cd /etc&lt;br&gt;
16 – SECURITY&lt;/p&gt;

&lt;h1&gt;
  
  
  Change the current user's password.
&lt;/h1&gt;

&lt;p&gt;passwd&lt;/p&gt;

&lt;h1&gt;
  
  
  Switch to the root account with root's environment. (Login shell.)
&lt;/h1&gt;

&lt;p&gt;sudo -i&lt;/p&gt;

&lt;h1&gt;
  
  
  Execute your current shell as root. (Non-login shell.)
&lt;/h1&gt;

&lt;p&gt;sudo -s&lt;/p&gt;

&lt;h1&gt;
  
  
  List sudo privileges for the current user.
&lt;/h1&gt;

&lt;p&gt;sudo -l&lt;/p&gt;

&lt;h1&gt;
  
  
  Edit the sudoers configuration file.
&lt;/h1&gt;

&lt;p&gt;visudo&lt;/p&gt;

&lt;h1&gt;
  
  
  Display the current SELinux mode.
&lt;/h1&gt;

&lt;p&gt;getenforce&lt;/p&gt;

&lt;h1&gt;
  
  
  Display SELinux details such as the current SELinux mode, the configured mode, and the loaded policy.
&lt;/h1&gt;

&lt;p&gt;sestatus&lt;/p&gt;

&lt;h1&gt;
  
  
  Change the current SELinux mode to Permissive. (Does not survive a reboot.)
&lt;/h1&gt;

&lt;p&gt;setenforce 0&lt;/p&gt;

&lt;h1&gt;
  
  
  Change the current SELinux mode to Enforcing. (Does not survive a reboot.)
&lt;/h1&gt;

&lt;p&gt;setenforce 1&lt;/p&gt;

&lt;h1&gt;
  
  
  Set the SELinux mode to enforcing on boot by using this setting in the /etc/selinux/config file.
&lt;/h1&gt;

&lt;p&gt;SELINUX=enforcing&lt;/p&gt;

&lt;h1&gt;
  
  
  Set the SELinux mode to permissive on boot by using this setting in the /etc/selinux/config file.
&lt;/h1&gt;

&lt;p&gt;SELINUX=permissive&lt;/p&gt;

&lt;h1&gt;
  
  
  Set the SELinux mode to disabled on boot by using this setting in the /etc/selinux/config file.
&lt;/h1&gt;

&lt;p&gt;SELINUX=disabled&lt;br&gt;
17 – LOGGING AND AUDITING&lt;/p&gt;

&lt;h1&gt;
  
  
  Display messages in kernel ring buffer.
&lt;/h1&gt;

&lt;p&gt;dmesg&lt;/p&gt;

&lt;h1&gt;
  
  
  Display logs stored in the systemd journal.
&lt;/h1&gt;

&lt;p&gt;journalctl&lt;/p&gt;

&lt;h1&gt;
  
  
  Display logs for a specific unit (service).
&lt;/h1&gt;

&lt;p&gt;journalctl -u servicename&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Empower Your Cybersecurity Strategy with These 20 Free SOC Tools</title>
      <dc:creator>Boni Yeamin</dc:creator>
      <pubDate>Wed, 05 Jul 2023 03:17:26 +0000</pubDate>
      <link>https://dev.to/boniyeamincse/empower-your-cybersecurity-strategy-with-these-20-free-soc-tools-4272</link>
      <guid>https://dev.to/boniyeamincse/empower-your-cybersecurity-strategy-with-these-20-free-soc-tools-4272</guid>
      <description>&lt;p&gt;Introduction:&lt;br&gt;
In today's interconnected world, maintaining a robust cybersecurity posture is vital for organizations of all sizes. Security Operations Centers (SOCs) play a crucial role in monitoring, detecting, and responding to security incidents. However, building an effective SOC can be costly, especially for smaller businesses. Fortunately, there are several free SOC tools available that can help strengthen your cybersecurity defenses without straining your budget. In this article, we will explore 20 free SOC tools that can enhance your security operations on a platform like LinkedIn. Let's dive in!&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwdom9fh6v7a1jzerg9pp.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwdom9fh6v7a1jzerg9pp.png" alt="Image description" width="800" height="450"&gt;&lt;/a&gt;&lt;br&gt;
Security Onion:&lt;br&gt;
Security Onion provides a suite of open-source tools for network security monitoring and intrusion detection. It includes tools like Suricata, Zeek, and Elasticsearch, making it a valuable asset for SOC teams.&lt;/p&gt;

&lt;p&gt;Wireshark:&lt;br&gt;
Wireshark is a widely-used network protocol analyzer. It helps SOC analysts inspect network traffic and identify potential security threats.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Snort:&lt;/strong&gt;&lt;br&gt;
Snort is an open-source network intrusion prevention system. It detects and prevents various types of attacks, including network-based exploits and malware.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;OSSEC:&lt;/strong&gt;&lt;br&gt;
OSSEC is an open-source host-based intrusion detection system. It monitors logs and alerts SOC teams about potential security incidents on individual systems.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;OpenVAS:&lt;/strong&gt;&lt;br&gt;
OpenVAS (Open Vulnerability Assessment System) is a comprehensive vulnerability scanner. It scans your network, identifies vulnerabilities, and provides detailed reports.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Wazuh:&lt;/strong&gt;&lt;br&gt;
Wazuh is an open-source security monitoring platform. It combines OSSEC with advanced analytics and threat intelligence capabilities.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;ELK Stack:&lt;/strong&gt;&lt;br&gt;
The ELK Stack (Elasticsearch, Logstash, and Kibana) is a powerful log management and analysis platform. It enables SOC teams to collect, analyze, and visualize log data efficiently.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Moloch:&lt;/strong&gt;&lt;br&gt;
Moloch is a large-scale, open-source packet-capturing and indexing tool. It assists in the analysis and storage of network traffic data for future investigations.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Suricata:&lt;/strong&gt;&lt;br&gt;
Suricata is a high-performance, open-source intrusion detection and prevention system. It detects and alerts SOC teams about suspicious network activity.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;MISP:&lt;/strong&gt;&lt;br&gt;
MISP (Malware Information Sharing Platform) is an open-source threat intelligence platform. It allows SOC teams to share and collaborate on threat intelligence data.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;TheHive:&lt;/strong&gt;&lt;br&gt;
TheHive is an open-source incident response platform. It helps SOC teams manage and investigate security incidents effectively.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cuckoo Sandbox:&lt;/strong&gt;&lt;br&gt;
Cuckoo Sandbox is an open-source malware analysis system. It allows SOC analysts to safely execute suspicious files and observe their behavior in a controlled environment.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;OpenIOC:&lt;/strong&gt;&lt;br&gt;
OpenIOC (Open Indicators of Compromise) is a format for sharing threat intelligence indicators. It enables SOC teams to exchange and utilize actionable intelligence.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;MISP-Dashboard:&lt;/strong&gt;&lt;br&gt;
MISP Dashboard provides a visual representation of threat intelligence data from the MISP platform. It helps SOC teams gain insights into current and emerging threats.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cyphon:&lt;/strong&gt;&lt;br&gt;
Cyphon is an open-source incident management and response platform. It centralizes and streamlines the incident response process for SOC teams.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Aanval:&lt;/strong&gt;&lt;br&gt;
Aanval is a free and open-source intrusion detection and prevention system. It provides real-time threat intelligence and comprehensive reporting capabilities.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Snorby:&lt;/strong&gt;&lt;br&gt;
Snorby is a web-based interface for managing Snort intrusion detection system alerts. It simplifies the analysis and reporting of network security events.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Suricata-Update:&lt;/strong&gt;&lt;br&gt;
Suricata-Update automates the process of updating Suricata rules. It ensures that your intrusion detection system remains up to date with the latest threat intelligence.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Wazuh Ruleset:&lt;/strong&gt;&lt;br&gt;
Wazuh Ruleset is a collection of rules for the Wazuh security monitoring platform. It enhances the detection capabilities of Wazuh by incorporating additional threat intelligence.z&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;BRO IDS:&lt;/strong&gt;&lt;br&gt;
BRO IDS (Intrusion Detection System) is an open-source network security monitor. It provides real-time visibility into network traffic and helps SOC teams identify potential threats.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Conclusion:&lt;/strong&gt;&lt;br&gt;
Building a strong SOC doesn't have to be an expensive endeavor. These 20 free SOC tools provide a solid foundation for enhancing your cybersecurity capabilities on a limited budget. From network monitoring to incident response and threat intelligence, each tool brings unique functionality to bolster your defense against cyber threats. Incorporate these tools into your SOC arsenal, and leverage the power of open-source software to protect your organization's critical assets. Remember, cybersecurity is a continuous process, and regularly updating and evolving your SOC toolset is essential to stay ahead of emerging threats.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>siem</category>
      <category>soc</category>
      <category>wazuh</category>
    </item>
    <item>
      <title>How To Become A Cybersecurity Engineer ?</title>
      <dc:creator>Boni Yeamin</dc:creator>
      <pubDate>Tue, 16 May 2023 02:08:37 +0000</pubDate>
      <link>https://dev.to/boniyeamincse/how-to-become-a-cybersecurity-engineer--1l0l</link>
      <guid>https://dev.to/boniyeamincse/how-to-become-a-cybersecurity-engineer--1l0l</guid>
      <description>&lt;p&gt;Becoming a cybersecurity engineer involves acquiring a combination of education, skills, and experience. Here are the general steps you can follow to pursue a career in cybersecurity engineering:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Obtain a formal education:&lt;/strong&gt; Earn a bachelor's degree in computer science, information technology, cybersecurity, or a related field. A degree provides a strong foundation in the principles of computer systems, networks, and security.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Gain foundational knowledge:&lt;/strong&gt; Acquire a solid understanding of computer systems, networking, operating systems, programming languages, and databases. Familiarize yourself with concepts like encryption, secure coding practices, risk management, and vulnerability assessment.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Pursue specialized certifications:&lt;/strong&gt; Earning industry-recognized certifications can enhance your credibility and demonstrate your expertise. Consider certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Information Security Manager (CISM), and CompTIA Security+.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Develop technical skills:&lt;/strong&gt; Acquire proficiency in various technical areas relevant to cybersecurity engineering. These may include network security, application security, cloud security, cryptography, incident response, penetration testing, and security assessments.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Gain practical experience:&lt;/strong&gt; Look for opportunities to gain hands-on experience in cybersecurity. Consider internships, entry-level positions, or volunteer work in IT or security departments. Participate in Capture the Flag (CTF) competitions and join cybersecurity clubs or organizations to further develop your skills.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Stay updated with the latest trends:&lt;/strong&gt; Cybersecurity is a rapidly evolving field, so it's important to stay informed about the latest threats, vulnerabilities, and security technologies. Follow industry news, attend conferences, and engage with online communities to stay up to date.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Build a professional net&lt;/strong&gt;work: Networking is crucial in any career. Attend cybersecurity events, join professional associations, and connect with industry professionals. Networking can lead to job opportunities and provide mentorship from experienced cybersecurity engineers.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Consider advanced degrees:&lt;/strong&gt; Pursuing a master's degree or higher in cybersecurity or a related field can enhance your knowledge and open up higher-level positions in the field. Advanced degrees often provide specialized knowledge in areas like digital forensics, secure software development, or network security.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Develop soft skills:&lt;/strong&gt; Effective communication, problem-solving, and teamwork are essential in a cybersecurity career. Work on developing these skills along with critical thinking, attention to detail, and the ability to handle pressure.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Apply for cybersecurity positions:&lt;/strong&gt; Start applying for cybersecurity engineer roles once you have developed the necessary skills and qualifications. Tailor your resume and cover letter to highlight your relevant experience and certifications. Consider building a portfolio showcasing your projects and contributions to the cybersecurity field.&lt;/p&gt;

&lt;p&gt;Remember, the path to becoming a cybersecurity engineer requires continuous learning and adapting to new technologies and threats. It's important to stay proactive, hone your skills, and remain passionate about cybersecurity to excel in this field.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Linux Commands Cheat Sheet</title>
      <dc:creator>Boni Yeamin</dc:creator>
      <pubDate>Tue, 16 May 2023 02:02:57 +0000</pubDate>
      <link>https://dev.to/boniyeamincse/linux-commands-cheat-sheet-41e2</link>
      <guid>https://dev.to/boniyeamincse/linux-commands-cheat-sheet-41e2</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0qxj3ebsn6dnklpalbvv.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0qxj3ebsn6dnklpalbvv.png" alt="Image description" width="800" height="1131"&gt;&lt;/a&gt;1. cd — Change directory&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;ls — List directory contents&lt;/li&gt;
&lt;li&gt;pwd — Print working directory&lt;/li&gt;
&lt;li&gt;cat — Concatenate and display files&lt;/li&gt;
&lt;li&gt;touch — Create an empty file&lt;/li&gt;
&lt;li&gt;cp — Copy files and directories&lt;/li&gt;
&lt;li&gt;mv — Move or rename files and directories&lt;/li&gt;
&lt;li&gt;rm — Remove files and directories&lt;/li&gt;
&lt;li&gt;mkdir — Create a new directory&lt;/li&gt;
&lt;li&gt;rmdir — Remove an empty directory&lt;/li&gt;
&lt;li&gt;cut — Cut out sections of a file&lt;/li&gt;
&lt;li&gt;gzip — Compress or decompress files using gzip&lt;/li&gt;
&lt;li&gt;gunzip — Decompress files compressed with gzip&lt;/li&gt;
&lt;li&gt;find — Find files and directories matching a pattern&lt;/li&gt;
&lt;li&gt;grep — Search for a pattern in a file&lt;/li&gt;
&lt;li&gt;awk — Pattern scanning and processing language&lt;/li&gt;
&lt;li&gt;sed — Stream editor for filtering and transforming text&lt;/li&gt;
&lt;li&gt;head — Display the first few lines of a file&lt;/li&gt;
&lt;li&gt;tail — Display the last few lines of a file&lt;/li&gt;
&lt;li&gt;sort — Sort lines of a file&lt;/li&gt;
&lt;li&gt;uniq — Remove duplicate lines from a file&lt;/li&gt;
&lt;li&gt;wc — Count lines, words, and characters in a file&lt;/li&gt;
&lt;li&gt;diff — Compare two files line by line&lt;/li&gt;
&lt;li&gt;patch — Apply a patch to a file&lt;/li&gt;
&lt;li&gt;chmod — Change permissions of files and directories&lt;/li&gt;
&lt;li&gt;chown — Change the owner of a file or directory&lt;/li&gt;
&lt;li&gt;chgrp — Change the group ownership of a file or directory&lt;/li&gt;
&lt;li&gt;ps — List running processes&lt;/li&gt;
&lt;li&gt;top — Display system resource usage and process information&lt;/li&gt;
&lt;li&gt;kill — Send a signal to a process to terminate it&lt;/li&gt;
&lt;li&gt;du — Display disk usage of files and directories&lt;/li&gt;
&lt;li&gt;df — Display free disk space on the file system&lt;/li&gt;
&lt;li&gt;mount — Mount a file system&lt;/li&gt;
&lt;li&gt;umount — Unmount a file system&lt;/li&gt;
&lt;li&gt;ping — Test connectivity to a network host&lt;/li&gt;
&lt;li&gt;ssh — Secure shell remote login and command execution&lt;/li&gt;
&lt;li&gt;scp — Secure copy files between hosts&lt;/li&gt;
&lt;li&gt;rsync — Remote file and directory synchronization&lt;/li&gt;
&lt;li&gt;curl — Transfer data from or to a server using various protocols&lt;/li&gt;
&lt;li&gt;wget — Retrieve files from the web using various protocols&lt;/li&gt;
&lt;li&gt;ftp — File Transfer Protocol client&lt;/li&gt;
&lt;li&gt;sftp — Secure File Transfer Protocol client&lt;/li&gt;
&lt;li&gt;telnet — Telnet client&lt;/li&gt;
&lt;li&gt;nslookup — DNS lookup utility&lt;/li&gt;
&lt;li&gt;dig — DNS lookup utility&lt;/li&gt;
&lt;li&gt;netstat — Display network connections and statistics&lt;/li&gt;
&lt;li&gt;ifconfig — Configure network interfaces&lt;/li&gt;
&lt;li&gt;route — Display or modify the routing table&lt;/li&gt;
&lt;li&gt;iptables — Firewall and packet filtering utility&lt;/li&gt;
&lt;li&gt;hostname — Display or set the hostname of the system&lt;/li&gt;
&lt;li&gt;date — Display or set the system date and time&lt;/li&gt;
&lt;li&gt;timedatectl — Control the system date and time&lt;/li&gt;
&lt;li&gt;uname — Display system information&lt;/li&gt;
&lt;li&gt;whoami — Display the current user ID&lt;/li&gt;
&lt;li&gt;id — Display user and group information&lt;/li&gt;
&lt;li&gt;su — Switch user to become another user&lt;/li&gt;
&lt;li&gt;sudo — Execute a command with superuser privileges&lt;/li&gt;
&lt;li&gt;passwd — Change the password of a user account&lt;/li&gt;
&lt;li&gt;useradd — Create a new user account&lt;/li&gt;
&lt;li&gt;userdel — Delete a user account&lt;/li&gt;
&lt;li&gt;usermod — Modify a user account&lt;/li&gt;
&lt;li&gt;groupadd — Create a new group&lt;/li&gt;
&lt;li&gt;groupdel — Delete a group&lt;/li&gt;
&lt;li&gt;groupmod — Modify a group&lt;/li&gt;
&lt;li&gt;finger — Display information about users on the system&lt;/li&gt;
&lt;li&gt;last — Display information about recent logins&lt;/li&gt;
&lt;li&gt;history — Display command history&lt;/li&gt;
&lt;li&gt;echo — Print a message to the terminal&lt;/li&gt;
&lt;li&gt;printf — Format and print data&lt;/li&gt;
&lt;li&gt;lshw — Displays hardware information&lt;/li&gt;
&lt;li&gt;lspci — Displays information about PCI buses and devices.&lt;/li&gt;
&lt;li&gt;lsusb — Displays information about USB buses and devices.&lt;/li&gt;
&lt;li&gt;hwinfo — Displays detailed hardware information.&lt;/li&gt;
&lt;li&gt;free — Displays memory usage.&lt;/li&gt;
&lt;li&gt;vmstat — Displays system memory, processor, and I/O statistics.&lt;/li&gt;
&lt;li&gt;iostat — Displays CPU and disk I/O statistics.&lt;/li&gt;
&lt;li&gt;uptime — Displays system uptime and load averages.&lt;/li&gt;
&lt;li&gt;journalctl — Displays the system journal.&lt;/li&gt;
&lt;li&gt;dmesg — Displays the kernel ring buffer.&lt;/li&gt;
&lt;li&gt;crontab — Schedules recurring tasks.&lt;/li&gt;
&lt;li&gt;at — Schedules a one-time task.&lt;/li&gt;
&lt;li&gt;service — Manages system services.&lt;/li&gt;
&lt;li&gt;systemctl — Controls system services in systemd-based distributions.&lt;/li&gt;
&lt;li&gt;traceroute — Traces the network path to a remote host.&lt;/li&gt;
&lt;li&gt;bzip2 — Compresses files using the bzip2 algorithm.&lt;/li&gt;
&lt;li&gt;unzip — Extracts files from a ZIP archive.&lt;/li&gt;
&lt;li&gt;tee — Redirect output to multiple files&lt;/li&gt;
&lt;li&gt;chroot — Change the root directory for a process&lt;/li&gt;
&lt;li&gt;ps aux — Display information about all running processes&lt;/li&gt;
&lt;li&gt;less — Display file contents in a paginated format&lt;/li&gt;
&lt;li&gt;more — Display file contents one page at a time&lt;/li&gt;
&lt;li&gt;ln — Create links between files&lt;/li&gt;
&lt;li&gt;realpath — Print the resolved absolute path of a file&lt;/li&gt;
&lt;li&gt;watch — Execute a command periodically and display the output&lt;/li&gt;
&lt;li&gt;cal — Display a calendar&lt;/li&gt;
&lt;li&gt;tar -xzvf — Extract files from a compressed archive&lt;/li&gt;
&lt;li&gt;tar -czvf — Create a compressed archive&lt;/li&gt;
&lt;li&gt;whereis — Locate the binary, source, and manual page files for a command&lt;/li&gt;
&lt;li&gt;locate — Find files by name&lt;/li&gt;
&lt;li&gt;which — Display the full path to an executable&lt;/li&gt;
&lt;li&gt;21&lt;/li&gt;
&lt;/ol&gt;

</description>
    </item>
    <item>
      <title>📝 Ansible for Blue Team - Use Cases💥</title>
      <dc:creator>Boni Yeamin</dc:creator>
      <pubDate>Fri, 12 May 2023 17:06:04 +0000</pubDate>
      <link>https://dev.to/boniyeamincse/ansible-for-blue-team-use-cases-441k</link>
      <guid>https://dev.to/boniyeamincse/ansible-for-blue-team-use-cases-441k</guid>
      <description>&lt;p&gt;🟢  FREE Resources&lt;br&gt;
📌 FREE COURSE - Security Analyst Career - 90 days Blueprint&lt;br&gt;
🔗 &lt;a href="https://lnkd.in/de_ZVvQc" rel="noopener noreferrer"&gt;https://lnkd.in/de_ZVvQc&lt;/a&gt;&lt;br&gt;
📌 Zero to CyberHero: Security Analyst Career Guide &lt;br&gt;
🔗 &lt;a href="https://lnkd.in/dC-nkQfu" rel="noopener noreferrer"&gt;https://lnkd.in/dC-nkQfu&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;🟢 Pre-requisites&lt;br&gt;
📌 Basics of Ansible in 10 points &lt;a href="https://lnkd.in/diZv4cei" rel="noopener noreferrer"&gt;https://lnkd.in/diZv4cei&lt;/a&gt;&lt;br&gt;
📌 Ansible Security Ecosystem &lt;a href="https://lnkd.in/d9KBWJiB" rel="noopener noreferrer"&gt;https://lnkd.in/d9KBWJiB&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;🟢 Ansible Popular Use Cases(Playbooks)&lt;br&gt;
📌 Ansible for Cisco ASA &lt;a href="https://lnkd.in/dwGPVvtE" rel="noopener noreferrer"&gt;https://lnkd.in/dwGPVvtE&lt;/a&gt;&lt;br&gt;
📌 Ansible for CyberArk &lt;a href="https://lnkd.in/d84bnCyv" rel="noopener noreferrer"&gt;https://lnkd.in/d84bnCyv&lt;/a&gt;&lt;br&gt;
📌 Ansible for IBM QRadar &lt;a href="https://lnkd.in/dRYK8gvQ" rel="noopener noreferrer"&gt;https://lnkd.in/dRYK8gvQ&lt;/a&gt;&lt;br&gt;
📌 Ansible for Palo Alto Networks &lt;a href="https://lnkd.in/dHxsUDJ2" rel="noopener noreferrer"&gt;https://lnkd.in/dHxsUDJ2&lt;/a&gt;&lt;br&gt;
📌 Ansible for Splunk &lt;a href="https://lnkd.in/dGTGu6vT" rel="noopener noreferrer"&gt;https://lnkd.in/dGTGu6vT&lt;/a&gt;&lt;br&gt;
📌 Ansible for Snort IPS &lt;a href="https://lnkd.in/dbzhPyww" rel="noopener noreferrer"&gt;https://lnkd.in/dbzhPyww&lt;/a&gt;&lt;br&gt;
📌 Ansible for Barracuda WAF &lt;a href="https://lnkd.in/drUpNNpS" rel="noopener noreferrer"&gt;https://lnkd.in/drUpNNpS&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Open source Network Monitoring Tools for Home-Lab</title>
      <dc:creator>Boni Yeamin</dc:creator>
      <pubDate>Sun, 07 May 2023 18:13:27 +0000</pubDate>
      <link>https://dev.to/boniyeamincse/open-source-network-monitoring-tools-for-home-lab-3p23</link>
      <guid>https://dev.to/boniyeamincse/open-source-network-monitoring-tools-for-home-lab-3p23</guid>
      <description>&lt;p&gt;👉🏼When it comes to network monitoring tools for your home lab, open-source options provide great flexibility, customization, and cost-effectiveness. Here's a list of open-source network monitoring tools that can help you monitor and manage your home network effectively:&lt;/p&gt;

&lt;p&gt;🟢 Pre-requisites&lt;br&gt;
📌 What is SNMP? &lt;a href="https://lnkd.in/dQ_NbxDH" rel="noopener noreferrer"&gt;https://lnkd.in/dQ_NbxDH&lt;/a&gt;&lt;br&gt;
📌 Download VMware &lt;a href="https://lnkd.in/d6gGFUYA" rel="noopener noreferrer"&gt;https://lnkd.in/d6gGFUYA&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;🎯Nagios Core: Nagios is a popular and powerful network monitoring tool. Nagios Core is the open-source version that allows you to monitor network services, hosts, and their availability. It provides alerting, notification, and reporting features, making it an excellent choice for monitoring your home lab.&lt;br&gt;
🔗 &lt;a href="https://lnkd.in/dXmGUSkm" rel="noopener noreferrer"&gt;https://lnkd.in/dXmGUSkm&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;🎯Zabbix: Zabbix is a feature-rich network monitoring solution that offers real-time monitoring, alerting, and visualization capabilities. It can monitor various network devices, servers, applications, and services. Zabbix has a user-friendly interface and provides extensive reporting options.&lt;br&gt;
🔗 &lt;a href="https://lnkd.in/d8-qTMa5" rel="noopener noreferrer"&gt;https://lnkd.in/d8-qTMa5&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;🎯Cacti: Cacti is a web-based network monitoring and graphing tool. It uses the Simple Network Management Protocol (SNMP) to monitor and graph network devices' performance. Cacti offers customizable templates and can generate visual graphs and reports for network bandwidth utilization, CPU load, memory usage, and more.&lt;br&gt;
🔗&lt;a href="https://www.cacti.net/" rel="noopener noreferrer"&gt;https://www.cacti.net/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;🎯LibreNMS: Built on the foundations of Observium, LibreNMS is an open-source network monitoring and autodiscovery tool. It can monitor a wide range of devices, including routers, switches, servers, and wireless controllers. LibreNMS offers intuitive dashboards, alerting, and graphing capabilities.&lt;br&gt;
🔗 &lt;a href="https://lnkd.in/dQZucJar" rel="noopener noreferrer"&gt;https://lnkd.in/dQZucJar&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;🎯Icinga: Icinga is a scalable and extensible open-source monitoring tool. It provides monitoring for hosts, services, and network components. Icinga offers advanced features like distributed monitoring, parallelized service checks, and robust alerting capabilities.&lt;br&gt;
🔗 &lt;a href="https://lnkd.in/dFrHrMSR" rel="noopener noreferrer"&gt;https://lnkd.in/dFrHrMSR&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;🎯NetXMS: NetXMS is a comprehensive network and infrastructure monitoring system. It offers performance monitoring, event management, and fault management capabilities. NetXMS supports agentless monitoring, SNMP, and customs agent deployment for monitoring various devices and services.&lt;br&gt;
🔗&lt;a href="https://netxms.com/" rel="noopener noreferrer"&gt;https://netxms.com/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;🎯Observium: Observium is an SNMP-based network monitoring and management platform. It provides automatic discovery, visualization, and monitoring of network devices, servers, and applications. Observium offers a user-friendly interface and includes advanced features like billing integration and traffic analysis.&lt;br&gt;
🔗&lt;a href="https://www.observium.org/" rel="noopener noreferrer"&gt;https://www.observium.org/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;🎯OpenNMS: OpenNMS is a feature-rich enterprise-grade network management and monitoring platform. It offers fault management, performance measurement, and event correlation capabilities. OpenNMS supports various protocols and can monitor a wide range of devices and services.&lt;br&gt;
🔗&lt;a href="https://www.opennms.com/" rel="noopener noreferrer"&gt;https://www.opennms.com/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;🎯Prometheus: Prometheus is a popular open-source monitoring and alerting toolkit. It focuses on time-series-based monitoring, providing powerful querying and alerting capabilities. Prometheus is highly customizable and can be integrated with other tools and frameworks.&lt;br&gt;
🔗&lt;a href="https://prometheus.io/" rel="noopener noreferrer"&gt;https://prometheus.io/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;🎯Grafana: Although not a network monitoring tool itself, Grafana is a widely used open-source platform for visualizing and analyzing monitoring data. It can integrate with various monitoring systems, including many of the tools mentioned above. Grafana provides customizable dashboards and advanced data visualization options.&lt;br&gt;
🔗&lt;a href="https://grafana.com/" rel="noopener noreferrer"&gt;https://grafana.com/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;These open-source network monitoring tools offer a wide range of features and capabilities to monitor and manage your home lab effectively. Choose the one that aligns with your requirements, skill set, and preferences, and enjoy the benefits of robust network monitoring in your home environment.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Top 6 websites to practice hands-on Cybersecurity</title>
      <dc:creator>Boni Yeamin</dc:creator>
      <pubDate>Mon, 13 Mar 2023 11:11:47 +0000</pubDate>
      <link>https://dev.to/boniyeamincse/top-6-websites-to-practice-hands-on-cybersecurity-4h0j</link>
      <guid>https://dev.to/boniyeamincse/top-6-websites-to-practice-hands-on-cybersecurity-4h0j</guid>
      <description>&lt;p&gt;Here are 6 websites to practice hands-on Cybersecurity.&lt;/p&gt;

&lt;p&gt;1.) Letsdefend -&lt;br&gt;
🔗 &lt;a href="https://letsdefend.io/" rel="noopener noreferrer"&gt;https://letsdefend.io/&lt;/a&gt;&lt;br&gt;
LetsDefend helps you build a blue team career with hands-on experience by investigating real cyber attacks inside a simulated SOC.&lt;/p&gt;

&lt;p&gt;2.) TryHackMe -&lt;br&gt;
🔗 &lt;a href="https://tryhackme.com/" rel="noopener noreferrer"&gt;https://tryhackme.com/&lt;/a&gt;&lt;br&gt;
TryHackMe provides virtual labs and challenges that simulate real-world scenarios and cover various topics such as penetration testing, web application security, and more.&lt;/p&gt;

&lt;p&gt;3.) HackTheBox -&lt;br&gt;
🔗 &lt;a href="https://tryhackme.com/" rel="noopener noreferrer"&gt;https://tryhackme.com/&lt;/a&gt;&lt;br&gt;
HackTheBox - Dr. AITH offers a range of challenges that simulate real-world scenarios and cover various topics such as cryptography, steganography, reverse engineering, and more.&lt;/p&gt;

&lt;p&gt;4.) CyberDefenders -&lt;br&gt;
🔗 &lt;a href="https://lnkd.in/dffH8AgY" rel="noopener noreferrer"&gt;https://lnkd.in/dffH8AgY&lt;/a&gt;&lt;br&gt;
CyberDefenders is an online platform that provides hands-on experience in various areas of cybersecurity such as web application security, network security, and more. It offers virtual labs and challenges that simulate real-world scenarios .&lt;/p&gt;

&lt;p&gt;5.) Hacker101 -&lt;br&gt;
🔗 &lt;a href="https://www.hacker101.com/" rel="noopener noreferrer"&gt;https://www.hacker101.com/&lt;/a&gt;&lt;br&gt;
Hacker101 provides various hands-on exercises and challenges related to web application security, network security, and cryptography.&lt;/p&gt;

&lt;p&gt;6) PentesterLab -&lt;br&gt;
🔗 &lt;a href="https://pentesterlab.com/" rel="noopener noreferrer"&gt;https://pentesterlab.com/&lt;/a&gt;&lt;br&gt;
PentesterLab is a platform that offers various exercises and challenges to help users learn web application security. It provides hands-on experience in identifying and exploiting vulnerabilities in web applications.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Learning Path! Cybersecurity .</title>
      <dc:creator>Boni Yeamin</dc:creator>
      <pubDate>Wed, 21 Dec 2022 06:08:24 +0000</pubDate>
      <link>https://dev.to/boniyeamincse/learning-path-cybersecurity--5e6n</link>
      <guid>https://dev.to/boniyeamincse/learning-path-cybersecurity--5e6n</guid>
      <description>&lt;p&gt;Nowdays, &lt;strong&gt;Cyber Security&lt;/strong&gt;, &lt;strong&gt;Ethical Hacking&lt;/strong&gt;, &lt;strong&gt;Application Security&lt;/strong&gt;, &lt;strong&gt;Penetration Testing&lt;/strong&gt;, &lt;strong&gt;Bug Bounties&lt;/strong&gt;, etc., these career options are blooming and becoming popular among teenagers, scholars, experienced professionals, etc. globally. The reason for this popularity is surely the growing community, increased attacks, and need for skilled professionals.&lt;/p&gt;

&lt;p&gt;In the beginner the common questions facing Where should &lt;strong&gt;I start from?&lt;/strong&gt; &lt;strong&gt;What should I learn first?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The above mindmap breaks down Cyber Security career options in three major domains Offensive, Defensive &amp;amp; Research.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Defensive&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Security Operation CEnter (SOC)&lt;/li&gt;
&lt;li&gt;Blue Teamer&lt;/li&gt;
&lt;li&gt;Cyber Forensics&lt;/li&gt;
&lt;li&gt;Cyber Compliance &amp;amp; Risk Activitices&lt;/li&gt;
&lt;li&gt;Secure Software Developer &lt;/li&gt;
&lt;li&gt;Security Acchicture&lt;/li&gt;
&lt;li&gt;Inciednt Response (IR)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;** Defensive **&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8l0boeqphlr4mtx69qc3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8l0boeqphlr4mtx69qc3.png" alt="Image description" width="800" height="503"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Application Security Expart&lt;/li&gt;
&lt;li&gt;Red Teamer&lt;/li&gt;
&lt;li&gt;Penetration tester&lt;/li&gt;
&lt;li&gt;Bug Hunter&lt;/li&gt;
&lt;li&gt;Cloud Auditor&lt;/li&gt;
&lt;li&gt;Code Reviewer&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Research&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Threat Analylysist&lt;/li&gt;
&lt;li&gt;Malware analysis&lt;/li&gt;
&lt;li&gt;Security Trend Analysis&lt;/li&gt;
&lt;li&gt;Zero day &amp;amp; Expolit&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Offensive Cyber Security Career Path&lt;/strong&gt;&lt;br&gt;
When we talk about getting started into Offensive Cyber Security, there are many domains such as Application Security, Red Teaming, Penetration Testing, Code Reviews, Cloud Audits, etc. However, there are always some initial requirements and at the end of the day, everything is linked somehow.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Pre-requisite:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Good understanding of how Computer System Works&lt;br&gt;
Good understanding of how the Internet works and how to use it&lt;br&gt;
Mindset &amp;amp; Rythm — You must enjoy what you are doing!!!&lt;/p&gt;

&lt;p&gt;Resources to learn about Operating Systems:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Linux Basics: &lt;a href="https://linuxjourney.com/" rel="noopener noreferrer"&gt;https://linuxjourney.com/&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Android Basics: &lt;a href="https://www.educba.com/android-operating-system/" rel="noopener noreferrer"&gt;https://www.educba.com/android-operating-system/&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Windows Basics: &lt;a href="https://www.educba.com/introduction-to-windows/" rel="noopener noreferrer"&gt;https://www.educba.com/introduction-to-windows/&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Operating System Basics: &lt;a href="https://www.tutorialspoint.com/operating_system/index.htm" rel="noopener noreferrer"&gt;https://www.tutorialspoint.com/operating_system/index.htm&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Learning about Computer Networks&lt;/strong&gt;&lt;br&gt;
As a security professional, you must know basic concepts of networking which include knowing how Routing, Firewalling, SSL, TLS, Ports, Protocols, IP, TCP, UDP, MAC, and other important network security features work. Why this knowledge is required doesn’t need any explanation itself, it’s essential, that’s all.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Resources to learn Computer Networks&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.tutorialspoint.com/data_communication_computer_network/index.htm" rel="noopener noreferrer"&gt;https://www.tutorialspoint.com/data_communication_computer_network/index.htm&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.tutorialspoint.com/network_security/index.htm" rel="noopener noreferrer"&gt;https://www.tutorialspoint.com/network_security/index.htm&lt;/a&gt;&lt;br&gt;
Cryptography &amp;amp; Network Security (McGraw-Hill Forouzan Networking)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Learning about Web Applications&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Resources to learn Basic Concepts&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;About HTTP: &lt;a href="https://developer.mozilla.org/en-US/docs/Web/HTTP" rel="noopener noreferrer"&gt;https://developer.mozilla.org/en-US/docs/Web/HTTP&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;HTTP Headers: &lt;a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers" rel="noopener noreferrer"&gt;https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;HTTP Security: &lt;a href="https://developer.mozilla.org/en-US/docs/Web/Security" rel="noopener noreferrer"&gt;https://developer.mozilla.org/en-US/docs/Web/Security&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Content-Security Policy: &lt;a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP" rel="noopener noreferrer"&gt;https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;HTTP Cookies: &lt;a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies#Secure_and_HttpOnly_cookies" rel="noopener noreferrer"&gt;https://developer.mozilla.org/en-US/docs/Web/HTTP/Cookies#Secure_and_HttpOnly_cookies&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Web Security Cheatsheet: &lt;a href="https://infosec.mozilla.org/guidelines/web_security" rel="noopener noreferrer"&gt;https://infosec.mozilla.org/guidelines/web_security&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Cross-Origin Resource Sharing: &lt;a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS" rel="noopener noreferrer"&gt;https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Understanding Common Security Frameworks&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;OWASP Web Top 10: &lt;a href="https://owasp.org/www-project-top-ten/" rel="noopener noreferrer"&gt;https://owasp.org/www-project-top-ten/&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;OWASP API Top 10: &lt;a href="https://owasp.org/www-project-api-security/" rel="noopener noreferrer"&gt;https://owasp.org/www-project-api-security/&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;OWASP Mobile Top 10: &lt;a href="https://owasp.org/www-project-mobile-top-10/" rel="noopener noreferrer"&gt;https://owasp.org/www-project-mobile-top-10/&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;OWASP ASVS: &lt;a href="https://owasp.org/www-project-application-security-verification-standard/" rel="noopener noreferrer"&gt;https://owasp.org/www-project-application-security-verification-standard/&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Getting Started with Web Application Security&lt;/strong&gt;&lt;br&gt;
At this point, we will talk about how to get started in Web Application Security. There are tons of resources out there in the wild and it is not possible to learn/read all of them, however, choosing the best ones is also a difficult task. I am sharing some of the good resources to follow in order to get a good hold:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;OWASP Testing Guide&lt;/strong&gt; explaining a wide range of security issues and how to test for them. This should be the initial reference guide to know and explore various security vulnerabilities.&lt;br&gt;
&lt;strong&gt;PortSwigger Web Security Academy&lt;/strong&gt; is the practical version of Web Application Hacker’s Handbook. You will get good learning resources (short and crisp) followed by Labs to master the things you are learning.&lt;br&gt;
&lt;strong&gt;Bugcrowd Vulnerability&lt;/strong&gt; Rating Taxonomy talks about multiple security issues and an associated severity with them. This is also a helpful resource to know multiple security issues.&lt;br&gt;
OWASP Juice Shop is a real-life application and gives you a flavor to test multiple security vulnerabilities ranging from Injection, Access Control to XXE.&lt;br&gt;
&lt;strong&gt;Cobalt.io Vulnerability Wiki&lt;/strong&gt; is yet another great resource that includes a brief explanation, proof of concept, and risk ratings for various security issues based on OWASP ASVS.&lt;br&gt;
PayloadAllTheThings is an open-resource GitHub Repository that contains a huge list of payloads for all security issues and this is a good resource to know some of the new security issues as well.&lt;br&gt;
&lt;strong&gt;Learn365&lt;/strong&gt; is my own GitHub Repo which contains all the learning resources I am following in my #Learn365 challenge, these include various attack vectors including Web, Mobile, Network, Cloud, etc.&lt;br&gt;
&lt;strong&gt;HackTricks GitBook&lt;/strong&gt; is a great collection of resources about various Network, Mobile &amp;amp; Web Attack vectors.&lt;br&gt;
&lt;strong&gt;InfoSec&lt;/strong&gt; Writeups, PentesterLand &amp;amp; HackerOne Disclosures are great resources for looking at the Bug Bounty Writeups and learn how various hackers approach different bugs and different applications.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Getting Started with Network Security&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;HackTheBox:&lt;/strong&gt; An online platform to test and advance your skills in penetration testing and cybersecurity.&lt;br&gt;
&lt;strong&gt;VulnHub:&lt;/strong&gt; To provide materials that allow anyone to gain practical ‘hands-on’ experience in digital security, computer software &amp;amp; network administration.&lt;br&gt;
&lt;strong&gt;OffensiveSecurity ProvingGrounds:&lt;/strong&gt; Practice your Pentesting skills in a standalone, private lab environment with the additions of PG Play and PG Practice to Offensive Security’s Proving Grounds training labs.&lt;br&gt;
**TryHackMe: **TryHackMe is an online platform that teaches Cyber Security through short, gamified real-world labs. We have content for both complete beginners and seasoned hackers, incorporating guides and challenges to cater to different learning styles.&lt;br&gt;
**HackTricks GitBook **is a great collection of resources about various Network, Mobile &amp;amp; Web Attack vectors.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Damn Vulnerabilities List Lab</title>
      <dc:creator>Boni Yeamin</dc:creator>
      <pubDate>Tue, 13 Sep 2022 05:37:50 +0000</pubDate>
      <link>https://dev.to/boniyeamincse/damn-vulnerabilities-list-lab-2cg1</link>
      <guid>https://dev.to/boniyeamincse/damn-vulnerabilities-list-lab-2cg1</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4hzv1w9sbgrprmln21ry.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4hzv1w9sbgrprmln21ry.png" alt="Image description" width="800" height="504"&gt;&lt;/a&gt;&lt;br&gt;
Damn Vulnerabilities List Lab&lt;/p&gt;

&lt;h1&gt;
  
  
  AWSGoat : A Damn Vulnerable AWS Infrastructure
&lt;/h1&gt;

&lt;p&gt;&lt;a href="https://lnkd.in/dq2cYPG2" rel="noopener noreferrer"&gt;https://lnkd.in/dq2cYPG2&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  AzureGoat : A Damn Vulnerable Azure Infrastructure
&lt;/h1&gt;

&lt;p&gt;&lt;a href="https://lnkd.in/dKMMrESA" rel="noopener noreferrer"&gt;https://lnkd.in/dKMMrESA&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  Webpentest: A Damn Vulnerable Web Application
&lt;/h1&gt;

&lt;p&gt;&lt;a href="https://lnkd.in/dNJxX-Fe" rel="noopener noreferrer"&gt;https://lnkd.in/dNJxX-Fe&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  API: A Damn Vulnerable Web Sockets
&lt;/h1&gt;

&lt;p&gt;&lt;a href="https://lnkd.in/dMbJgP5h" rel="noopener noreferrer"&gt;https://lnkd.in/dMbJgP5h&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  Mobile: Damn Vulnerable Hybrid Mobile App
&lt;/h1&gt;

&lt;p&gt;&lt;a href="https://lnkd.in/dSMZMuzZ" rel="noopener noreferrer"&gt;https://lnkd.in/dSMZMuzZ&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  cybersecurity #redteam #blueteam #bugbounty
&lt;/h1&gt;

</description>
    </item>
    <item>
      <title>These notes come from 9 books I'm planning on reading that pertain to the topic of Ethical Hacking:</title>
      <dc:creator>Boni Yeamin</dc:creator>
      <pubDate>Thu, 28 Oct 2021 15:57:01 +0000</pubDate>
      <link>https://dev.to/boniyeamincse/these-notes-come-from-9-books-im-planning-on-reading-that-pertain-to-the-topic-of-ethical-hacking-4e41</link>
      <guid>https://dev.to/boniyeamincse/these-notes-come-from-9-books-im-planning-on-reading-that-pertain-to-the-topic-of-ethical-hacking-4e41</guid>
      <description>&lt;p&gt;01.The Pentester Blueprint: Starting a Career as an Ethical Hacker&lt;br&gt;
BY: Phillip L. Wylie and Kim Crawley&lt;/p&gt;

&lt;p&gt;02.Social Engineering -- The Art of Human Hacking&lt;br&gt;
BY: Christopher Hadnagy&lt;/p&gt;

&lt;p&gt;03.Basic Security Testing with Kali Linux&lt;br&gt;
BY: By Daniel W. Dieterle&lt;/p&gt;

&lt;p&gt;04.Metasploit Penetration Testing Cookbook&lt;br&gt;
BY: Abhinav Singh&lt;/p&gt;

&lt;p&gt;05.The Hacker Playbook&lt;br&gt;
BY: Peter Kim&lt;/p&gt;

&lt;p&gt;06.RTFM: Red Team Field Manual&lt;br&gt;
BY: Ben Clark&lt;/p&gt;

&lt;p&gt;07Gray Hat Python -- Python Programming for Hackers and Reverse Engineers&lt;br&gt;
BY: Justin Seitz&lt;/p&gt;

&lt;p&gt;08.Malware Analysts Cookbook -- Tools and Techniques for Fighting Malicious Code&lt;br&gt;
BY: Michael Hale Ligh, Steven Adair, Blake Hartstein, and Matthew Richard&lt;/p&gt;

&lt;p&gt;09.Inside Cyber Warfare&lt;br&gt;
BY: Jeffrey Carr&lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
