<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: ra-kunnn</title>
    <description>The latest articles on DEV Community by ra-kunnn (@rakunnn).</description>
    <link>https://dev.to/rakunnn</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1280065%2F34807c23-f0fc-4ae6-87b5-4aa4268c2bee.png</url>
      <title>DEV Community: ra-kunnn</title>
      <link>https://dev.to/rakunnn</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/rakunnn"/>
    <language>en</language>
    <item>
      <title>[Boost]</title>
      <dc:creator>ra-kunnn</dc:creator>
      <pubDate>Tue, 29 Apr 2025 02:11:37 +0000</pubDate>
      <link>https://dev.to/rakunnn/-43ej</link>
      <guid>https://dev.to/rakunnn/-43ej</guid>
      <description>&lt;div class="ltag__link--embedded"&gt;
  &lt;div class="crayons-story "&gt;
  &lt;a href="https://dev.to/up_min_sparcs/how-to-turn-code-into-art-and-games-with-p5js-1n7j" class="crayons-story__hidden-navigation-link"&gt;How to Turn Code Into Art and Games with p5.js&lt;/a&gt;


  &lt;div class="crayons-story__body crayons-story__body-full_post"&gt;
    &lt;div class="crayons-story__top"&gt;
      &lt;div class="crayons-story__meta"&gt;
        &lt;div class="crayons-story__author-pic"&gt;
          &lt;a class="crayons-logo crayons-logo--l" href="/up_min_sparcs"&gt;
            &lt;img alt="UP Mindanao SPARCS logo" src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F8330%2F12cc5825-5a6a-4a4d-a2e1-2b51e2f5268f.png" class="crayons-logo__image"&gt;
          &lt;/a&gt;

          &lt;a href="/j-oj" class="crayons-avatar  crayons-avatar--s absolute -right-2 -bottom-2 border-solid border-2 border-base-inverted  "&gt;
            &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3072315%2F79a4c2e3-d0aa-44a9-94d1-9257ee619ddb.jpg" alt="j-oj profile" class="crayons-avatar__image"&gt;
          &lt;/a&gt;
        &lt;/div&gt;
        &lt;div&gt;
          &lt;div&gt;
            &lt;a href="/j-oj" class="crayons-story__secondary fw-medium m:hidden"&gt;
              Janelle Ojanola
            &lt;/a&gt;
            &lt;div class="profile-preview-card relative mb-4 s:mb-0 fw-medium hidden m:inline-block"&gt;
              
                Janelle Ojanola
                
              
              &lt;div id="story-author-preview-content-2429065" class="profile-preview-card__content crayons-dropdown branded-7 p-4 pt-0"&gt;
                &lt;div class="gap-4 grid"&gt;
                  &lt;div class="-mt-4"&gt;
                    &lt;a href="/j-oj" class="flex"&gt;
                      &lt;span class="crayons-avatar crayons-avatar--xl mr-2 shrink-0"&gt;
                        &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3072315%2F79a4c2e3-d0aa-44a9-94d1-9257ee619ddb.jpg" class="crayons-avatar__image" alt=""&gt;
                      &lt;/span&gt;
                      &lt;span class="crayons-link crayons-subtitle-2 mt-5"&gt;Janelle Ojanola&lt;/span&gt;
                    &lt;/a&gt;
                  &lt;/div&gt;
                  &lt;div class="print-hidden"&gt;
                    
                      Follow
                    
                  &lt;/div&gt;
                  &lt;div class="author-preview-metadata-container"&gt;&lt;/div&gt;
                &lt;/div&gt;
              &lt;/div&gt;
            &lt;/div&gt;

            &lt;span&gt;
              &lt;span class="crayons-story__tertiary fw-normal"&gt; for &lt;/span&gt;&lt;a href="/up_min_sparcs" class="crayons-story__secondary fw-medium"&gt;UP Mindanao SPARCS&lt;/a&gt;
            &lt;/span&gt;
          &lt;/div&gt;
          &lt;a href="https://dev.to/up_min_sparcs/how-to-turn-code-into-art-and-games-with-p5js-1n7j" class="crayons-story__tertiary fs-xs"&gt;&lt;time&gt;Apr 26 '25&lt;/time&gt;&lt;span class="time-ago-indicator-initial-placeholder"&gt;&lt;/span&gt;&lt;/a&gt;
        &lt;/div&gt;
      &lt;/div&gt;

    &lt;/div&gt;

    &lt;div class="crayons-story__indention"&gt;
      &lt;h2 class="crayons-story__title crayons-story__title-full_post"&gt;
        &lt;a href="https://dev.to/up_min_sparcs/how-to-turn-code-into-art-and-games-with-p5js-1n7j" id="article-link-2429065"&gt;
          How to Turn Code Into Art and Games with p5.js
        &lt;/a&gt;
      &lt;/h2&gt;
        &lt;div class="crayons-story__tags"&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/creativecoding"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;creativecoding&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/p5js"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;p5js&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/gamedev"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;gamedev&lt;/a&gt;
            &lt;a class="crayons-tag  crayons-tag--monochrome " href="/t/javascript"&gt;&lt;span class="crayons-tag__prefix"&gt;#&lt;/span&gt;javascript&lt;/a&gt;
        &lt;/div&gt;
      &lt;div class="crayons-story__bottom"&gt;
        &lt;div class="crayons-story__details"&gt;
          &lt;a href="https://dev.to/up_min_sparcs/how-to-turn-code-into-art-and-games-with-p5js-1n7j" class="crayons-btn crayons-btn--s crayons-btn--ghost crayons-btn--icon-left"&gt;
            &lt;div class="multiple_reactions_aggregate"&gt;
              &lt;span class="multiple_reactions_icons_container"&gt;
                  &lt;span class="crayons_icon_container"&gt;
                    &lt;img src="https://assets.dev.to/assets/sparkle-heart-5f9bee3767e18deb1bb725290cb151c25234768a0e9a2bd39370c382d02920cf.svg" width="18" height="18"&gt;
                  &lt;/span&gt;
              &lt;/span&gt;
              &lt;span class="aggregate_reactions_counter"&gt;2&lt;span class="hidden s:inline"&gt; reactions&lt;/span&gt;&lt;/span&gt;
            &lt;/div&gt;
          &lt;/a&gt;
            &lt;a href="https://dev.to/up_min_sparcs/how-to-turn-code-into-art-and-games-with-p5js-1n7j#comments" class="crayons-btn crayons-btn--s crayons-btn--ghost crayons-btn--icon-left flex items-center"&gt;
              Comments


              &lt;span class="hidden s:inline"&gt;Add Comment&lt;/span&gt;
            &lt;/a&gt;
        &lt;/div&gt;
        &lt;div class="crayons-story__save"&gt;
          &lt;small class="crayons-story__tertiary fs-xs mr-2"&gt;
            6 min read
          &lt;/small&gt;
            
              &lt;span class="bm-initial"&gt;
                

              &lt;/span&gt;
              &lt;span class="bm-success"&gt;
                

              &lt;/span&gt;
            
        &lt;/div&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;/div&gt;

&lt;/div&gt;


</description>
      <category>creativecoding</category>
      <category>p5js</category>
      <category>gamedev</category>
      <category>javascript</category>
    </item>
    <item>
      <title>Beyond Basics: Traversing Kali Linux Tools</title>
      <dc:creator>ra-kunnn</dc:creator>
      <pubDate>Mon, 19 Feb 2024 11:03:32 +0000</pubDate>
      <link>https://dev.to/up_min_sparcs/beyond-basics-traversing-kali-linux-tools-3gj6</link>
      <guid>https://dev.to/up_min_sparcs/beyond-basics-traversing-kali-linux-tools-3gj6</guid>
      <description>&lt;p&gt;This article is co-authored by &lt;a class="mentioned-user" href="https://dev.to/0xshr00msz"&gt;@0xshr00msz&lt;/a&gt; &lt;/p&gt;

&lt;p&gt; As aspiring developers, it is a basic requirement that we hone our technical and practical skills with novel computing practices and studies. These are all important things future developers should be exercising as the world of computer science is constantly evolving everyday. However, are we sure that the programs we develop are secure? Protecting consumer data and products is imperative, especially now where &lt;strong&gt;data is the new gold&lt;/strong&gt;. If we are unable to protect users from password attacks, cracking and spoofing, users become exposed to possible data leaks and machine breakage.  &lt;/p&gt;

&lt;p&gt; Kali Linux provides developers with tools to test their programs against actual cracking attempts. Spearheaded by &lt;strong&gt;Mati Aharoni&lt;/strong&gt;, he created the Kali Linux project and specialized it for &lt;strong&gt;“penetration testing, security research, computer forensics, reverse engineering and vulnerability management”&lt;/strong&gt;. With all this, the open-source program remains free, making it accessible to security developers and those interested in cybersecurity in general.&lt;/p&gt;




&lt;p&gt; Before we get into the different tools that Kali Linux has to offer, it's important that you have the right background in order to be able to use it in the first place. Kali Linux, as its name suggests, requires Linux as its operating system and in-depth knowledge in using said OS. It is not a general purpose software and would require a lot of background knowledge to use it. While Kali Linux is free and technically available for all to use, access is only given to those that are trusted with the software as Kali Linux is a penetration testing software and would be dangerous if used for malicious reasons. You have to keep in mind that the reason this software exists is &lt;strong&gt;to prevent malicious software and attacks&lt;/strong&gt;. It should only be used for ethical hacking. With all this in mind, we can move forward with what Kali can actually do for cybersecurity.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;KALI LINUX TOOLS&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt; Kali Linux is a Debian-based distribution of Linux, and most commands used for every tool are Linux based. The pre-installed tools in this distribution are mostly open source and designed for ethical hacking that covers a wide range of activities such as reconnaissance, vulnerability analysis, exploitation, and other common tasks.&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;Web Application Analysis&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt; Web application analysis is the process of examining the security of web applications using the tools pre-installed in Kali or the tools available in the Kali Linux repository. &lt;/p&gt;

&lt;p&gt;Here are the common tasks in web application analysis:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Vulnerability Scanning&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Manual Testing&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Cross-Site Scripting and SQL Injection Testing&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Authentication and Authorization Testing&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Session Management Testing&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Security Headers Analysis&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Some common Web Application Analysis Tools include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;SQLMAP&lt;/strong&gt;: Sqlmap is an open-source penetration testing tool that detects and exploits SQL injection vulnerabilities in web applications.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Tutorial:&lt;br&gt;
 &lt;iframe width="710" height="399" src="https://www.youtube.com/embed/nVj8MUKkzQk"&gt;
&lt;/iframe&gt;
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;SKIPFISH&lt;/strong&gt;: Skipfish is also a penetration testing tool developed by Google and it is an active web application security reconnaissance tool. It identifies security vulnerabilities in web applications by analyzing their structure and content.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Tutorial: &lt;br&gt;
&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/E3UNn7PTy4c"&gt;
&lt;/iframe&gt;
&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;Password Attacks&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt; Password attacks category uses tools with different kinds of techniques to gain unauthorized access to a system or user account by exploiting weaknesses of security. Password Attacks have various methods, these are the common methods used by most hackers: Brute Force Attacks, Dictionary Attacks, Phishing, and many more.&lt;/p&gt;

&lt;p&gt;Some common Password Attacks Tools include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;HASHCAT&lt;/strong&gt;: Hashcat is an open-source CPU-based password cracking tool used for recovering password from hashed values. Hashcat can perform various attack modes including brute force attack, dictionary attack, hybrid attack (Combination of Brute force and Dictionary Attack), permutation attack, and many more. &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Tutorial: &lt;br&gt;
&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/5fy6Lq1vgZk"&gt;
&lt;/iframe&gt;
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;HYDRA&lt;/strong&gt;: hydra is a powerful password-cracking tool, widely used for penetration testing for ethical hacking. It is a login cracker which uses different kinds of protocols to attack. Based on the tool’s description in Kali, this tool gives researchers and security consultants the possibility to show how easy it would be to gain unauthorized access from remote to a system.
Read more about the tool here: &lt;a href="https://www.kali.org/tools/hydra/"&gt;https://www.kali.org/tools/hydra/&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Tutorial: &lt;br&gt;
&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/kadJLB2rYWo"&gt;
&lt;/iframe&gt;
&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;Wireless Attacks&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt; Wireless attacks category refers to the various tools and utilities for exploiting vulnerabilities specifically in wireless networks. It also has methods similar to the password cracking category such as brute force attacks, dictionary attacks, phishing, and many more.&lt;/p&gt;

&lt;p&gt;Some common Wireless Attack Tools include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Aircrack-ng&lt;/strong&gt;: aircrack-ng is a wireless cracking program that gets the WEP key once the encrypted packets have been captured with airodump-ng. It de-authenticates the user of a wireless network to get the encrypted packets.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt; Once the device connects to a wireless network, a 3-way handshake will occur during the authentication process. The handshake will be captured and saved to a file. If the password is in the dictionary or brute force attack is successful, the tool will display the password immediately.&lt;/p&gt;

&lt;p&gt;Tutorial: &lt;br&gt;
&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/WfYxrLaqlN8"&gt;
&lt;/iframe&gt;
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Wifite&lt;/strong&gt;: wifite is a Python script that uses aircrack-ng, pyrit, reaver, and tshark tools to audit WEP or WPA encrypted wireless networks. It is like an automated version of aircrack-ng and simpler, making it easier for script kiddie users – a beginner friendly tool. This tool is customizable to be automated with only a few arguments and can be trusted to run without supervision.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Tutorial: &lt;br&gt;
&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/qpnpI_mF3Aw"&gt;
&lt;/iframe&gt;
&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;Sniffing and Spoofing&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt; Sniffing is the process of monitoring network traffic to analyze and capture packets. Spoofing is the act of deceiving or pretending to be something in order to gain information from users, unauthorized access to systems, steal, or even spread malware.&lt;/p&gt;

&lt;p&gt;Some common Sniffing and Spoofing Tools include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Wireshark&lt;/strong&gt;: a network protocol analyzer that captures data packets which are saved into a file, the most common format is the pcap (Packet Capture) format.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Tutorial: &lt;br&gt;
&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/lb1Dw0elw0Q"&gt;
&lt;/iframe&gt;
&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Tcpdump&lt;/strong&gt;: a terminal-based packet analyzer. It enables users to capture and display various packets such as TCP, UDP, and other packets on a network. It is used for network monitoring, troubleshooting, and security analysis.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Tutorial: &lt;br&gt;
&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/e45Kt1IYdCI"&gt;
&lt;/iframe&gt;
&lt;/p&gt;

&lt;p&gt; To see more details for each tool, a linux command is a go-to:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;man tool-name
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The command “man” simply means manual followed by the tool-name.&lt;/p&gt;

&lt;p&gt;Documentation for each tool -&amp;gt; &lt;a href="https://www.kali.org/tools/"&gt;https://www.kali.org/tools/&lt;/a&gt;&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;As data becomes even more crucial for today’s systems, safeguarding these systems becomes a greater priority too. It is important to keep in mind the intended purpose of Kali Linux, that it is for testing the strength of your programs and not for cracking into unauthorized systems. In the hands of the proper individuals (which Kali ensures to only share with trusted and signed committers), computer forensics and cybersecurity becomes much more efficient and productive. Even if you personally wouldn’t be able to use this situational tool, what it provides will still improve your lifestyle. Cybersecurity engineers and the developers that rely on their work need something like Kali in order to ensure that the system’s that all of us use in our day to day digital activities remain safe and secure. &lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>kali</category>
      <category>linux</category>
      <category>ethicalhacking</category>
    </item>
  </channel>
</rss>
