KernelBlog

Touch The Technology

Melisa Ayşe Demirel

ls (List Directory Contents) Command

Used to see the files and sub-directories of the directory it’s in. If the specific name of the file or the directory isn’t defined on the command prompt, its shows the current directory you’re in. It lists the directories in…

CrackMapExec (CME)

CrackMapExec (in otherwords CME) is an exploitation tool for evaluating the security of big active directory networks. CrackMapExec (CME) Setup apt-get install -y libssl-dev libffi-dev python-dev build-essential git clone https://github.com/byt3bl33d3r/CrackMapExec   cd CrackMapExec && git submodule init && git submodule…

What Is Metasploit, What Does It Do?

Metasploit is an open sourced penetration test tool, written with Ruby language. Developed for security tests, Metasploit has a practical interface and contains of over 1500 exploits. Also includes lots of parameters and modules for easier use of all the…

What Is an IP?

What is an IP address? On the internet every device has it’s own Internet Protocol (IP) address. An IP address consists of 4 numbers seperated by periods: as example, your IP address might look like something like this ‘78.170.224.82’. If…

Custom Roms

What is a Rom? A Rom is the place that stores the system files of the machine. Renewing a Rom means changing the operating system files to new files and changing the interface of the rom. Custom Rom A rom type…

Nmap Setup

Nmap is a security scanner that is developed by computer networks expert Gordon Lyon (Fyodor). We will now show you how to do Nmap setup on Windows. Windows Nmap Setup First of all download the windows version of nmap from…

What Is Linux?

Linux is an UNIX operating system type that can be freely distributed, with multitasking and multiple users. Linux is developed by people on the internet with knowledge and interest and starting with IBM-PC compatible personal computers, can be used on…

Awareness in Cyber Security

Cyber security is one of the most popular subjects in our century. As everything turns to technology rapidly in our century, cyber crime rates are getting higher just as fast. No matter how much it’s been tried to prevent, people…