+91 9610101337

Tag: kali

Experiment is going for the development of Linux Kernel parts in the language of Rust

By Prempal Singh 0 Comment June 5, 2017

French developer, operating under the name of Dominus Carnufex, in practice demonstrated realistic ideas to rewrite the Linux kernel in Rust language. Currently, Rust has already proved itself as a low-level system programming language, and even there are several projects to develop new operating systems on Rust language. The author of the study refers to […]

Sudo eliminated the vulnerability with SE-Linux systems

By Prempal Singh 0 Comment June 3, 2017

The sudo utility used to organize the execution of commands on behalf of other users, found dangerous vulnerability (CVE-2017-1000367). The problem allows overwrite any file on the system, for example, / etc / shadow, and appears only if the user has been delegated the execution of certain privileged operations in / etc / sudoers, SELinux […]

Linux Vulnerability Allows Users to Gain Root Privileges

By Prempal Singh 0 Comment June 1, 2017

A vulnerability affecting the manner by which Sudo parsed tty information could have lead in the user getting root privileges and having the ability to overwrite any file on the filesystem on SELinux-enabled systems. Tracked as CVE-2017-1000367, the vulnerability was uncovered by Qualys Security in Sudo’s get_process_ttyname() for Linux. The issue resides in how Sudo […]

How to install and Use Nikto in Linux

By Prempal Singh 0 Comment July 24, 2016

What is Nikto Nikto is web-server scanner which is open source which can be use to scan the server for malicious file and programs. Using NIKTO we can scan HTTP, HTTPS and HTTPD traffics too. NIKTO can be used to outdated version of program also, and at the end of scan it’s generate log file […]

How to install Nessus in Linux

By Prempal Singh 0 Comment July 22, 2016

What is Nessus?  Nessus is a remote security scanning tool, which scans a computer, network and raises an alert if it discovers any vulnerabilities that malicious person could use to gain access to any computer you have connected to a network. Prior to you install and set up Nessus you have to download it for […]

error: Content is protected by Cyberops !!