SlideShare a Scribd company logo

linux security: interact with linux

Ammar WK
Ammar WKProfessional Bandwidth hunter at Inside your Machine
Interact with Linux
   Deep [in[security
      knowledge




                  y3dips@echo.or.id
GNU/Linux?
• Ever heard linux?
• Ever heard GNU?
• So, Please explain GNU/Linux?
Please, Met Tux!
Security
• Why do we need security?
• Securing what?
• How to do that?
Physicalenvirontment
Secure the Security
{Physical Security
• Room Security (lock)
• CPU security (locak case, no
  cdrom… else)_
• Bios Security
  Disallow booting from floppy/cdrom/usb drive and
 network
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
linux security: interact with linux
1 of 43

linux security: interact with linux

Download to read offline

Im using this slide for my workshop this month at Medan, north sumatera, Indonesia

Ammar WK
Ammar WKProfessional Bandwidth hunter at Inside your Machine

Recommended

Howto Make A Linux Boot Disk
Howto Make A Linux Boot DiskHowto Make A Linux Boot Disk
Howto Make A Linux Boot DiskXaver Y.R. Chen
 
懷舊半殘的Win98體驗
懷舊半殘的Win98體驗懷舊半殘的Win98體驗
懷舊半殘的Win98體驗Yuan Chiu
 
Hello, Worldまで3ヶ月 Golangでファミコンエミュレータ実装 #gocon fukuoka 2019
Hello, Worldまで3ヶ月 Golangでファミコンエミュレータ実装 #gocon fukuoka 2019Hello, Worldまで3ヶ月 Golangでファミコンエミュレータ実装 #gocon fukuoka 2019
Hello, Worldまで3ヶ月 Golangでファミコンエミュレータ実装 #gocon fukuoka 2019ichikaway
 
ゼロから始めるファミコンエミュレータ生活 PHPerKaigi2019
ゼロから始めるファミコンエミュレータ生活 PHPerKaigi2019ゼロから始めるファミコンエミュレータ生活 PHPerKaigi2019
ゼロから始めるファミコンエミュレータ生活 PHPerKaigi2019ichikaway
 
YOU CAN DO ANYTHING 1
YOU CAN DO ANYTHING 1YOU CAN DO ANYTHING 1
YOU CAN DO ANYTHING 1shortstp73
 
Recover linux after windows installation
Recover linux after windows installationRecover linux after windows installation
Recover linux after windows installationAmrinder Singh
 
How to boot mail server from a usb device
How to boot mail server from a usb deviceHow to boot mail server from a usb device
How to boot mail server from a usb devicesharetech
 

More Related Content

What's hot

The Unix Command Line | Jim Reevior
The Unix Command Line | Jim ReeviorThe Unix Command Line | Jim Reevior
The Unix Command Line | Jim ReeviorOomph, Inc.
 
Instal vnc in cent os
Instal vnc in cent osInstal vnc in cent os
Instal vnc in cent osManusia Tenan
 
Creación de máquinas virtuales basada en kernel usando qemu y virsh
Creación de máquinas virtuales basada en kernel usando qemu y virshCreación de máquinas virtuales basada en kernel usando qemu y virsh
Creación de máquinas virtuales basada en kernel usando qemu y virshJonathan Franchesco Torres Baca
 
Programming OpenRISC on Altera De0_nano
Programming OpenRISC on Altera De0_nanoProgramming OpenRISC on Altera De0_nano
Programming OpenRISC on Altera De0_nanoYi-Chiao
 
4.4. Hashcracking server on generic hardware
4.4. Hashcracking server on generic hardware4.4. Hashcracking server on generic hardware
4.4. Hashcracking server on generic hardwaredefconmoscow
 
【Manifes2018】私が考えるPCの"最新"学習方法
【Manifes2018】私が考えるPCの"最新"学習方法【Manifes2018】私が考えるPCの"最新"学習方法
【Manifes2018】私が考えるPCの"最新"学習方法竹田 大将
 
Activar net framework 3.5 a win8.1
Activar net framework 3.5 a win8.1Activar net framework 3.5 a win8.1
Activar net framework 3.5 a win8.1istp jva
 
Ubuntu Cheat Sheet
Ubuntu Cheat SheetUbuntu Cheat Sheet
Ubuntu Cheat SheetServerless
 
망고100 보드로 놀아보자 10
망고100 보드로 놀아보자 10망고100 보드로 놀아보자 10
망고100 보드로 놀아보자 10종인 전
 
Install zpanel on linux server in 5 minutes
Install zpanel on linux server in 5 minutesInstall zpanel on linux server in 5 minutes
Install zpanel on linux server in 5 minutesSamuel Guebo
 
Videos on Android - Stuff What I Learned
Videos on Android - Stuff What I LearnedVideos on Android - Stuff What I Learned
Videos on Android - Stuff What I LearnedMark Hemmings
 
Qemu x86 BIOS @ https://youtu.be/F71LGSrj9cc
Qemu x86 BIOS @ https://youtu.be/F71LGSrj9ccQemu x86 BIOS @ https://youtu.be/F71LGSrj9cc
Qemu x86 BIOS @ https://youtu.be/F71LGSrj9ccSanjay Adhikari
 
100+ run commands for windows
100+ run commands for windows 100+ run commands for windows
100+ run commands for windows Anand Garg
 
Linux command-cheat-sheet
Linux command-cheat-sheetLinux command-cheat-sheet
Linux command-cheat-sheetIfshar Ahmad
 

What's hot (20)

The Unix Command Line | Jim Reevior
The Unix Command Line | Jim ReeviorThe Unix Command Line | Jim Reevior
The Unix Command Line | Jim Reevior
 
Instal vnc in cent os
Instal vnc in cent osInstal vnc in cent os
Instal vnc in cent os
 
Creación de máquinas virtuales basada en kernel usando qemu y virsh
Creación de máquinas virtuales basada en kernel usando qemu y virshCreación de máquinas virtuales basada en kernel usando qemu y virsh
Creación de máquinas virtuales basada en kernel usando qemu y virsh
 
Programming OpenRISC on Altera De0_nano
Programming OpenRISC on Altera De0_nanoProgramming OpenRISC on Altera De0_nano
Programming OpenRISC on Altera De0_nano
 
ubunturef
ubunturefubunturef
ubunturef
 
4.4. Hashcracking server on generic hardware
4.4. Hashcracking server on generic hardware4.4. Hashcracking server on generic hardware
4.4. Hashcracking server on generic hardware
 
Spesifikasi server
Spesifikasi serverSpesifikasi server
Spesifikasi server
 
【Manifes2018】私が考えるPCの"最新"学習方法
【Manifes2018】私が考えるPCの"最新"学習方法【Manifes2018】私が考えるPCの"最新"学習方法
【Manifes2018】私が考えるPCの"最新"学習方法
 
Activar net framework 3.5 a win8.1
Activar net framework 3.5 a win8.1Activar net framework 3.5 a win8.1
Activar net framework 3.5 a win8.1
 
Ubuntu Cheat Sheet
Ubuntu Cheat SheetUbuntu Cheat Sheet
Ubuntu Cheat Sheet
 
망고100 보드로 놀아보자 10
망고100 보드로 놀아보자 10망고100 보드로 놀아보자 10
망고100 보드로 놀아보자 10
 
Install zpanel on linux server in 5 minutes
Install zpanel on linux server in 5 minutesInstall zpanel on linux server in 5 minutes
Install zpanel on linux server in 5 minutes
 
Videos on Android - Stuff What I Learned
Videos on Android - Stuff What I LearnedVideos on Android - Stuff What I Learned
Videos on Android - Stuff What I Learned
 
Windows cmd saukiniai
Windows cmd saukiniaiWindows cmd saukiniai
Windows cmd saukiniai
 
Git installation
Git installationGit installation
Git installation
 
Qemu x86 BIOS @ https://youtu.be/F71LGSrj9cc
Qemu x86 BIOS @ https://youtu.be/F71LGSrj9ccQemu x86 BIOS @ https://youtu.be/F71LGSrj9cc
Qemu x86 BIOS @ https://youtu.be/F71LGSrj9cc
 
List Command at Run
List Command at RunList Command at Run
List Command at Run
 
100+ run commands for windows
100+ run commands for windows 100+ run commands for windows
100+ run commands for windows
 
Linux command-cheat-sheet
Linux command-cheat-sheetLinux command-cheat-sheet
Linux command-cheat-sheet
 
Getting started with BeagleBone Black - Embedded Linux
Getting started with BeagleBone Black - Embedded LinuxGetting started with BeagleBone Black - Embedded Linux
Getting started with BeagleBone Black - Embedded Linux
 

Viewers also liked

Kernel Recipes 2013 - Linux Security Modules: different formal concepts
Kernel Recipes 2013 - Linux Security Modules: different formal conceptsKernel Recipes 2013 - Linux Security Modules: different formal concepts
Kernel Recipes 2013 - Linux Security Modules: different formal conceptsAnne Nicolas
 
Security of Linux containers in the cloud
Security of Linux containers in the cloudSecurity of Linux containers in the cloud
Security of Linux containers in the cloudDobrica Pavlinušić
 
2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security Overview
2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security Overview2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security Overview
2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security OverviewShawn Wells
 
Introduction To Linux Security
Introduction To Linux SecurityIntroduction To Linux Security
Introduction To Linux SecurityMichael Boman
 
How Many Linux Security Layers Are Enough?
How Many Linux Security Layers Are Enough?How Many Linux Security Layers Are Enough?
How Many Linux Security Layers Are Enough?Michael Boelen
 
Linux Security Scanning with Lynis
Linux Security Scanning with LynisLinux Security Scanning with Lynis
Linux Security Scanning with LynisMichael Boelen
 
Linux Security Overview
Linux Security OverviewLinux Security Overview
Linux Security OverviewKernel TLV
 
File System Implementation & Linux Security
File System Implementation & Linux SecurityFile System Implementation & Linux Security
File System Implementation & Linux SecurityGeo Marian
 
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxThreats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxAmitesh Bharti
 
Basic Linux Security
Basic Linux SecurityBasic Linux Security
Basic Linux Securitypankaj009
 
Linux Security, from Concept to Tooling
Linux Security, from Concept to ToolingLinux Security, from Concept to Tooling
Linux Security, from Concept to ToolingMichael Boelen
 
Linux Security for Developers
Linux Security for DevelopersLinux Security for Developers
Linux Security for DevelopersMichael Boelen
 
What's New with Linux on System z
What's New with Linux on System zWhat's New with Linux on System z
What's New with Linux on System zNovell
 
Windows Server 8 Security Improvement
Windows Server 8 Security ImprovementWindows Server 8 Security Improvement
Windows Server 8 Security ImprovementWong Chon Kit
 
LCNA14: Security in the Cloud: Containers, KVM, and Xen - George Dunlap, Citr...
LCNA14: Security in the Cloud: Containers, KVM, and Xen - George Dunlap, Citr...LCNA14: Security in the Cloud: Containers, KVM, and Xen - George Dunlap, Citr...
LCNA14: Security in the Cloud: Containers, KVM, and Xen - George Dunlap, Citr...The Linux Foundation
 
Windows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterpriseWindows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterprise247infotech
 

Viewers also liked (20)

Linux Security
Linux SecurityLinux Security
Linux Security
 
Security and Linux Security
Security and Linux SecuritySecurity and Linux Security
Security and Linux Security
 
Linux Security Myth
Linux Security MythLinux Security Myth
Linux Security Myth
 
Kernel Recipes 2013 - Linux Security Modules: different formal concepts
Kernel Recipes 2013 - Linux Security Modules: different formal conceptsKernel Recipes 2013 - Linux Security Modules: different formal concepts
Kernel Recipes 2013 - Linux Security Modules: different formal concepts
 
Security of Linux containers in the cloud
Security of Linux containers in the cloudSecurity of Linux containers in the cloud
Security of Linux containers in the cloud
 
2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security Overview
2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security Overview2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security Overview
2009-08-11 IBM Teach the Teachers (IBM T3), Linux Security Overview
 
Introduction To Linux Security
Introduction To Linux SecurityIntroduction To Linux Security
Introduction To Linux Security
 
How Many Linux Security Layers Are Enough?
How Many Linux Security Layers Are Enough?How Many Linux Security Layers Are Enough?
How Many Linux Security Layers Are Enough?
 
Linux Security Scanning with Lynis
Linux Security Scanning with LynisLinux Security Scanning with Lynis
Linux Security Scanning with Lynis
 
Linux Security Overview
Linux Security OverviewLinux Security Overview
Linux Security Overview
 
Linux security-fosster-09
Linux security-fosster-09Linux security-fosster-09
Linux security-fosster-09
 
File System Implementation & Linux Security
File System Implementation & Linux SecurityFile System Implementation & Linux Security
File System Implementation & Linux Security
 
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxThreats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in Linux
 
Basic Linux Security
Basic Linux SecurityBasic Linux Security
Basic Linux Security
 
Linux Security, from Concept to Tooling
Linux Security, from Concept to ToolingLinux Security, from Concept to Tooling
Linux Security, from Concept to Tooling
 
Linux Security for Developers
Linux Security for DevelopersLinux Security for Developers
Linux Security for Developers
 
What's New with Linux on System z
What's New with Linux on System zWhat's New with Linux on System z
What's New with Linux on System z
 
Windows Server 8 Security Improvement
Windows Server 8 Security ImprovementWindows Server 8 Security Improvement
Windows Server 8 Security Improvement
 
LCNA14: Security in the Cloud: Containers, KVM, and Xen - George Dunlap, Citr...
LCNA14: Security in the Cloud: Containers, KVM, and Xen - George Dunlap, Citr...LCNA14: Security in the Cloud: Containers, KVM, and Xen - George Dunlap, Citr...
LCNA14: Security in the Cloud: Containers, KVM, and Xen - George Dunlap, Citr...
 
Windows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterpriseWindows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterprise
 

Similar to linux security: interact with linux

Description of GRUB 2
Description of GRUB 2Description of GRUB 2
Description of GRUB 2iamumr
 
Recipe of a linux Live CD (archived)
Recipe of a linux Live CD (archived)Recipe of a linux Live CD (archived)
Recipe of a linux Live CD (archived)Bud Siddhisena
 
Introduction to linux
Introduction to linuxIntroduction to linux
Introduction to linuxplarsen67
 
Part 1 of 'Introduction to Linux for bioinformatics': Introduction
Part 1 of 'Introduction to Linux for bioinformatics': IntroductionPart 1 of 'Introduction to Linux for bioinformatics': Introduction
Part 1 of 'Introduction to Linux for bioinformatics': IntroductionJoachim Jacob
 
Createa Xp Recovery Diskwith Sp3
Createa Xp Recovery Diskwith Sp3Createa Xp Recovery Diskwith Sp3
Createa Xp Recovery Diskwith Sp3bizet
 
Linux Capabilities - eng - v2.1.5, compact
Linux Capabilities - eng - v2.1.5, compactLinux Capabilities - eng - v2.1.5, compact
Linux Capabilities - eng - v2.1.5, compactAlessandro Selli
 
Linux fundamental - Chap 16 System Rescue
Linux fundamental - Chap 16 System RescueLinux fundamental - Chap 16 System Rescue
Linux fundamental - Chap 16 System RescueKenny (netman)
 
Ubuntu alternate ubuntu installation
Ubuntu alternate ubuntu installationUbuntu alternate ubuntu installation
Ubuntu alternate ubuntu installationarunkumar sadhasivam
 
Code4vn - Linux day - linux boot process
Code4vn - Linux day - linux boot processCode4vn - Linux day - linux boot process
Code4vn - Linux day - linux boot processCường Nguyễn
 
Build Your Own Android Tablet
Build Your Own Android TabletBuild Your Own Android Tablet
Build Your Own Android TabletSGAndroidDevs
 
Mac book i phone android
Mac book i phone androidMac book i phone android
Mac book i phone androidTapan Khilar
 
How to reset lenovo password
How to reset lenovo passwordHow to reset lenovo password
How to reset lenovo passwordjohnsmith101010
 

Similar to linux security: interact with linux (20)

Description of GRUB 2
Description of GRUB 2Description of GRUB 2
Description of GRUB 2
 
Recipe of a linux Live CD (archived)
Recipe of a linux Live CD (archived)Recipe of a linux Live CD (archived)
Recipe of a linux Live CD (archived)
 
Understanding The Boot Process
Understanding The Boot ProcessUnderstanding The Boot Process
Understanding The Boot Process
 
Introduction to linux
Introduction to linuxIntroduction to linux
Introduction to linux
 
Part 1 of 'Introduction to Linux for bioinformatics': Introduction
Part 1 of 'Introduction to Linux for bioinformatics': IntroductionPart 1 of 'Introduction to Linux for bioinformatics': Introduction
Part 1 of 'Introduction to Linux for bioinformatics': Introduction
 
Ps3 linux
Ps3 linuxPs3 linux
Ps3 linux
 
Createa Xp Recovery Diskwith Sp3
Createa Xp Recovery Diskwith Sp3Createa Xp Recovery Diskwith Sp3
Createa Xp Recovery Diskwith Sp3
 
Linux Capabilities - eng - v2.1.5, compact
Linux Capabilities - eng - v2.1.5, compactLinux Capabilities - eng - v2.1.5, compact
Linux Capabilities - eng - v2.1.5, compact
 
Linux fundamental - Chap 16 System Rescue
Linux fundamental - Chap 16 System RescueLinux fundamental - Chap 16 System Rescue
Linux fundamental - Chap 16 System Rescue
 
Ubuntu alternate ubuntu installation
Ubuntu alternate ubuntu installationUbuntu alternate ubuntu installation
Ubuntu alternate ubuntu installation
 
Texas 2013
Texas 2013Texas 2013
Texas 2013
 
Linux Hardening - Made Easy
Linux Hardening - Made EasyLinux Hardening - Made Easy
Linux Hardening - Made Easy
 
Os Bernier
Os BernierOs Bernier
Os Bernier
 
Df3 Std Manual
Df3 Std ManualDf3 Std Manual
Df3 Std Manual
 
Cgroups in android
Cgroups in androidCgroups in android
Cgroups in android
 
Self 2013
Self 2013Self 2013
Self 2013
 
Code4vn - Linux day - linux boot process
Code4vn - Linux day - linux boot processCode4vn - Linux day - linux boot process
Code4vn - Linux day - linux boot process
 
Build Your Own Android Tablet
Build Your Own Android TabletBuild Your Own Android Tablet
Build Your Own Android Tablet
 
Mac book i phone android
Mac book i phone androidMac book i phone android
Mac book i phone android
 
How to reset lenovo password
How to reset lenovo passwordHow to reset lenovo password
How to reset lenovo password
 

More from Ammar WK

Vvdp-fgd-bssn
Vvdp-fgd-bssnVvdp-fgd-bssn
Vvdp-fgd-bssnAmmar WK
 
Pen-testing is Dead?
Pen-testing is Dead?Pen-testing is Dead?
Pen-testing is Dead?Ammar WK
 
How To [relatively] Secure your Web Applications
How To [relatively] Secure your Web ApplicationsHow To [relatively] Secure your Web Applications
How To [relatively] Secure your Web ApplicationsAmmar WK
 
A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!Ammar WK
 
Cybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industryCybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industryAmmar WK
 
Bugbounty vs-0day
Bugbounty vs-0dayBugbounty vs-0day
Bugbounty vs-0dayAmmar WK
 
Advanced Persistent Threat
Advanced Persistent ThreatAdvanced Persistent Threat
Advanced Persistent ThreatAmmar WK
 
Mobile hacking, pentest, and malware
Mobile hacking, pentest, and malwareMobile hacking, pentest, and malware
Mobile hacking, pentest, and malwareAmmar WK
 
Hacker? : it's not about Black or White
Hacker? : it's not about Black or WhiteHacker? : it's not about Black or White
Hacker? : it's not about Black or WhiteAmmar WK
 
Introduction to IOS Application Penetration Testing
Introduction to IOS Application Penetration TestingIntroduction to IOS Application Penetration Testing
Introduction to IOS Application Penetration TestingAmmar WK
 
Burp suite
Burp suiteBurp suite
Burp suiteAmmar WK
 
Web Hacking (basic)
Web Hacking (basic)Web Hacking (basic)
Web Hacking (basic)Ammar WK
 
Network Packet Analysis
Network Packet AnalysisNetwork Packet Analysis
Network Packet AnalysisAmmar WK
 
Packet analysis (Basic)
Packet analysis (Basic)Packet analysis (Basic)
Packet analysis (Basic)Ammar WK
 
Network security
Network securityNetwork security
Network securityAmmar WK
 
Penetration testing
Penetration testingPenetration testing
Penetration testingAmmar WK
 
Information Security Professional
Information Security ProfessionalInformation Security Professional
Information Security ProfessionalAmmar WK
 
Handout infosec defense-mechanism-y3dips
Handout infosec defense-mechanism-y3dipsHandout infosec defense-mechanism-y3dips
Handout infosec defense-mechanism-y3dipsAmmar WK
 
Layer 7 denial of services attack mitigation
Layer 7 denial of services attack mitigationLayer 7 denial of services attack mitigation
Layer 7 denial of services attack mitigationAmmar WK
 
How To Become A Hacker
How To Become A HackerHow To Become A Hacker
How To Become A HackerAmmar WK
 

More from Ammar WK (20)

Vvdp-fgd-bssn
Vvdp-fgd-bssnVvdp-fgd-bssn
Vvdp-fgd-bssn
 
Pen-testing is Dead?
Pen-testing is Dead?Pen-testing is Dead?
Pen-testing is Dead?
 
How To [relatively] Secure your Web Applications
How To [relatively] Secure your Web ApplicationsHow To [relatively] Secure your Web Applications
How To [relatively] Secure your Web Applications
 
A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!A Journey Into Pen-tester land: Myths or Facts!
A Journey Into Pen-tester land: Myths or Facts!
 
Cybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industryCybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industry
 
Bugbounty vs-0day
Bugbounty vs-0dayBugbounty vs-0day
Bugbounty vs-0day
 
Advanced Persistent Threat
Advanced Persistent ThreatAdvanced Persistent Threat
Advanced Persistent Threat
 
Mobile hacking, pentest, and malware
Mobile hacking, pentest, and malwareMobile hacking, pentest, and malware
Mobile hacking, pentest, and malware
 
Hacker? : it's not about Black or White
Hacker? : it's not about Black or WhiteHacker? : it's not about Black or White
Hacker? : it's not about Black or White
 
Introduction to IOS Application Penetration Testing
Introduction to IOS Application Penetration TestingIntroduction to IOS Application Penetration Testing
Introduction to IOS Application Penetration Testing
 
Burp suite
Burp suiteBurp suite
Burp suite
 
Web Hacking (basic)
Web Hacking (basic)Web Hacking (basic)
Web Hacking (basic)
 
Network Packet Analysis
Network Packet AnalysisNetwork Packet Analysis
Network Packet Analysis
 
Packet analysis (Basic)
Packet analysis (Basic)Packet analysis (Basic)
Packet analysis (Basic)
 
Network security
Network securityNetwork security
Network security
 
Penetration testing
Penetration testingPenetration testing
Penetration testing
 
Information Security Professional
Information Security ProfessionalInformation Security Professional
Information Security Professional
 
Handout infosec defense-mechanism-y3dips
Handout infosec defense-mechanism-y3dipsHandout infosec defense-mechanism-y3dips
Handout infosec defense-mechanism-y3dips
 
Layer 7 denial of services attack mitigation
Layer 7 denial of services attack mitigationLayer 7 denial of services attack mitigation
Layer 7 denial of services attack mitigation
 
How To Become A Hacker
How To Become A HackerHow To Become A Hacker
How To Become A Hacker
 

Recently uploaded

Global Lighthouse Network - 2023
Global Lighthouse Network - 2023Global Lighthouse Network - 2023
Global Lighthouse Network - 2023Marcio Venturelli
 
Cybersecurity Fundamental Course by Haris Chughtai.pdf
Cybersecurity Fundamental Course by Haris Chughtai.pdfCybersecurity Fundamental Course by Haris Chughtai.pdf
Cybersecurity Fundamental Course by Haris Chughtai.pdfHaris Chughtai
 
Salesforce Developer Toolkit - Salesforce Impact Hackathon
Salesforce Developer Toolkit - Salesforce Impact HackathonSalesforce Developer Toolkit - Salesforce Impact Hackathon
Salesforce Developer Toolkit - Salesforce Impact Hackathonrohitasare71
 
panel-dividing-saw-sawteq-s-300-en.pdf
panel-dividing-saw-sawteq-s-300-en.pdfpanel-dividing-saw-sawteq-s-300-en.pdf
panel-dividing-saw-sawteq-s-300-en.pdfAmirStern2
 
5 Must-know Functionalities Of Sharepoint Intranet.pdf
5 Must-know Functionalities Of Sharepoint Intranet.pdf5 Must-know Functionalities Of Sharepoint Intranet.pdf
5 Must-know Functionalities Of Sharepoint Intranet.pdfMoreyeahs
 
IASW Drawings Final.pdf
IASW Drawings Final.pdfIASW Drawings Final.pdf
IASW Drawings Final.pdfehclark63
 
Webinar: SpiraTeam - A Jira Alternative to Revolutionize Your Project Management
Webinar: SpiraTeam - A Jira Alternative to Revolutionize Your Project ManagementWebinar: SpiraTeam - A Jira Alternative to Revolutionize Your Project Management
Webinar: SpiraTeam - A Jira Alternative to Revolutionize Your Project ManagementInflectra
 
Fundamentals of BI Report Testing - Module 7
Fundamentals of BI Report Testing - Module 7Fundamentals of BI Report Testing - Module 7
Fundamentals of BI Report Testing - Module 7MichaelCalabrese20
 
Career Talk Series: Session 1 - Transitioning from RPA to AI automation profe...
Career Talk Series: Session 1 - Transitioning from RPA to AI automation profe...Career Talk Series: Session 1 - Transitioning from RPA to AI automation profe...
Career Talk Series: Session 1 - Transitioning from RPA to AI automation profe...DianaGray10
 
ISC2 CC Course (Certified in Cybersecurity) - Part 2.pdf
ISC2 CC Course (Certified in Cybersecurity) - Part 2.pdfISC2 CC Course (Certified in Cybersecurity) - Part 2.pdf
ISC2 CC Course (Certified in Cybersecurity) - Part 2.pdfHaris Chughtai
 
Global Lighthouse Network - 2021
Global Lighthouse Network - 2021Global Lighthouse Network - 2021
Global Lighthouse Network - 2021Marcio Venturelli
 
panel-dividing-saw-sawteq-s-300-400-flextec-en.pdf
panel-dividing-saw-sawteq-s-300-400-flextec-en.pdfpanel-dividing-saw-sawteq-s-300-400-flextec-en.pdf
panel-dividing-saw-sawteq-s-300-400-flextec-en.pdfAmirStern2
 
Career Counseling - How to begin a career in Network & Cybersecurity.pdf
Career Counseling - How to begin a career in Network & Cybersecurity.pdfCareer Counseling - How to begin a career in Network & Cybersecurity.pdf
Career Counseling - How to begin a career in Network & Cybersecurity.pdfHaris Chughtai
 
UX Challenge User Interview - Check it out.pdf
UX Challenge User Interview - Check it out.pdfUX Challenge User Interview - Check it out.pdf
UX Challenge User Interview - Check it out.pdfsamsung664872
 
Analysis of algorithms
Analysis of algorithmsAnalysis of algorithms
Analysis of algorithmsAsen Bozhilov
 
Forms for All: Building Accessibility into UiPath App Design
Forms for All: Building Accessibility into UiPath App DesignForms for All: Building Accessibility into UiPath App Design
Forms for All: Building Accessibility into UiPath App DesignDianaGray10
 
top 5 world's richest countries
top 5 world's richest countriestop 5 world's richest countries
top 5 world's richest countriesAngelTalosig2
 
Empowering Currency Risk Mastery: Key Features of CorpHedge FX Management Sof...
Empowering Currency Risk Mastery: Key Features of CorpHedge FX Management Sof...Empowering Currency Risk Mastery: Key Features of CorpHedge FX Management Sof...
Empowering Currency Risk Mastery: Key Features of CorpHedge FX Management Sof...corphedge274
 
AMAZING BENEFITS OF AI IN DIGITAL MARKETING FOR ONLINE BUSINESSES (1).pptx
AMAZING BENEFITS OF AI IN DIGITAL MARKETING FOR ONLINE BUSINESSES (1).pptxAMAZING BENEFITS OF AI IN DIGITAL MARKETING FOR ONLINE BUSINESSES (1).pptx
AMAZING BENEFITS OF AI IN DIGITAL MARKETING FOR ONLINE BUSINESSES (1).pptxWriteMe
 
Green flag Wrap up Google Solution Challenge.pdf
Green flag Wrap up Google Solution Challenge.pdfGreen flag Wrap up Google Solution Challenge.pdf
Green flag Wrap up Google Solution Challenge.pdfGoogleDeveloperStude22
 

Recently uploaded (20)

Global Lighthouse Network - 2023
Global Lighthouse Network - 2023Global Lighthouse Network - 2023
Global Lighthouse Network - 2023
 
Cybersecurity Fundamental Course by Haris Chughtai.pdf
Cybersecurity Fundamental Course by Haris Chughtai.pdfCybersecurity Fundamental Course by Haris Chughtai.pdf
Cybersecurity Fundamental Course by Haris Chughtai.pdf
 
Salesforce Developer Toolkit - Salesforce Impact Hackathon
Salesforce Developer Toolkit - Salesforce Impact HackathonSalesforce Developer Toolkit - Salesforce Impact Hackathon
Salesforce Developer Toolkit - Salesforce Impact Hackathon
 
panel-dividing-saw-sawteq-s-300-en.pdf
panel-dividing-saw-sawteq-s-300-en.pdfpanel-dividing-saw-sawteq-s-300-en.pdf
panel-dividing-saw-sawteq-s-300-en.pdf
 
5 Must-know Functionalities Of Sharepoint Intranet.pdf
5 Must-know Functionalities Of Sharepoint Intranet.pdf5 Must-know Functionalities Of Sharepoint Intranet.pdf
5 Must-know Functionalities Of Sharepoint Intranet.pdf
 
IASW Drawings Final.pdf
IASW Drawings Final.pdfIASW Drawings Final.pdf
IASW Drawings Final.pdf
 
Webinar: SpiraTeam - A Jira Alternative to Revolutionize Your Project Management
Webinar: SpiraTeam - A Jira Alternative to Revolutionize Your Project ManagementWebinar: SpiraTeam - A Jira Alternative to Revolutionize Your Project Management
Webinar: SpiraTeam - A Jira Alternative to Revolutionize Your Project Management
 
Fundamentals of BI Report Testing - Module 7
Fundamentals of BI Report Testing - Module 7Fundamentals of BI Report Testing - Module 7
Fundamentals of BI Report Testing - Module 7
 
Career Talk Series: Session 1 - Transitioning from RPA to AI automation profe...
Career Talk Series: Session 1 - Transitioning from RPA to AI automation profe...Career Talk Series: Session 1 - Transitioning from RPA to AI automation profe...
Career Talk Series: Session 1 - Transitioning from RPA to AI automation profe...
 
ISC2 CC Course (Certified in Cybersecurity) - Part 2.pdf
ISC2 CC Course (Certified in Cybersecurity) - Part 2.pdfISC2 CC Course (Certified in Cybersecurity) - Part 2.pdf
ISC2 CC Course (Certified in Cybersecurity) - Part 2.pdf
 
Global Lighthouse Network - 2021
Global Lighthouse Network - 2021Global Lighthouse Network - 2021
Global Lighthouse Network - 2021
 
panel-dividing-saw-sawteq-s-300-400-flextec-en.pdf
panel-dividing-saw-sawteq-s-300-400-flextec-en.pdfpanel-dividing-saw-sawteq-s-300-400-flextec-en.pdf
panel-dividing-saw-sawteq-s-300-400-flextec-en.pdf
 
Career Counseling - How to begin a career in Network & Cybersecurity.pdf
Career Counseling - How to begin a career in Network & Cybersecurity.pdfCareer Counseling - How to begin a career in Network & Cybersecurity.pdf
Career Counseling - How to begin a career in Network & Cybersecurity.pdf
 
UX Challenge User Interview - Check it out.pdf
UX Challenge User Interview - Check it out.pdfUX Challenge User Interview - Check it out.pdf
UX Challenge User Interview - Check it out.pdf
 
Analysis of algorithms
Analysis of algorithmsAnalysis of algorithms
Analysis of algorithms
 
Forms for All: Building Accessibility into UiPath App Design
Forms for All: Building Accessibility into UiPath App DesignForms for All: Building Accessibility into UiPath App Design
Forms for All: Building Accessibility into UiPath App Design
 
top 5 world's richest countries
top 5 world's richest countriestop 5 world's richest countries
top 5 world's richest countries
 
Empowering Currency Risk Mastery: Key Features of CorpHedge FX Management Sof...
Empowering Currency Risk Mastery: Key Features of CorpHedge FX Management Sof...Empowering Currency Risk Mastery: Key Features of CorpHedge FX Management Sof...
Empowering Currency Risk Mastery: Key Features of CorpHedge FX Management Sof...
 
AMAZING BENEFITS OF AI IN DIGITAL MARKETING FOR ONLINE BUSINESSES (1).pptx
AMAZING BENEFITS OF AI IN DIGITAL MARKETING FOR ONLINE BUSINESSES (1).pptxAMAZING BENEFITS OF AI IN DIGITAL MARKETING FOR ONLINE BUSINESSES (1).pptx
AMAZING BENEFITS OF AI IN DIGITAL MARKETING FOR ONLINE BUSINESSES (1).pptx
 
Green flag Wrap up Google Solution Challenge.pdf
Green flag Wrap up Google Solution Challenge.pdfGreen flag Wrap up Google Solution Challenge.pdf
Green flag Wrap up Google Solution Challenge.pdf
 

linux security: interact with linux