Do you want to check if your account has been compromised in a data breach? It may not be your e-mail account or banking credentials that may have been compromised but it can also be e-mail address that was used or associated with some other type of service or account. It might be possible that you used your e-mail id somewhere to create an account or sign-up or even sign-in may have been compromised in a data breach and the attacker might use the same credentials i.e username or e-mail and password to gain access on a different website or service.
Continue reading “Password Help!”/etc/shadow file in Linux
The ‘/etc/shadow‘ file in Linux contains password and password related information of users listed in the /etc/passwd file.
An entry in /etc/shadow file contains nine entries/fields and looks like:
a:b:c:d:e:f:g:h:i
a → Username
The user name of whose the entry contains the password details.
Continue reading “/etc/shadow file in Linux”/etc/passwd file in Linux
The ‘/etc/passwd‘ file in Linux contains user and user related information.
An entry in /etc/passwd file contains seven entries/fields and looks like:
a:b:c:d:e:f:g
a → Username
username is between 1 and 32 characters in length.
b → Password
an ‘x‘ character indicates that encrypted password is stored in /etc/shadow file.
Continue reading “/etc/passwd file in Linux”Tor Enabled Sim Card Will Keep Communications Anonymous
Mobile and Internet communications have made our life a lot easier but at the same time it has also put our privacy vulnerable. Protecting the information online is one of the major challenge that we all face today. The goal has become to access everything without revealing anything. When it comes to privacy, almost no one can be trusted. There is even a possibility that out ISP provider or our VPN service provider is maintaining a log for everything that we do online and keeping a track on us and there is good chance that we are not aware of it.
Continue reading “Tor Enabled Sim Card Will Keep Communications Anonymous”Network Scanning Tool: Nmap
Nmap stands for “Network Mapper”.
It is a free and open source tool used for network scanning and security auditing. It was written by Gordon Lyon (also known by his pseudonym Fyodor Vaskovich). It supports different techniques like host discovery, port scanning, service discovery, OS detection, version detection and many more. It can be used to scan any type of network, even with many devices.
Nmap uses raw IP packets in different ways to determine the available hosts on the network, the services those hosts are offering, operating system (versions) they are running, the types of packet filters or firewalls in use, etc.
Syntax of nmap command:
nmap [Scan Type(s)] [Options] {target specifications}
Continue reading “Network Scanning Tool: Nmap”