Skip to content
Question Defense
Technical answers for technical questions
Question Defense
  • Backtrack Linux
    • Backtrack Article Request
  • HTTP ERROR
  • Kali Linux
    • Kali Linux Article Request
  • Privacy Policy
  • Tools
    • Class Of Device – Bluetooth CoD List In Binary And Hex
    • phpMyAdmin Blowfish Secret Generator
  • Documentation
    • check_postgres.pl
    • Linux Man Pages
      • insmod
      • kill
      • Logrotate
      • ls
      • lsmod
      • mail
      • modprobe
      • more
      • mysqldump
      • ntfsprogs
      • ntfsresize
      • pg_dump
      • psql
      • rmmod
      • screen
    • Monarch
      • Monarch Commands
      • Monarch Control
      • Monarch Escalations
      • Monarch Groups
      • Monarch Management of Nagios Hosts
      • Monarch Managing Nagios Contacts
      • Monarch Managing Nagios Hosts
      • Monarch Profiles
      • Monarch Services Template
      • Monarch Time Periods
      • Monarch Tools
  • Tags
  • Contact
Linkedin page opens in new windowTwitter page opens in new window
Search:
Search
  • Backtrack Linux
    • Backtrack Article Request
  • HTTP ERROR
  • Kali Linux
    • Kali Linux Article Request
  • Privacy Policy
  • Tools
    • Class Of Device – Bluetooth CoD List In Binary And Hex
    • phpMyAdmin Blowfish Secret Generator
  • Documentation
    • check_postgres.pl
    • Linux Man Pages
      • insmod
      • kill
      • Logrotate
      • ls
      • lsmod
      • mail
      • modprobe
      • more
      • mysqldump
      • ntfsprogs
      • ntfsresize
      • pg_dump
      • psql
      • rmmod
      • screen
    • Monarch
      • Monarch Commands
      • Monarch Control
      • Monarch Escalations
      • Monarch Groups
      • Monarch Management of Nagios Hosts
      • Monarch Managing Nagios Contacts
      • Monarch Managing Nagios Hosts
      • Monarch Profiles
      • Monarch Services Template
      • Monarch Time Periods
      • Monarch Tools
  • Tags
  • Contact

Blog

You are here:
  1. Home
Kali Linux Hacking Tools

ss : Backtrack 5: Non Menu Items: CLI Commands: ss

SecurityBy alexApril 7, 2012Leave a comment

The ss command is not necessarily specific to Backtrack but is typically included in most Linux or UNIX distributions. This is definitely a core utility though that should be in any pen testers arsenal as it provides great information about any type of socket socket including DCCP sockets, RAW sockets, TCP sockets, UDP sockets and…

Details
Technology Insights

Google Docs Spreadsheet: Have One Row Always Display At The Top Of The Spreadsheet

InsightsBy alexApril 6, 20123 Comments

Earlier tonight I was working on a spreadsheet with thousands of rows and over a dozen columns so I kept forgetting which column was which when working down inside the spreadsheet. I knew there was a way to have a a single row or multiple rows always display at the top of the spreadsheet but…

Details
Python Programming Language

list-urls.py Backtrack 5: Non Menu Items: Various Scripts: list-urls.py

SecurityBy alexApril 5, 2012Leave a comment

Backtrack includes a bunch of items that are not in the menu system such as the list-urls.py Python script. This script which has been enhanced by Muts simply queries a specific URL and extracts all of the URL’s from the page. These types of scripts really are handy and knowing your way around Backtrack can…

Details
Siege HTTP Load Testing and Benchmarking Tool

siege: Backtrack: Stress Testing: Network Stress Testing: siege

SecurityBy alexApril 4, 2012Leave a comment

Network stress testing is taken for granted sometimes however it is extremely useful in many aspects of a network. Typically when someone is thinking of stress testing something technology related they are thinking of stress testing a web application of some sort however it is beneficial to also stress test every piece of network hardware…

Details
Technology Errors

xorg-dev: Depends: libxfont-dev but it is not going to be installed

ErrorsBy alexApril 3, 2012Leave a comment

While getting a Mimo 7″ touchscreen USB monitor working earlier I needed to install some packages however when attempting to do so I received an error. Initially I thought that I had broken something on a system I had just installed BackTrack Linux on however that was not the case. Below I describe the error…

Details
Information Security

pdgmail: Backtrack: Forensics: RAM Forensics Tools: pdgmail

SecurityBy alexApril 2, 2012Leave a comment

We received a request for an article for pdgmail which is a Python script that analyzes Windows and Linux browser process dumps where the browser had Gmail open. I was able to test on 32-bit Windows 7, 64-bit Ubuntu 10.04 LTS, and 32-bit Ubuntu 10.04 LTS. Unfortunately the methods I was using did not work…

Details
Information Security

Backtrack 5: Information Gathering: Network Analysis: DNS Analysis: reverseraider

SecurityBy alexApril 1, 2012Leave a comment

So many of the DNS enumeration scripts available in backtrack focus on typical DNS but reverseraider does what it sounds like it might do which is enumerate reverse DNS names. Enumerating reverse DNS on an IP or set of IP’s can sometimes reveal information you did not previously have. It is possible to be targeting…

Details
Information Security

Backtrack 5: Information Gathering: Network Analysis: OS Fingerprinting: xprobe2

SecurityBy alexMarch 31, 2012Leave a comment

The xprobe2 application was built specifically for OS Fingerprinting or being able to accurately guess a servers Operating System. The unfortunate part about xprobe2 is that is extremely outdated and doesn’t even include Windows 7 in its list of OS’s that it can identify. Even though nmap is pretty much the staple for people to…

Details
Information Security

Backtrack 5: Information Gathering: Network Analysis: Identify Live Hosts: 0trace

SecurityBy alexMarch 30, 20122 Comments

I remember being so happy about 0trace when I started to write some Backtrack related articles because even though 0trace is fairly simple it is really useful to locate the full path to devices you are investigating. In the article below I will explain the necessary 0trace input from the command line, what needs to…

Details
1
2345678910111213141516
…1718192021…
222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173
174
Categories
  • Code Snippets
  • Errors
  • Insights
  • Labs
  • Security
Recent Posts
  • What Are The OWASP Top 10 Vulnerabilities? October 7, 2019
  • Improving WordPress: Security Tips October 2, 2019
  • MacOS Configure Default Mail Client September 30, 2019
Question Defense
© 2021 question-defense.com
Go to Top