How to Securing Linux system

In this article we shall focus on simple ways to make Linux systems more secure, from attackers point of view. Disabling ports All the unused ports need to be disabled. Ports such as 80/http, 22/ssh, 21/ftp if they are not in use. In Kali Linux all ports are disabled by default on boot. To disable …

Reconnaissance

Reconnaissance is the gain of information especially through survey.It is also the first stage in hacking. You can collect information from host, network or people involved. It takes place in two parts : a) Passive reconnaissance is the gain of information without probing the target system. It’s majorly use of search engines and other platforms …

How to Install and Setup Proxy-Chains in Linux

Proxy chains is an open source tool/software that is used to redirect connections either TCP or UDP(SOCKS5)  through the open proxies like SOCKS5, TOR, SOCKS4 and many others. With proxy chains anonymity can greatly be achieved. To setup proxy chains you need to check if TOR service, proxy chains are installed. which tor which proxychains …