Penetration testing, often referred to as “pen testing” or “ethical hacking,” is a crucial practice in the field of cybersecurity. It involves the deliberate and authorized simulation of cyberattacks on computer systems, networks, or web applications to identify security vulnerabilities that could be exploited by malicious hackers. Penetration testing helps organizations assess the robustness of …
Continue reading Intro to Pentesting
Category:Penetration Testing
VPN Router (Road Warrior)
A machine in the middle between a VPN server and a Local Network, acting as a client for the VPN server (on the external interface) and as a Router for the Local Network (on the internal interface) is known as “Road Warrior”. The overall goal is to provide clients on the Local Network transparent communication …
Continue reading VPN Router (Road Warrior)
How to enable ssh root access in Ubuntu
This is not recommended for security reasons but in some cases can be useful to temporarily enable it Edit the file /etc/ssh/sshd_config Command: add the line: Code: reboot the system or type the command below Command: *Note: When root ssh access is not needed anymore remember to comment the added line with a # at …
Continue reading How to enable ssh root access in Ubuntu