ISP block Tor Network fix

Tor Browser running

Do you have a problem with using Tor network and you think that your ISP blocks connection to Tor ?!! Tor have the solution , just use it.ISP can block known Tor gateways , but can't block unknown dynamic bridges (or proxies) that redirect you to Tor Network, So let's see how easy it is … Continue reading ISP block Tor Network fix


How to install Kali Linux tools on Ubuntu based OS

How to install Kali Linux tools on Ubuntu

How to install Kali Linux tools on Ubuntu based OS. Many users needs only some tools from Kali Linux and don't prefer to install a full Kali OS , As Kali based on Ubuntu and APT package manager , you can easily add Kali tools repository to your Ubuntu , Debian OS. 01. Add Kali … Continue reading How to install Kali Linux tools on Ubuntu based OS

Kali linux crunch password lists generator

kali linux crunch password list generator

If you try to hack by brute forcing attack on password to login, or try to crack passwords hashes, you will need a good password list that fit your situation based on information you gathered about the target. Crunch is the tool that do all of that for you, it is flexible and easy to … Continue reading Kali linux crunch password lists generator

Linux SELinux

Security-Enhanced Linux (SELinux) is a Linux kernel security module that provides a mechanism for supporting access control security policies,it is a mandatory access controls (MAC) . It was a project by NSA and Red Hat and now being developed by Red Hat. A Linux kernel integrating SELinux enforces mandatory access control policies that confine user … Continue reading Linux SELinux

Linux Firewalld rich rules

Rich rules provide a much greater level of control through more custom granular options. Rich rules can also be used to configure logging, masquerading, port forwarding, and rate limiting. For Firewall basics, read this. For Firewall Zones and Services, read this. For Port-Forward and NAT, read this. For further information on the syntax of rich … Continue reading Linux Firewalld rich rules

Linux Firewalld Port-Forward and NAT

In computer networking, port forwarding or port mapping is an application of network address translation (NAT) that redirects a communication request from one address and port number combination to another while the packets are traversing a network gateway, such as a router or firewall. This technique is most commonly used to make services on a … Continue reading Linux Firewalld Port-Forward and NAT

Linux Firewalld Zones and Services

Zones are pre-constructed rulesets for various trust levels you would likely have for a given location or scenario (e.g. home, public, trusted, etc.). Different zones allow different network services and incoming traffic types while denying everything else. After enabling FirewallD for the first time, Public will be the default zone. Zones can also be applied … Continue reading Linux Firewalld Zones and Services