The Environment we will be using would be a VMWare setup on Windows. Kali Linux will be installed in the VM .
Download VMWare Workstation Player ( for windows ) and the Kali Linux ISO. ( Alternatively, you can directly download the VMWare image for Kali Linux directly — But we will be doing the first option )
These can be downloaded from here
Kali Linux ISO : https://www.kali.org/downloads/
Install the VMWare Environment ( straight forward )
From your VMWare setup, start your installation process ( select the Graphical Install option )
The major flaws with a ring topology is that if a device goes down or a cable is broken, then data will no longer be passed.
With a bus topology, all devices are connected to a single cable, often called the backbone. A major flaw in the bus topology is that it can’t handle a large amount of data.
Another massive LinkedIn data breach has been reported and almost 90 % of the users on LinkedIn have been affected.
Over 700 million users data has been leaked ( which accounts to 92% of the userbase) .
As of now we do not know if the passwords are also part of the breach data.
On June 21, the news was out in a forum with the data out for sale.
An unverified message…
Two questions answered here :
First things first — dedupe the entries in some files into a single file.
simplest way to do that would be to
Lets see the —
Lets say we have 3 files (
file1.txt file2.txt file3.txt)from which you want to extract the unique lines —
Step 1 : merging all files into
When you have to search some words using
grep and those words have special characters in them, you have to be careful and use the
-F parameter in
You might want to search for a password which might contain a special character like
% @ $ or
If you have a password file ( lets say
pass.txt ) with hashed passwords ( lets say
sha1 encryption )
It might contain lines like this :
and if you look at the count of lines that have
'sha1$' in it ,
$ grep ‘sha1$’ pass.txt …
At some point in time when you learn cracking passwords, you will have to end up creating your custom dictionaries . Over time these dictionaries grow as you add in more words . And that’s when you find it important to remove the duplicates from this file .
View the dictionary file
$ cat 1.txt password
Note : the words
hello are duplicated
sort 1.txt | uniq > out.txt
This sorts the words in 1.txt and pipes to the uniq command , which gets all the uniq words in the list and pipes…
On April 2021, University of Hertfordshire reported a disruption in their online activities, particularly services like online classrooms, zoom & Team meetings, Wi-Fi , email services and VPNs. 
A quick look at yet another data leak from an online eCommerce site — Bizongo.com . The news is still unfolding — So this post will be updated in the coming days.
Why the social media giant is becoming an increasing threat to the security of your data
Facebook is normalizing its data-leaks .
“The media attention around the data leak of 533 million users will die soon”
That was one of the messages that was passed on within the Facebook Corporate mailing threads — according to a supposedly leaked internal email. which was sent accidently to a Belgian news agency 
Excerpts of the mail below —