Basic Linux Terminal Commands

Cheat Sheet [ Shortcuts ] CTRL L = Clear the terminal CTRL D = Logout CTRL A = Cursor to start of the line CTRL E = Cursor to end of the line CTRL U = Delete left CTRL K = Delete right CTRL W = Delete word on the left CTRL R = Reverse […]

{macOS_commands} terminal commands for MacOS. a-z.

today we dive into the macOS terminal window ¬†and discover the available commands we can run. so grab your coffee, sit down in the commanders seat, open that terminal window annnnnnnnddddddd……………type: { a } afconvert :// audio file convert afinfo :// audio file info afplay :// audio file play airport :// manage apple airport alias […]

{Nmap usage} how to scan networks & web applications

a self serving guide to nmap examples. / what is Nmap? Nmap is used to identify and scan systems on the network.  It is used as part of network diagnostics where it can map out the internal network by identifying live hosts and performing port scanning, service enumeration, and operating system detection. use cases: network […]

Top 4 ways to hack a Wi-Fi network

Learning about ways to pen-test Wi-Fi There is no one tool to rule them all when it comes to cracking a Wi-Fi network. It all depends on what the circumstance is at that current time, so choosing the right strategy is more likely to lead to success. This is some of the most effective strategies […]

Passwords.txt – Top Million Passwords

Create a large password list for brute force attacks; Feel free to download and use the two password lists below; password.txt > 999,998 most used passwords in Breach data. root.txt > 4,724 common root passwords. I recommend using [ ctrl + f ] and search for passwords you use. If they are in this list…change […]