Author: Lipson Thomas Philip

Lipson Thomas Philip is a student of Masters in Network and Information Security at Griffith College, Limerick. He has done an internship in Cyber Cell, Gurugram 2021. His motive is to learn on a daily basis. As somebody said "Never stop learning". You learn new things knowing or unknowingly and as your life changes day by day.

What is the Domain Checker tool? Domain Checker is used to extracting the subdomain of a website. It is developed and managed by Ivan Glinkin. It is written in the bash scripting language. According to Ivan Glinkin, this tool is the demo version for the new External Attack Surface Management (EASM) system called HydrAttack. The primary idea is to find almost all the subdomains and the top 100 open ports. How to install the Domain Checker tool in any Linux? Before downloading and installing Domain Checker tool, install the prerequisite packages. The above command will install the both jq and geoip-bin packages.…

Read More

What Is Stacer? Stacer is a Graphical User Interface (GUI) application. It is used to optimize and monitor the Linux system. It is developed in C++ language. The Stacer tool is developed and managed by Oguzhan Inan. Along with Oguzhan, there are 61 code contributors and 10 financial contributors. The most recent version of Stacer is 1.1.0 and it was released on May 13 2019. The stacer offers a one-stop shop for many of the tasks a user frequently carries out in the Terminal and takes a lot of time, like managing packages, processes, host information, CPU, network, disk usage,…

Read More

Introduction The sudo command was created and developed by Bob Coggeshall and Cliff Spencer at the Department of Computer Science at SUNY/Buffalo about 1980. It was run on a VAX-11/750 with 4.1BSD. In December 1985, an upgraded version ascribed to Phil Betchel, Cliff Spencer, Gretchen Phillips, John LoVerso, and Don Gworek was submitted to the net.sources Usenet newsgroup. The sudo command is one of the primary and essential commands for any Linux user. The meaning of the sudo command is Super User Do. It gives power to the user to run any particular commands in superuser mode. This command is…

Read More

Hakrawler is a simple and fast tool to scan and crawl web pages in a few minutes. Bug bounty hunters use this tool to crawl all the URLs and easily store them in the text file. The Hakrawler tool was created by Luke Stephens, known as “Hakluke” in the cybersecurity community. He have a YouTube channel called Hakluke. This tool is written in the Go language and gathers all URLs and JavaScript file locations of a website. It will discover every endpoint and asset within a web application or a website. How does the Hakrawler work? When the user executes…

Read More

Introduction Terminal in any Linux distribution plays a crucial role to perform major tasks using commands. By default, Linux gives a basic terminal. The terminal is very useful for a server admin, programmer, or any Linux user. But, there is another terminal is there in the market called “Terminator”. It comes with additional features and customization as compared to the basic terminal, which makes tasks smoother. This tool is the best alternative for basic terminal and tmux. It is a GNOME application created by Chris Jones in 2007. Now, it is developing under a team. To know more about the…

Read More

Steghide is one of the best tools used for steganography. This tool was created by Stefan Hetzl in the year of 2003. Steghide is used to hide or embed files in images and audio. It uses a passphrase (any kind of password) to embed and extract private files. This tool is an easy, beginner-friendly, and configurable tool. The best thing about this tool is that it’s available for Linux and Windows. Steghide supports various formats for input such as PNG, JPG, JPEG, and BMP for images and AU and WAV for audio as the cover file. An image or audio…

Read More

What Is Steganography? Steganography is the art to hide information in images, audio, or videos. It is used by black hat hackers or criminals to communicate with each other without being noticed by government agencies. Black hat hackers use this technique to hide malicious payloads, ransomware, or viruses on the Internet. For example, an attacker used LSB method to hide ransomware or malware in the cracked software and released it on the Internet. When someone downloads that software and starts installing it. After installation, it automatically triggers the ransomware to run in the background. All the files will be encrypted,…

Read More

What is a Blackbird tool? Blackbird tool is created by p1ngul1n0. The primary purpose of this OSINT tool is to find all the social accounts from 120 social media websites. As the creator believes, this tool scans different 120 websites. This tool is created in python language and is very useful for OSINT. How to install the Blackbird tool? The only way to download the files of the blackbird tool is by git clone command. Note: Sometimes, it asks to be a root or sudo user to run the tool. The required files to install the tool are now downloaded…

Read More

What is a SemiAutoRecon tool? SemiAutoRecon is a multi-threaded network reconnaissance tool. It is used for semi-automated service enumeration. The features of this tool are all very customizable. It is meant to be used as a time-saving tool in CTFs and other penetration testing scenarios, for example, the OSCP exam). It is most emphatically useless in real-world interactions. This fantastic tool was created by Tib3rius, and it is the successor of the autorecon tool. Why use the SemiAutoRecon tool? SemiAutoRecon was inspired by three tools used during the OSCP labs by the author: Reconnoitre, ReconScan, and bscan. While all three…

Read More

What is the subfinder tool? Subfinder is used to discover or extract the subdomain of any website. Subfinder is developed and managed by Project Discovery. It uses passive online sources to locate good subdomains for websites. The passive online sources like Censys, Chaos, Recon.dev, Shodan, Spyse, Virustotal, and many other passive online sources. This tool is designed to do passive subdomain enumeration, and it does it exceptionally well. It was projected to be a successor to the sublist3r tool. Project Discovery created a subdomain finder tool to integrate all passive source licenses and usage limitations. It maintains a consistently passive…

Read More