Posts

Showing posts from June, 2019

How to Configure Apache Web Server on Fedora

Image
Apache is a powerful, feature rich web server that is used for serving both static and dynamic websites and has been around since 1995. The latest version on Apache is Apache httpd 2.4.39 ,   and in this topic, you will learn how you can install and configure Apache web server on Fedora 27 and later. Prerequisites Before you beg in, its important to conduct a flight check and ensure the following requiements are met: An instance of Fedora 27 server SSH access to the Server Non-root user configured with sudo privileges Step 1. Install Apache on Fedora To get started, let’s first the system repositories. To do this, log in to your Server vua SSH and run the following command with sudo privileges $ sudo dnf update Next, install apache webserver using the command $ sudo dnf install httpd To start Apache2 web server run $ sudo systemctl start httpd To verify and confirm that Apache2 web server is running execute the command $ sudo syst...

Sandmap - A Tool to Use Advanced Scanning Techniques on Linux

Image
Sandmap is a nifty tool that supports network and system reconnaissance by leveraging the Nmap tool. Nmap is a free and opensource network scanning tool used for discovering active hosts, open ports and services running on those hosts. The application offers an enhanced user interface with advanced network scanning techniques and also helps in speeding up the scanning process. You need only the very basic linux command line knowledge to run these commands. key features A simple Command Line interface capable of running pure Nmap engine 31 modules having 45 scan profiles TOR support Predefined scans which are included in the modules Support for Nmap Scripting Engine (NSE) Prerequisites for installation Before we get started, ensure the following are installed on your system Nmap ProxyChains xterm Installation To get started, clone the git repository as shown # git clone https://github.com/trimstray/sandmap Output Next, navigate into the sandmap ...