Wednesday, October 13
Shadow

Author: Masoom Reza

Migrate CentOS 8 to Rocky Linux 8

Migrate CentOS 8 to Rocky Linux 8

Linux
Rocky Linux is a new Linux distro that was born to fill the void that the passing of CentOS has open. It was also the first CentOS replacement to be announced following the news from Red Hat. Rocky Linux is a community enterprise operating system designed to be 100% compatible with RedHat Enterprise Linux. As of writing this guide, Rocky Linux 8.4 is available for x86_64 bit and ARM64 (aarch64) architectures. Download Rocky Linux Rocky Linux dev team has created a migration script called migrate2rocky to easily convert an existing CentOS 8 system to Rocky Linux 8. Step 1: Upgrade the current CentOS 8 Linux system to latest available version: [root@linuxhawks ~]# dnf --refresh upgrade After update is complete, reboot your system [root@linuxhawks ~]# reboot Step 2: C...
vi Editor In Linux

vi Editor In Linux

Linux
vi editor stands for the visual editor. It is the default editor that comes with Unix/Linux distribution. You can create, edit a file using vi editor. If you do not wish to modify the file, then just read it with the help of the vi editor. Syntax: [root@linuxhawks ~]# vi filename Modes of operation in vi editor There are basically three modes of operation in vi editor i.e. Command mode, Insert mode and Escape mode. 1. Command mode Initially, when a file opens in vi editor, it is in Command mode. In this mode, whatever character you type vi interprets as a command and hence does not display on the screen. This mode allows us to move through a file, and to delete, copy, or paste a piece of text.To enter into Command mode from any other mode, you need to press the [Esc] key. ...
How to create a local YUM repository?

How to create a local YUM repository?

Linux
What is YUM? YUM stands for Yellowdog Updater Modifier. This is a Package Management Tool (PMT) for the RedHat Package manager. YUM has been used for quite a long time. But, now in RHEL 8, we have a modest version of "yum" called "dnf" which stands for Dandified YUM. Although both the commands work fine in RHEL 8 Linux but DNF is much faster, as some of the bugs have been removed. Why you need a local yum repository? If you are working on a Linux system which is not having internet connectivity or behind some VPN where you cannot access the internet without using PROXY and you are tired of installing packages using rpm utility, then use YUM. RPM utility cannot install dependency packages. YUM resolves the package dependency automatically. It can automatically perform system updat...
Duf Utility In Linux To View Disk Usage

Duf Utility In Linux To View Disk Usage

Linux
The most commonly used application to view disk usage in Linux is du. Du stands for disk usage, is being widely used to find out which files and directories have occupied the most disk space. There are many other command lines and graphical tools that exist to accomplish this task. Today, we will cover a disk usage checker named duf. Duf (disk usage/free) is a command-line utility to find disk usage in Linux and Unix systems. It displays the disk usage details in a nice tabular-column and user-friendly layout. You can even get the disk usage output in JSON format as well. If the output exceeds the visible part of the screen, it automatically adjusts the terminal's width. You can sort the results by total size, filesystem type, used and free space, mount point, and inodes. ...
ace-VoIP Information Gathering Tool

ace-VoIP Information Gathering Tool

Kali
ACE (Automated Corporate Enumerator) is a simple yet powerful VoIP Corporate Directory enumeration tool that mimics the behavior of an IP Phone in order to download the name and extension entries that a given phone can display on its screen interface. In the same way that the “corporate directory” feature of VoIP hard phones enables users to easily dial by name via their VoIP handsets. ACE was developed as a research idea born from “VoIP Hopper” to automate VoIP attacks that can be targeted against names in an enterprise Directory. The concept is that in the future, attacks will be carried out against users based on their name, rather than targeting VoIP traffic against random RTP audio streams or IP addresses. ACE works by using DHCP, TFTP, and HTTP in order to download the VoIP corpo...
error

Enjoy this blog? Please spread the word :)