IPv6 Edition
Details
Release Info
32-bits were once plenty, and, depending on what you're numbering, still quite a bit. IPv4 public-addressing, however, is exhausted. To be clear, IPv4 remains omnipresent. It lurks, and, will continue to. However, IPv6 is silently manifesting in various areas, least of which is mobile. That's great. Spend some time exploring the significance of IPv6 and its promise to address every molecule known to man.Release Syllabus
Internet Protocol Version 6 Implementation
- Network - Visio Drawing - Topology Overview
- Explore classroom environment
- Discuss the protocols used
- Identify key infrastructure devices
- Explain network topology - Visio
- Discuss the IPv4 RFC-1918 Intranet & DMZ configuration
- Download and install NMap IPv4/IPv6 network scanning utility
- Query Intranet hosts using NMap
- Open Systems Interconnect (OSI) & TCP/IP|DOD Networking Models
- Discuss the OSI model
- Identify key IP-related services at various layers of the OSI model
- Explain Protocol Data Unit (PDU) framing at various OSI levels
- Discuss the DOD model
- Correlate TCP/IP|DOD model to the OSI model
- Identify and discuss key IPv4 layers of both networking models
- Identify and discuss key IPv6 layers of both networking models
- IPv4 Features & Limitations
- Discuss the history of IPv4
- Explain the flow of traffic in a typical IPv4 environment
- Explain IPv4 multiplexing
- Discuss Network Address Translation (NAT)
- Discuss classful and classless IPv4 addresses
- Explain the role subnet masks play in network delineation
- Discuss Address Resolution Protocol (ARP)
- Discuss IPv4 Internet Control Messaging Protocol (ICMP)
- Decode OSI layers (2-7) using 'tcpdump' packet sniffer/logger
- IPv6 Features
- Discuss the expanded bit-range used to define source/destination IPv6 addresses
- Explain the hierarchial nature of IPv6 prefixes
- Discuss the typical /48 organizational globally-unique prefix
- Explain typical ISP prefix assignments
- Discuss minimum Message Transfer Units (MTUs)
- Discuss automatic configuration of IPv6-enabled hosts - local|router|DHCP
- Explain NAT & ARP obsolescence in an IPv6 environment
- Discuss primary IPv6 address types - Unicast|Multicast|Anycast
- Describe the role multicast plays in solicitations/advertisments & reduced congestion
- Explain how layer-4 protocols (TCP/UDP) are implemented
- Identify Hexadecimal address representation
- Hexadecimal Conversions
- Analyze and discuss typical link local address auto-configured by IPv6
- Discuss the range of HEX characters
- Compare and contrast the boundaries of IPv6 and IPv4 addresses
- Explain some of the caveats of using decimal to represent IPv6 addresses
- Compare and contrast HEX and decimal character ranges
- Outline the rules for converting from decimal to HEX
- Translate decimal values to HEX
- Translate IPv4 broadcast address to HEX
- Convert IPv4 publicly routable address to a 6-to-4 IPv6 address
- Outline the rules for converting from HEX to decimal
- Translate HEX nibbles to decimal equivalent
- IPv6 Addressing - Colon Hexadecimal Notation
- List key IPv6 address rules
- Expand a 6-to-4 globally-unique IPv6 address to its full 128-bit representation
- Segment the 6-to-4 globally-unique IPv6 address into key sections
- Discuss the key sections of 6-to-4 IPv6 address with respect to routing and host identification
- Explain the rules and benefits of using Zero-compression with IPv6 addresses
- Identify unique IPv6 addresses and correlate to IPv4 - i.e. Loopback/Socket
- Identify and discuss 48-bit MAC addresses
- Explain the significance of MAC addresses in forming unique EUI-64 IPv6 addresses
- Discuss link local address limitations
- Identify key IPv6 sockets
- Use 'ping6' and 'ICMPv6' to communicate with various IPv6 addresses
- Identify the number of bits available for subnets and hosts
- IPv6 Header
- Discuss the benefits of a concise, fixed-length header
- Identify the characteristics of key IPv6 header fields
- Compare and contrast IPv4 and IPv6 headers
- Explain the benefits of extension headers
- Discuss how fragmentation is handled in IPv6
- ICMPv6 - Header & Applications
- Define ICMP
- Explain ICMPv6 applications
- Discuss ICMPv6 Neighbor Discovery (ND)
- Compare & contrast Neighbor Discovery to Address Resolutipn Protocol (ARP)
- List examples of ICMPv4 and ICMPv6 debugging utilities
- Explain levels of ICMPv6 messages
- Discuss important ICMPv6 error messages
- Compare and contrast ICMPv4 and ICMPv6 headers
- Use 'tcpdump' to decode ICMPv6 - Neighbor/Router Discoveries/Solicitations
- Explore ICMPv6's usage of multicast IPv6 addresses
- Discuss the role of Duplicate Address Detection (DAD) in IPv6 address conflict resolution
- Explain and explore neighbor tables
- Install RDesktop - RDP - Terminal Services client
- Connect to Windows Host in DMZ and attempt to communicate using Link Local IPv6 address
- Dual Protocol (IPv4 & IPv6) Stacks
- Discuss the pros and cons of dual protocol stacks
- Identify the independent stacks at various OSI layers
- Identify distinct IPv4 and IPv6 tools
- Enumerate and discuss the supported tunneling mechanisms in a dual-stack environment
- Explore default IPv4 and IPv6 routing tables
- Identify key unicast and multicast routing entries
- Explore IPv6 stacks on Linux | Windows | Solaris
- Discuss the pros and cons of dual protocol stacks
- Common IPv6 Prefixes/Subnets
- Define IPv6 Prefixes/Subnets
- Compare and contrast IPv4 subnets with IPv6 prefixes
- Identify key prefixes - loopback, link local, site local, ISP, ISP-assigned /48, /64 Unique Host
- Discuss how router configuration and advertisments influence host configuration
- Discuss multicast prefixes
- Link Local Prefixes and Addresses
- Indicate the standard Link Local prefix
- Analyze standard Link Local addresses
- Emphasize Link Local MAC address relationship - EUI-64
- Explain features and limitations of Link Local addresses
- Configure Cisco router with IPv6 support
- Confirm broadcast domain connectivity from DMZ and internal perspectives
- Intra Site Automatic Tunneling Protocol (ISATAP) Implementation
- Define ISATAP tunneling
- Provide examples of ISATAP applications
- Identify current IPv4 - globally unique address
- Create 6-to-4 globally unique IPv6 address for use in ISATAP configuration
- Configure Cisco router with ISATAP and globally-unique prefix
- Configure Windows server to use ISATAP
- Test IPv6 routing via ISATAP from Windows, Linux, Cisco and Solaris
- IPv6 Intranet Routing Using 6-to-4 Globally-Unique Prefixes
- Distinguish between privileged and non-privileged uses
- Identify the default shell for a given user
- Discuss features of BASH
- Execute BASH
- Discuss pseudo-terminals and how to identify connected terminals
- Modify user's accounts to default to BASH using shell & SMC
- Use 'su' to switch users
- Explore key BASH commands
- Focus on BASH input, output, and error redirection
- Explore BASH command chaining
- Use logical BASH operators (&&, ||) to control program logic
- Discuss and alter BASH global and user-specific configuration files
- Reveal key information using system info commands
- IPv6 over IPv4 - 6-to-4 Intranet/Internet Tunneling
- Discuss the pros and cons of 6-to-4 tunneling
- Compare and contrast ISATAP and 6-to-4 tunneling
- Disable ISATAP tunneling
- Confirm inability to route traffic using ISATAP with ICMPv6
- Create usable IPv6 prefixes based on 6-to-4 prefix
- Configure Cisco router's physical interfaces using 6-to-4 IPv6 prefixes
- Configure Cisco router's logical VLAN with a 6-to-4 prefix
- Confirm IPv6 internal routing between various physical and logical interfaces
- Test communications between Windows | Solaris | Linux hosts
- Configure 6-to-4 tunneling on external Cisco router interface
- Confirm communications with Internet IPv4 6-to-4 hosts using 6-to-4 tunneling
- Configure Cisco router to route IPv6 Internet traffic to 6-to-4 relays
- Test communications with native IPv6 Internet hosts & web sites from edge router
- Test native IPv6 communications from internal Linux | Windows | Solaris hosts
- Implement 6-to-4 tunneling on publicly-facing Linux hosts
- Test communications with 6-to-4 and native IPv6 hosts from public Linux boxes
- DNS Configuration with IPv6
- Explain classroom DNS architecture
- Discuss IPv6 DNS compatibility with BIND and Microsoft DNS
- Explain how to perform IPv6 queries using 'dig'
- Enumerate systems for IPv6 DNS inclusion
- Configure BIND DNS with IPv6 AAAA records for applicable hosts
- Test IPv6 DNS resolution
- Configure Microsoft DNS with IPv6 AAAA records for applicable hosts
- Test IPv6 DNS resolution using 'dig' and 'nslookup'
- Discuss reverse DNS nibble format
- Configure reverse IPv6 DNS
- Test reverse DNS
- Static IPv6 Address Configuration
- Discuss pros and cons of static IPv6 configuration
- Identify key configuration files
- Discuss rules related to unique IPv6 address creation
- Configure static IPv6 address for Solaris
- Configure static IPv6 address for Linux
- Configure static IPv6 address for Windows
- Confirm static addresses from various hosts
- Apache HTTPD & IIS IPv6 Configuration
- Discuss Apache IPv6 benefits and features
- Install Apache HTTPD
- Explain IPv6 address syntax when used in URLs
- Test connectivity to default Apache site using IPv6 address in browser
- Define IP-based virtual hosts with IPv6 support
- Test IP-based virtual host connectivity
- Define Name-based virtual hosts with IPv6 support
- Test Name-based virtual host connectivity
- Identify key files and utilities related to Apache SSL configuration
- Generate SSL/TLS certificates and assign to default web site
- Test secure SSL/TLS connectivity
- Generate multiple SSL/TLS certificates for multiple Apache virtual hosts
- Assign SSL/TLS certificates to various Apache virtual hosts
- Test secure SSL/TLS connectivity to Apachve virtual hosts
- Discuss caveats related to IIS IPv6 support on Windows
- Configure Internet Information Server (IIS) to support IPv6 on Windows
- Test accessing content served by IIS using IPv6
- Secure Shell Version 2 (SSHv2) IPv6 Implementation
- Discuss SSHv2 IPv4 and IPv6 connection features
- Assign IPv4 and IPv6 records to DNS configuration
- Confirm SSHv2 IPv6 configuration
- Connect to Linux and Solaris hosts using SSHv2 and IPv6
- Confirm connectivity via IPv6 on Linux/Solaris hosts
- Connect to Cisco router using SSHv2 and IPv6
- Confirm connectivity via IPv6 on Cisco router
- Use PuTTY on Windows server to connect to various IPv6 systems
- Confirm PuTTY IPv6 connectivity on destination systems
- Very Secure FTPD (VSFTPD) IPv6 Implemenation
- Explain VSFTPD's support for IPv6
- Configure VSFTPD to accept IPv6 traffic
- Examine network statistics table for IPv4 and IPv6
- Test connectivity from Linux | Windows | Solaris
- Network Mapper (NMap) IPv6 Implementation
- Discuss features and benefits of NMap
- Download and install NMap
- Explain IPv6 limitations
- Map the Intranet using IPv4
- Discuss rules related to NMap IPv6 scanning
- Scan the local system using IPv6
- Scan a range of IPv6 hosts
- Scan hosts using IPv6 DNS
- TCPDump Packet Capture Tool - IPv6 Implemenation
- Enumerate features and benefits of TCPDump
- Explain Berkeley Packet Filters (BPFs) used to parse IPv6 traffic
- Perform filtered and non-filtered IPv6 sniffs/dumps
- Examine results
- Log packets to TCPDump format for post-processing by Ethereal
- Capture clear-text communications and log to TCPDump for further analysis
- Ethereal Packet Capture/Analysis Tool - IPv6 Implemenation
- Discuss features & benefits
- Install Ethereal
- Alter X11 security to permit Ethereal to write to non-privileged user's desktop
- Explore Ethereal's Graphical User Interface (GUI)
- Store packet-capture profiles
- Capture IPv4 packets
- Analyze IPv4 packets
- Capture and analyze IPv6 packets
- Apply BPFs to packet capture profiles
- Compare and contrast capture and display filters
- Analyze TCPDump captures based on BPFs
- Filter BPF-based captures with display filters
- Examine layers 2-7 of OSI, including key IPv6 fields
- Capture IPv6 Neighbor Discoveries (NDs) and Router Advertisments (RAs)
- Examine results
- IP6Tables - Linux Firewall for IPv6
- Discuss features & benefits
- Compare and contrast IPTables (IPv4) with IP6Tables (IPv6)
- Identify key binaries and kernel loadable modules
- Explain IP6Tables' default tables and chains
- Write IPv6 ACLs using IP6Tables and commit configuration
- Test the results of IPv6 ACLs from various hosts
- Cisco Access Control Lists for IPv6
- Discuss features of IPv6 ACLS
- Define IPv6 ACL to protect the Virtual Terminal (vty) for SSH | Telnet access to router
- Apply VTY IPv6 ACL and test connectivity from various IPv4 and IPv6 hosts
- Test inbound communications from external IPv4 and IPv6 hosts
- Define and apply IPv6 ACL to protect external, Internet-facing IPv6 interface
- Test inbound IPv6 connectivity from external IPv6 hosts
- Use NMap to confirm IPv6 ACLs from inbound and outbound perspectives
- Evaluate IPv6 ACL counters and log
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5Cent9x-Stream Edition
Details
Release Info
CentOS offers a visage into the world of Red Hat Enterprise Linux (RHEL). It is a fork. Unlike its Enterprise counterpart, there are fewer encumbrances, especially vis-à-vis the all-too-important frequently required software updates. Use CentOS to align your Applications and Services with RHEL.Release Syllabus
CentOS9x Stream Administration
- Initial Environment
- ls, pwd, cd, cp, mv, rm, mkdir, rmdir, whoami
- alias, cat, file, chmod, chown, history
- STD(IN|OUT), Pipes, Redirection, Command Chaining
- ps, df, top, free
- Pagers, W-Commands
- Checksums
- Awk | Sed | Grep Usage
- BASH SHELL Environment
- Compression | Archival Tools
- SSH Equivalence
- SHELL Quoting
- Propagate Environment
- Secure Clients
- Identify Standard File Types
- Standard File Permissions
- Symbolic Links
- Transfer Permissions
- Identify SWAP environment
- Provision dedicated SWAP partitions
- Add | Remove SWAP from pool as needed
- Provision File System-based SWAP
- SWAP Share
- SWAP Persistence
- Identify default storage configuration
- Provision new storage as needed
- XFS - File System
- XFS - Grow File System
- Identify LVM defaults
- Add new partitions to LVM management
- Allocate storage to LVM Volume Groups
- Create Logical Volumes (LVs) as needed
- Overlay File System and mount where applicables
- LVM - Resize
- LVM - Mixed FS
- LVM - SWAP
- Features
- Install
- Defaults
- General Usage
- Update Accounts
- Defaults
- Shared PASS Gen
- Unique PASS Gen
- Encrypted PASS Gen
- Update Accounts
- Groups
- Discuss features | limitations
- Identify default system-wide schedule
- Peruse various default Cron Jobs
- Schedule simple job and monitor recurrence
- Evaluate results
- Peruse Default CONF
- Discuss Syslog Rules
- Explore Log Rotate defaults
- Ensure rotated logs are compressed
- Extend default retention scheme
- Force Log Rotation as needed
- Explore Default environment
- Install PKGs
- Dump important metadata from packages
- Apply Updates
- Default CONF
- Add | Confirm IPs as needed
- Install
- Copy Configuration
- SELinux - Confirm
- TLS | SSL Services
- cURL Client Tests
- Virtual Hosts
- ENC Sites Only
- SFTP Only USER
- SFTP Only USER - NOLOGIN
- SFTP Only Group - Control
- NMap Intro
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5SysLogD Edition
Details
Release Info
Traditional visibility into daemon | service | program communications, activities, errors, etc., relies upon SysLOG. SysLog has migrated over the years towards JournalD via SystemD services, however, SysLOG remains intrical to many services within and without Nix Instances. In this edition, explore some of the key features of rSysLogD, the defacto SysLOG engine.Release Syllabus
SysLOG with rSysLogD
- Discuss Features
- Default Environment
- Kernel Firewall LOG
- Split LOGs by Priorities
- UDP | TCP Logging
- Dual L4 Logging
- Multiple Hosts
- Basic Queueing
- Reliable Event Logging Protocol (RELP)
- RELP - Remote Only
- RELP Only
- Traditional to RELP
- SysLOG Clear-Text - Confirm
- Property Filters
- Expression Filters
- Relay Chain
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5NFTables Edition
Details
Release Info
NFTables (nft) provides a streamlined packet classification environment.Release Syllabus
Netfilter Tables
- Features
- SSHGuard
- Ruleset Basics
- Persistence
- Sample Rules
- Inbound Filtering
- Dormant Table
- Manage Tables | Chains | Rules
- Counters
- Sets
- LOG Basics
- LOG with Sets
- Closed-Port LOGs
- LOG Options
- Re-Route LOGs
- Jump Targets
- Chain Jumping
- GoTo Chains
- Meta Selectors
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5Deb12x Edition
Details
Release Info
Among the longstanding and well-maintained Distros is Debian. Its 'apt' package management framework is legendary; as is its commitment to supply por gratis, recurring security updates over a long horizon. Indeed, this distinguishes Debian and its relatives as the leading Linux Distros available.Release Syllabus
Debian 12x Administration
- Features
- Download
- Graphical Install
- Text Install
- Post-Install Tweaks
- Explore usage of the following useful commands
- tty | /dev/pts | w | whoami | who
- set | env | export | unset
- cat | echo | touch | rm
- pwd | ls | cd | mkdir | alias | umask
- head | tail
- dd
- find
- history
- STDIN, STDOUT, STDERR, UNIX Pipes, Redirection, Command Chaining
- ps, df, free, top, dd
- stat, which, w, who
- tar | gzip | bzip2 | xz
- ZSH Setup
- Explore SSH defaults
- Use SSH to connect to targets
- Transfer data with: scp | sftp | rsync
- Explain common Linux file permissions
- chmod | chgrp | chown
- Discuss various Linux file attributes | features
- SETUID | SETGID | STICKY Bit
- SymLinks: Hard | Soft
- Features
- useradd | adduser | usermod | userdel
- groupadd | groupmod | groupdel
- Create $USERs in Parallel
- $USER Passwords | mkpasswd | python3
- Generate Random Passwords
- Store Randomly-generated Passwords for Reference
- Encrypted Pass - Unique Users
- Default SHELL
- NO TTY Access
- Disable SSH Access
- Features
- Installation Defaults: File System Table
- Provision Storage
- GPT Label | Create Partition(s) | File System | Mount | Persistence
- Duplicate Drives
- Duplicate Varied Sizes
- Online Resizing (Up-Sizing)
- Provision SWAP
- Logical Volume Management (LVM)
- LVM Features
- Allocate Storage to LVM
- LVM | VG Resizing
- Fix sudo PATH
- Point-Release Upgrade
- Cron Features
- Cron Job Execution
- Journal Control Features
- Booted Kernels
- SystemD Features
- Explore default APT configuration
- Identify commonly-used package management tools
- Enumerate installed packages
- Identify package owners based on system binaries
- Discuss 'apt' and 'dpkg' options
- Install | Remove various packages
- Network Tools | IP Configuration
- Examine default IP configuration
- Extend IP configuration to facilitate additional addresses
- Static IP Config
- Dual: Dynamic | Static Config
- Multiple Interfaces
- Dual Network Services
- Confirm communications
- Features
- Restrict $USER to SFTP Access
- Confirm limited $SHELL
- SFTP-Only Group
- SFTP-Only Password AUTH
- Identifiy key NMAP configuration files
- Identify commonly used NMAP options/switches/parameters
- Scan Server resource
- Perform default TCP Connect-based ethical scans of local and remote resources
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5PHP-One-Liners Edition
Details
Release Info
PHP is more commonly known as a CGI processor; for Web-Applications. Perhaps you could call it a Middle-Tier. However, PHP also offers simple, but powerful CLI processing for common needs often provided via a hodgepodge of well-known $SHELL utilities. Either way, PHP makes it facile to achieve accounting where necessary, and simply via One-Liners.Release Syllabus
PHP One-Liners
- General Usage
- Count Lines
- Word Count
- Count Chars
- Split Lines into ARRAY
- Count Instances of Fields
- Transform Delimiters
- Anonymize LOGs
- Extract Unique SRCs
- Lines by Error Code
- LOG By Code
- Summarize Error Codes
- Pre-Seed Error Codes
- Random Strings
- Varied Passwords
- Expose Undefined Passwords
- Outdated Passwords
- Hash | Un-Hash
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5GlusterFS Edition
Details
Release Info
GlusterFS provides simple, cost-effective, scalable and reliable network-distributed volume | disk aggregation services. Quickly and effectively allocate storage for your applications with GlusterFS.Release Syllabus
Cloud Storage with GlusterFS
- Discuss Features:
- Default Volume Type
- Common Volume Types
- Transport Types
- File System Support
- Storage Model
- Features
- Provision Storage
- Allocate GlusterFS Brick
- Persistence
- Generate IO
- Multiple File Systems
- Various Sizes
- Stop | Remove Volume
- Reconstitute Volume
- Server Mount
- Evaluate
- Features
- Provision Storage
- Partition | FS | Mount | Brick
- Extend Volume
- Monitor IO Distribution
- Shrink Volume
- Confirm Reallocation
- Remove Bricks
- Add | Replace Bricks
- Confirm Data Transfer
- UUID Mounts
- Migrate Mounts
- Features
- Probe Storage Instances
- Provision Storage
- Extend Shared Volume
- Mount any Server
- List Storage Spread
- Dismantle Volume
- Confirm Data-Availability
- Volume Reconstruction
- Features
- Existing Bricks
- Re-Use Allocated Storage
- Define New Bricks
- Create Volume
- Generate | Monitor IO
- Fail NODEs
- Evaluate
- Features
- Explore Environment
- Create New Replica Volume
- Mount on Web Servers
- Ensure Persistence
- Update NginX Web Server Config
- Fetch Content
- Down Storage NODE | Test
- Restore NODE | Confirm Content
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5OpenPGPII Edition
Details
Release Info
GPG - OpenPGP - Provides a standard PKI Framework, supporting common Algorithms, for securing your data at-rest and in-transit.Release Syllabus
OpenPGP with GPG
- Discuss Features:
- Primary Tool
- Private | Public Keys
- Public Key Cryptography Standards (PKCS)
- Encryption | Decryption
- Signing | Verification
- Features
- General Usage
- Create Content
- Encrypt
- PassPhrase Protect
- Binary | Text Encryption
- Share
- Decrypt
- Features
- Vary Algos
- Compare Results
- Caveats
- Random PassPhrases
- Store PassPhrases
- Encrypt | Decrypt | Confirm
- Use Case
- Generate Keypairs
- Export | Import
- Share
- Sign
- URI Import
- Features
- Identify Public Keys
- Encrypt to Recipients
- Vary Key Identifcation
- Share Content
- Confirm Decryption
- Confirm Invalid Recipient
- Features
- Encryption | Decryption Distinction
- Sign | Share Content
- Confirm Signatures
- Missing Public Key
- Sign | Encrypt | Decrypt | Verify
- Encrypt | Sign | Verify | Decrypt
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5SSL-TLS Edition
Details
Release Info
Transport Layer Security (TLS) provides standards-based asymmetric and symmetric cryptographic solutions for your application needs.Release Syllabus
SSL-TLS with OpenSSL
- Discuss Features:
- Primary Tool
- Private | Public Keys
- Certificate Signing Requests (CSRs)
- Self-Signed Certificates
- Public Key Cryptography Standards (PKCS)
- Encryption | Decryption
- Random String Generation
- Message Digests
- SSL-TLS Client
- Features
- General Usage
- Retrieve Site Certificates
- Determine OCSP Configuration
- Probe supported TLS Versions
- Extract Certificate for local usage
- Retrieve Certificate with NMap
- Retrieve Certificate Chain
- Fetch Certificate
- x509 Query Fields
- Fingerprints
- One-Liner
- Export Public Key from Certificate
- Dump Public Key
- Generate Random Bytes
- Yield various Formats
- Create Random Files on Target
- Define Random $USERs
- Track defined $USERs
- Features
- Generate Digests
- Install SHA3-SUM
- Vary Content
- Compare Digests
- Remote Digests
- Store Digests
- Features
- Common Algorithms
- Generate Multiple Private Keys
- Export Public Keys
- Confirm Keys
- Remove and Re-Export Public Keys
- Generate Non-Default RSA Keys
- Password-Protected Keys
- Share PRIV_KEY and Confirm
- Features
- Base64 Encode | Decode
- AES-256 Encryption | Decryption
- Base64 Representation
- Decode | Decrypt
- Deterministic Examples
- Asymmetric Encrypts | Decrypts
- Features
- "pkeyutl" Sub-Command
- RSA Signatures
- ED(448|25519) Signatures
- RSA-PSS Signatures
- Eliptical Curve Signatures
- "-rawin" effect
- Encrypt | Sign | Verify | Decrypt
- Sign | Encrypt | Decrypt | Verify
- Discuss
- Generate Private Keys
- Generate Correlating CSRs
- Confirm Keys | CSRs
- Self-Signed Certificates
- Generate
- CA Store
- Root CA
- Various ALGOs
- Internal Domain
- SYMLINK Keys
- Password-Protected PRIV_KEY
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5$SHELL-Vars Edition
Details
Release Info
The $SHELL (all incarnations), provide a plethora of useful mechanisms that facilitate smoother and more automated operations. Core to reduced computing friction is $SHELL-Mastery.Release Syllabus
SHELL Variables
- Discuss Features
- Terminal (TTY)
- CLI Arguments
- Process ID
- Backgrounded
- SHELL Local
- Environment
- Persistence
- Aliases
- Command Substitution
- Increment | Decrement
- Dynamism