EL-5x Edition
Details
Release Info
RedHat Enterprise Linux (RHEL) is a mature, and, stable Linux distribution. As its name (Enterprise) implies, its emphasis surrounds slow-and-steady updates, allowing your organization to plan accordingly. In this release, we explore some of the salient 'talking-points' surrounding RHEL.Release Syllabus
RedHat® Enterprise Linux Version 5x
- Installations - Local Media - Network - LVM- RAID5 - VMWare - Kickstart
- Explore network layout
- Discuss features of RedHat® Enterprise Linux 5
- Install RedHat Enterprise 5 on Dell Power Edge Server using local media
- VMWare - Virtual Machine Installation
- VMWare Network Installation
- Installation with RAID5
- Installation with Logical Volume Management (LVM) volumes
- Kickstart, automated installation
- Kickstart installation with RAID5
- FTP installation
- Explore - BIOS - GRUB - INIT environments
- Explain GNU/Linux System V Init Runlevel (0 - 6) concepts & applications
- Enter the Rescue environment
- Debug failed INITRD environments
- Common BASH Shell commands - Command Line Interface (CLI)
- pwd, touch, stat, ls - explore useful Linux system commands
- echo, cat - expose ASCII text and integrate with files
- cp - copy files
- mv - move files throughout the file system
- tar - explore features and advantages of tarballs
- gzip, bzip2, zip- intetgrate with tar and examine Internet archive
- diff - compare and contrast between 2 or 3 files - diff3
- file - discuss logic used to ascertain file type
- find - single and multiple expressions and criteria
- slocate - Compare and contrast with find and create system-wide DB
- w, wall, watch, whereis, which, who - Important w commands
- ps - explore process lists
- free & top - explore process management with top
- seq, top, jobs, fg, kill, killall, bg - Manage processes using standard tools
- Use grep to process lines
- Use awk to process fields
- Use sed to process text streams
- Explore Perl basics
- User and group creation & management concepts - passwd, shadow, group, gshadow files
- Use system-config-users to create and manage users and groups
- Permissions - Symlinks - Quotas - File System
Management
- Discuss & Identify file system permissions
- Create Symbolic links (hard & soft)
- Implement file system quotas
- Use FDISK
- Create Standard Linux Partition
- Make EXT2 File System & mount for general usage
- Remove EXT2 partition and create EXT3-based parition
- FSTAB - explore File System Table
- Use FDISK to create a swap partition
- Create Swap partition using MKSWAP & SWAPON
- Provision additional swap space using swapon & swapoff
- Create Swap space using files in conjunction with partitions
- Logical Volume Management (LVM) - Discuss concepts and applications
- Allocate partitions for usage with LVM
- Create Physical Volumes
- Create Volume Groups based on Physical Volumes
- Create Logical Volumes based on Volume Groups
- Mount and use LVM Volumes
- Resize LVM Volumes
- Create run-time RAID volumes
- Evaluate results
- Kickstart-based RAID Installation
- Use Kickstart tool to configure automated kickstart process
- Installation via HTTP using Kickstart
- Discuss RAID concepts and configuration
- Configure RAID disk partitions
- RPM | YUM Package Management Tools - Concepts & Usage
- Query existing packages & file-based packages
- Identify offline and online package repositories
- Install packages
- Upgrade packages
- Freshen packages
- Remove packages
- Create YUM repository
- Install packages using YUM
- CRON - System Scheduler
- Explore Cron Implementation
- Explain scheduling options
- Global and scope-based Cron options
- Schedules jobs to run & examine the output
- Configure individual Crontab entries
- Explore System Logging via SYSLOG and Logrotate
- Explore Boot log & System Log
- Explore dmesg
- Explanation of syslog facilities & levels
- Demonstrate syslog administration
- Enable SYSLOG network listener
- Demonstrate Cisco PIX Firewall to Linux SYSLOG functionality
- Explore automatic log rotation and customization via Logrotate
- Configure Logrotate to rotate & compress sample log files
- Explore Boot log & System Log
- Common Network Utilities
- Explore PING
- Use Telnet to test TCP ports
- Explore Netstat socket listings
- Use arp to reveal layer-2 information
- LFTP - basic usage, job control
- LFTP - mirror and reverse mirror content - resume transmission
- LFTP - batch, non-interactive, scripted mode
- Introduction to SSH concepts, implementation, etc.
- Use SSH Client to connect to remote Linux Systems using password authentication
- Identify key SSH-client files (.known_hosts, public/private key pairs,etc.)
- Authenticate to remote Linux systems using alternate credentials
- Use Secure Copy Protocol (SCP) to move data between systems non-interactively
- Use Secure File Transfer Protocol (SFTP) to move data between systems interactively
- Demonstrate how to generate Public/Private key (RSA/DSA) pairs using SSH-Keygen
- Demonstrate using SSH to authenticate to remote Linux hosts without passwords
- Install RedHat Enterprise Workstation on Dell Laptop using HTTP
- Generate Public Key/Private Key pairs for use with file and E-mail encryption
- Network Interface Configuration
- Discuss concepts
- Identify key files
- Configure aliased interfaces
- Evaluate results
- Kernel Concepts and Management
- NTSYSV & Chkconfig
- Identify and discuss kernel implementation
- Use kernel utils to identify modules and supported hardware
- Discuss proper kernel update procedures
- Download and Install the latest SMP-based kernel
- Confirm results
- Remove outdated kernel and confirm results
- Download and Install the latest Uniprocessor-based kernel
- Examine changes to GRUB and other key directory trees
- Explore ntsysv
- Explore chkconfig
- Identify and discuss kernel implementation
- Discuss concepts
- Implement Network Time Protocol (NTP) Client/Server
- Configure Network Time Protocol (NTP) to perform client/server time synchronization
- Synchronize SUSE Enterprise Linux NTP with additional Linux Stratum 2 NTP server
- Synchronize against Stratum 1 NTP servers
- Trivial File Transfer Protocol Daemon (TFTPD)
- Explain TFTPD Concepts & Applications
- Explore TFTPD configuration file
- Configure TFTPD with applicable options
- Backup Cisco configuration using TFTPD
- Very Secure File Transfer Protocol Daemon (VSFTPD)
- Explain VSFTPD Concepts & Applications
- Explore VSFTPD configuration file
- Configure VSFTPD with applicable options
- Connect to VSFTPD server
- TelnetD
- Explain Telnet Concepts & Applications
- Explore Telnet configuration files
- Evaluate Telnet connectivity
- Dynamic Host Configuration Protocol (DHCP)
- Explain DHCP Concepts & Applications
- Explore DHCP configuration files
- Configure DHCP subnet with applicable options
- Configure DHCP Reservation based on layer-2 address
- Domain Name System (DNS)
- Configure BIND as a caching-only DNS server
- Implement Master DNS Zone
- Configure Reverse Zone for local subnet
- Configure Master/Slave Zones with Linux Server
- Evaluate results of BIND configuration using DIG, nslookup & host
- Configure BIND with reverse DNS support
- Configure BIND with IPv6 support
- Network File System (NFS) Implementation
- Implement NFS Server
- Export shares and discuss options
- Mount NFS exports on remote Linux Host
- Implement AutoFS
- Samba Implementation
- Implement Linux & Windows Integration via Samba
- Explore Samba Configuration files
- Install Samba Server support
- Install Samba Web-based Administration Tool (SWAT)
- Configure Samba file sharing
- Configure Samba with multiple NETBIOS aliases
- Configure Samba-Active Directory Integration with Winbind
- Evaluate results
- Apache Web Server Implementation
- Discuss Apache server's features and concepts
- Examine Apache HTTPD CONF hierarchy
- Examine various configuration files
- Implement Apache Mod Alias
- Follow SYMLINKS
- Discuss and implement the Directory directive
- Restrict access to content based on IPs and subnets
- Discuss .htacess file with directives
- Configure IP-based Virtual Hosts
- Configure Name-based Virtual Hosts
- Implement Basic and digest authentication schemes
- Explore Apache logging semantics
- Implement Apache logging system per virtual host
- Configure Apache with SSL support
- MySQL® Relational Database Management System
- Install MySQL® Relational Database Management System
- Secure access to MySQL®
- Explore MySQL® monitor shell-based interface
- Create sample MySQL® database
- Populate with data and execute queries
- Evaluate results
- Install MySQL® Relational Database Management System
- Postfix Message Transfer Agent (MTA)
- Introduction to Sendmail Implementation
- Configure Postfix as default MTA
- Introduction to Postfix Message Transfer Agent (MTA)
- Explore the directives in the Postfix configuration files
- Define default values for the FQDN
- Alter myorigin and examine results
- Configure Postfix to route messages using a Smarthost
- Examine how Postfix delivers mail locally
- Configure SMTP Relaying in Postfix
- Use Mutt to demonstrate outbound mail handling using Postfix
- Define SMTP Virtual domains for hosting multiple DNS domains
- Configure Postfix with a production LinuxCBT DNS domain
- Examine Virtual domain routing with production and non-production DNS domains
- Internet Messaging Access Protocol (IMAP) - Dovecot
- Explain IMAP concepts and applications in comparison to POP3
- Implement IMAP services
- Connect to IMAP services from remote Windows Outlook Express client
- Implement IMAPS
- Generate new self-signed SSL certificate for use with IMAPS
- Explain IMAP concepts and applications in comparison to POP3
- Squirrel-mail Web-based Mail Interface Implementation
- Describe required squirrel mail components for web-mail integration
- Install squirrel mail on SUSE Enterprise Linux system
- Configure Apache virtual directory for squirrel mail integration
- Configure Apache Virtual Host for squirrel mail integration
- Configure BIND DNS services for squirrel mail integration
- Explore squirrel mail's web-based interface
- Describe required squirrel mail components for web-mail integration
- Squid Proxy Server
- Discuss features and benefits
- Explore configuration
- Enable and test Squid from a web browser
- Evaluate results
- SELinux Intro
- Discuss features and benefits
- Explore default configuration
- Enable | Disable SELinux
- Identify key tools
- Evaluate results
- GNU Privacy Guard (GPG) Implementation
- Discuss features and benefits
- Explore default configuration
- Generate usage keys
- Encrypt | Decrypt data
- Exchange encrypted data with remote user
- Evaluate results
- Secure Shell Daemon - Secure Communications Implementation
- Explore SSHD key configuration files
- Restrict access to SSHD
- Explore SSHD logging
- Execute remote commands in non-interactive mode using SSH
- Discuss forced-commands framework
- Configure SUSE Enterprise to accomodate forced-commands
- Test forced-commands for pre-configured accounts for push/pull secure transactions
- Integrate SSHD with Windows 2003 Server and PuTTY SSH client
- Implement PKI with PuTTY SSH
- Use PSCP and PSFTP to communicate securely from Windows
- Evaluate results
- IPTABLES (Netfilter Linux Kernel-based Firewall)
- Discuss IPTABLES/Netfilter Concepts
- Explore default tables and chains
- Define and test INPUT chain
- Define and test OUTPUT chain
- Create user-defined chain and evaluate results
- Explain IPTABLES default chains/filters and policies
- Examine TCP/ICMP communications pre-IPTABLES chains
- Filter traffic based on Layer-4 TCP/UDP (Source/Destination Ports) information
- Restrict access to SSH and test connectivity
- Implement IP Forwarding between disparate subnets
- Evaluate IPTables6 (IPv6) support
- NMAP - Port Scanner and Vulnerability Assessment Tool
- Obtain, and install current version of NMAP
- Identify commonly used NMAPoptions/switches/parameters
- Explain typical TCPhandshake protocol while using NMAP
- Identifiy key NMAP configuration files
- Use NMAP to perform operating system fingerprinting
- Peform subnet-wide ethical scans
- Perform default TCPSYN-based ethical scans of local and remote resources
- Examine the results of scans on remote Cisco firewall with debugging mode enabled
- Perform default TCPConnect-based ethical scans of local and remote resources
- Peform local ethical scans
- Discuss NMAP's features and applications
- Perform Connect/Syn/Fin and various ethical port-scans
- Perform service exposure scans
- Nessus Vulnerability Scanner
- Download and Install Nessus Vulnerability Scanner
- Register Nessus to obtain updated definitions
- Perform basic Nessus system configuration and start the daemon
- Use Nessus Linux client to connect to Nessus Server and perform scans
- Examine resuls of scanning local and remote hosts
- Evaluate results
- Snort® 2.x Network Intrusion Detection System (NIDS)
- Obtain, and install pre-requisites (libpcap/libpcre/etc.)
- Obtain, compile and install the Snort® Network Intrusion Detection System (NIDS)
- Identify and explain key operating modes (Sniffer/Logger/NIDS)
- Explore in network sniffer mode
- Explain OSI Model and relevant sniffing options
- Explore Snort® in ASCII and Binary (TCPDUMP) logging modes
- Output logs to ASCII text format and examine the results
- Output logs to binary format and examine the results
- Implement Snort® with BPF to filter traffic
- Generate traffic from remote Linux host and evaluate with Snort
- Use Snort® with Berkeley Packet Filter (BPF) to parse logs
- Implement Snort® in NIDS modes
- Explore the snort.conf file and discuss rules
- Explain Logging and Alerting output options
- Install BASE - Analysis package
- Perform port-scans from remote Linux systems and analyze Alerts using BASE
- Configure Snort® to log to SYSLOG
- RH5.4 Updates
- Upgrade to RH5.4
- Explore FUSE
- Use curl to retrieve data
- Implement RDesktop & TSClient
- Use screen to manage multiple TTYs
- Configure VNC Server
- Explore EXT4 file system
- Evaluate results
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5Sums Edition
Details
Release Info
Checksums ensure data-integrity, at-rest, cross-transit, and ultimately at-rest. Use them to verify Content as needed.Release Syllabus
Sums
- Various Tools
- Remote Confirmations
- File Metadata
- File Fragments
- Compress Content
- Archive Content
- DIR Hierarchy
- Password Sums
- Shared Secret
- Restrict History
- Downloaded Content
- Encrypt Content
- Site Credentials
- Site COOKIE
- Site COOKIE - Unique
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5Cent9x-Stream Edition
Details
Release Info
CentOS offers a visage into the world of Red Hat Enterprise Linux (RHEL). It is a fork. Unlike its Enterprise counterpart, there are fewer encumbrances, especially vis-à-vis the all-too-important frequently required software updates. Use CentOS to align your Applications and Services with RHEL.Release Syllabus
CentOS9x Stream Administration
- Initial Environment
- ls, pwd, cd, cp, mv, rm, mkdir, rmdir, whoami
- alias, cat, file, chmod, chown, history
- STD(IN|OUT), Pipes, Redirection, Command Chaining
- ps, df, top, free
- Pagers, W-Commands
- Checksums
- Awk | Sed | Grep Usage
- BASH SHELL Environment
- Compression | Archival Tools
- SSH Equivalence
- SHELL Quoting
- Propagate Environment
- Secure Clients
- Identify Standard File Types
- Standard File Permissions
- Symbolic Links
- Transfer Permissions
- Identify SWAP environment
- Provision dedicated SWAP partitions
- Add | Remove SWAP from pool as needed
- Provision File System-based SWAP
- SWAP Share
- SWAP Persistence
- Identify default storage configuration
- Provision new storage as needed
- XFS - File System
- XFS - Grow File System
- Identify LVM defaults
- Add new partitions to LVM management
- Allocate storage to LVM Volume Groups
- Create Logical Volumes (LVs) as needed
- Overlay File System and mount where applicables
- LVM - Resize
- LVM - Mixed FS
- LVM - SWAP
- Features
- Install
- Defaults
- General Usage
- Update Accounts
- Defaults
- Shared PASS Gen
- Unique PASS Gen
- Encrypted PASS Gen
- Update Accounts
- Groups
- Discuss features | limitations
- Identify default system-wide schedule
- Peruse various default Cron Jobs
- Schedule simple job and monitor recurrence
- Evaluate results
- Peruse Default CONF
- Discuss Syslog Rules
- Explore Log Rotate defaults
- Ensure rotated logs are compressed
- Extend default retention scheme
- Force Log Rotation as needed
- Explore Default environment
- Install PKGs
- Dump important metadata from packages
- Apply Updates
- Default CONF
- Add | Confirm IPs as needed
- Install
- Copy Configuration
- SELinux - Confirm
- TLS | SSL Services
- cURL Client Tests
- Virtual Hosts
- ENC Sites Only
- SFTP Only USER
- SFTP Only USER - NOLOGIN
- SFTP Only Group - Control
- NMap Intro
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5SysLogD Edition
Details
Release Info
Traditional visibility into daemon | service | program communications, activities, errors, etc., relies upon SysLOG. SysLog has migrated over the years towards JournalD via SystemD services, however, SysLOG remains intrical to many services within and without Nix Instances. In this edition, explore some of the key features of rSysLogD, the defacto SysLOG engine.Release Syllabus
SysLOG with rSysLogD
- Discuss Features
- Default Environment
- Kernel Firewall LOG
- Split LOGs by Priorities
- UDP | TCP Logging
- Dual L4 Logging
- Multiple Hosts
- Basic Queueing
- Reliable Event Logging Protocol (RELP)
- RELP - Remote Only
- RELP Only
- Traditional to RELP
- SysLOG Clear-Text - Confirm
- Property Filters
- Expression Filters
- Relay Chain
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5NFTables Edition
Details
Release Info
NFTables (nft) provides a streamlined packet classification environment.Release Syllabus
Netfilter Tables
- Features
- SSHGuard
- Ruleset Basics
- Persistence
- Sample Rules
- Inbound Filtering
- Dormant Table
- Manage Tables | Chains | Rules
- Counters
- Sets
- LOG Basics
- LOG with Sets
- Closed-Port LOGs
- LOG Options
- Re-Route LOGs
- Jump Targets
- Chain Jumping
- GoTo Chains
- Meta Selectors
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5Deb12x Edition
Details
Release Info
Among the longstanding and well-maintained Distros is Debian. Its 'apt' package management framework is legendary; as is its commitment to supply por gratis, recurring security updates over a long horizon. Indeed, this distinguishes Debian and its relatives as the leading Linux Distros available.Release Syllabus
Debian 12x Administration
- Features
- Download
- Graphical Install
- Text Install
- Post-Install Tweaks
- Explore usage of the following useful commands
- tty | /dev/pts | w | whoami | who
- set | env | export | unset
- cat | echo | touch | rm
- pwd | ls | cd | mkdir | alias | umask
- head | tail
- dd
- find
- history
- STDIN, STDOUT, STDERR, UNIX Pipes, Redirection, Command Chaining
- ps, df, free, top, dd
- stat, which, w, who
- tar | gzip | bzip2 | xz
- ZSH Setup
- Explore SSH defaults
- Use SSH to connect to targets
- Transfer data with: scp | sftp | rsync
- Explain common Linux file permissions
- chmod | chgrp | chown
- Discuss various Linux file attributes | features
- SETUID | SETGID | STICKY Bit
- SymLinks: Hard | Soft
- Features
- useradd | adduser | usermod | userdel
- groupadd | groupmod | groupdel
- Create $USERs in Parallel
- $USER Passwords | mkpasswd | python3
- Generate Random Passwords
- Store Randomly-generated Passwords for Reference
- Encrypted Pass - Unique Users
- Default SHELL
- NO TTY Access
- Disable SSH Access
- Features
- Installation Defaults: File System Table
- Provision Storage
- GPT Label | Create Partition(s) | File System | Mount | Persistence
- Duplicate Drives
- Duplicate Varied Sizes
- Online Resizing (Up-Sizing)
- Provision SWAP
- Logical Volume Management (LVM)
- LVM Features
- Allocate Storage to LVM
- LVM | VG Resizing
- Fix sudo PATH
- Point-Release Upgrade
- Cron Features
- Cron Job Execution
- Journal Control Features
- Booted Kernels
- SystemD Features
- Explore default APT configuration
- Identify commonly-used package management tools
- Enumerate installed packages
- Identify package owners based on system binaries
- Discuss 'apt' and 'dpkg' options
- Install | Remove various packages
- Network Tools | IP Configuration
- Examine default IP configuration
- Extend IP configuration to facilitate additional addresses
- Static IP Config
- Dual: Dynamic | Static Config
- Multiple Interfaces
- Dual Network Services
- Confirm communications
- Features
- Restrict $USER to SFTP Access
- Confirm limited $SHELL
- SFTP-Only Group
- SFTP-Only Password AUTH
- Identifiy key NMAP configuration files
- Identify commonly used NMAP options/switches/parameters
- Scan Server resource
- Perform default TCP Connect-based ethical scans of local and remote resources
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5PHP-One-Liners Edition
Details
Release Info
PHP is more commonly known as a CGI processor; for Web-Applications. Perhaps you could call it a Middle-Tier. However, PHP also offers simple, but powerful CLI processing for common needs often provided via a hodgepodge of well-known $SHELL utilities. Either way, PHP makes it facile to achieve accounting where necessary, and simply via One-Liners.Release Syllabus
PHP One-Liners
- General Usage
- Count Lines
- Word Count
- Count Chars
- Split Lines into ARRAY
- Count Instances of Fields
- Transform Delimiters
- Anonymize LOGs
- Extract Unique SRCs
- Lines by Error Code
- LOG By Code
- Summarize Error Codes
- Pre-Seed Error Codes
- Random Strings
- Varied Passwords
- Expose Undefined Passwords
- Outdated Passwords
- Hash | Un-Hash
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5GlusterFS Edition
Details
Release Info
GlusterFS provides simple, cost-effective, scalable and reliable network-distributed volume | disk aggregation services. Quickly and effectively allocate storage for your applications with GlusterFS.Release Syllabus
Cloud Storage with GlusterFS
- Discuss Features:
- Default Volume Type
- Common Volume Types
- Transport Types
- File System Support
- Storage Model
- Features
- Provision Storage
- Allocate GlusterFS Brick
- Persistence
- Generate IO
- Multiple File Systems
- Various Sizes
- Stop | Remove Volume
- Reconstitute Volume
- Server Mount
- Evaluate
- Features
- Provision Storage
- Partition | FS | Mount | Brick
- Extend Volume
- Monitor IO Distribution
- Shrink Volume
- Confirm Reallocation
- Remove Bricks
- Add | Replace Bricks
- Confirm Data Transfer
- UUID Mounts
- Migrate Mounts
- Features
- Probe Storage Instances
- Provision Storage
- Extend Shared Volume
- Mount any Server
- List Storage Spread
- Dismantle Volume
- Confirm Data-Availability
- Volume Reconstruction
- Features
- Existing Bricks
- Re-Use Allocated Storage
- Define New Bricks
- Create Volume
- Generate | Monitor IO
- Fail NODEs
- Evaluate
- Features
- Explore Environment
- Create New Replica Volume
- Mount on Web Servers
- Ensure Persistence
- Update NginX Web Server Config
- Fetch Content
- Down Storage NODE | Test
- Restore NODE | Confirm Content
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5OpenPGPII Edition
Details
Release Info
GPG - OpenPGP - Provides a standard PKI Framework, supporting common Algorithms, for securing your data at-rest and in-transit.Release Syllabus
OpenPGP with GPG
- Discuss Features:
- Primary Tool
- Private | Public Keys
- Public Key Cryptography Standards (PKCS)
- Encryption | Decryption
- Signing | Verification
- Features
- General Usage
- Create Content
- Encrypt
- PassPhrase Protect
- Binary | Text Encryption
- Share
- Decrypt
- Features
- Vary Algos
- Compare Results
- Caveats
- Random PassPhrases
- Store PassPhrases
- Encrypt | Decrypt | Confirm
- Use Case
- Generate Keypairs
- Export | Import
- Share
- Sign
- URI Import
- Features
- Identify Public Keys
- Encrypt to Recipients
- Vary Key Identifcation
- Share Content
- Confirm Decryption
- Confirm Invalid Recipient
- Features
- Encryption | Decryption Distinction
- Sign | Share Content
- Confirm Signatures
- Missing Public Key
- Sign | Encrypt | Decrypt | Verify
- Encrypt | Sign | Verify | Decrypt
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5SSL-TLS Edition
Details
Release Info
Transport Layer Security (TLS) provides standards-based asymmetric and symmetric cryptographic solutions for your application needs.Release Syllabus
SSL-TLS with OpenSSL
- Discuss Features:
- Primary Tool
- Private | Public Keys
- Certificate Signing Requests (CSRs)
- Self-Signed Certificates
- Public Key Cryptography Standards (PKCS)
- Encryption | Decryption
- Random String Generation
- Message Digests
- SSL-TLS Client
- Features
- General Usage
- Retrieve Site Certificates
- Determine OCSP Configuration
- Probe supported TLS Versions
- Extract Certificate for local usage
- Retrieve Certificate with NMap
- Retrieve Certificate Chain
- Fetch Certificate
- x509 Query Fields
- Fingerprints
- One-Liner
- Export Public Key from Certificate
- Dump Public Key
- Generate Random Bytes
- Yield various Formats
- Create Random Files on Target
- Define Random $USERs
- Track defined $USERs
- Features
- Generate Digests
- Install SHA3-SUM
- Vary Content
- Compare Digests
- Remote Digests
- Store Digests
- Features
- Common Algorithms
- Generate Multiple Private Keys
- Export Public Keys
- Confirm Keys
- Remove and Re-Export Public Keys
- Generate Non-Default RSA Keys
- Password-Protected Keys
- Share PRIV_KEY and Confirm
- Features
- Base64 Encode | Decode
- AES-256 Encryption | Decryption
- Base64 Representation
- Decode | Decrypt
- Deterministic Examples
- Asymmetric Encrypts | Decrypts
- Features
- "pkeyutl" Sub-Command
- RSA Signatures
- ED(448|25519) Signatures
- RSA-PSS Signatures
- Eliptical Curve Signatures
- "-rawin" effect
- Encrypt | Sign | Verify | Decrypt
- Sign | Encrypt | Decrypt | Verify
- Discuss
- Generate Private Keys
- Generate Correlating CSRs
- Confirm Keys | CSRs
- Self-Signed Certificates
- Generate
- CA Store
- Root CA
- Various ALGOs
- Internal Domain
- SYMLINK Keys
- Password-Protected PRIV_KEY
Tokyo Time
16:9Rate
1.25xWatched
1Completed
1 of 5$SHELL-Vars Edition
Details
Release Info
The $SHELL (all incarnations), provide a plethora of useful mechanisms that facilitate smoother and more automated operations. Core to reduced computing friction is $SHELL-Mastery.Release Syllabus
SHELL Variables
- Discuss Features
- Terminal (TTY)
- CLI Arguments
- Process ID
- Backgrounded
- SHELL Local
- Environment
- Persistence
- Aliases
- Command Substitution
- Increment | Decrement
- Dynamism