Posts

Showing posts with the label How To

Unveiling the HTTP/2 CONTINUATION Flood: A New Cybersecurity Threat

Image
In the dynamic world of cybersecurity, a new vulnerability within the HTTP/2 protocol has emerged, presenting a potent threat to web servers worldwide through Denial-of-Service (DoS) attacks. This article delves into the intricacies of the HTTP/2 CONTINUATION Flood, a technique capable of exploiting the CONTINUATION frame, uncovering a critical security oversight. Highlighting the findings of security researcher Bartek Nowotarski and the advisory from CERT Coordination Center (CERT/CC), we explore the implications of this vulnerability and the measures needed to combat it. Understanding HTTP/2 Vulnerability Discovered by Bartek Nowotarski and reported to CERT/CC on January 25, 2024, the HTTP/2 CONTINUATION Flood vulnerability shines a light on a significant flaw in the protocol’s design. CERT/CC’s advisory on April 3, 2024, provided a detailed account of how attackers could exploit this vulnerability to initiate DoS attacks against unsuspecting web servers. Key Vulnerability Insights E

How to Install Adminer on Ubuntu for Efficient Database Management

Image
 In this tutorial, we will Install Adminer on Ubuntu.  Adminer is a database management tool that allows you to mangage multiple types of databases.  It is similar to other tools such as phpMyAdmin and offers features such as data browsing, editing, and SQL command execution.  You can download the latest version of Adminer from the official website at https://www.adminer.org /. To install Adminer on Ubuntu, you can follow these steps: How does Adminer work ? Adminer works by providing a web-based interface for managing databases. When you access Adminer through a web browser, it connects to the specified database and displays a set of tools for managing the data and structure of the database. Some of the main features of Adminer include: Data browsing: Adminer allows you to view and search through the data in the tables of your database, including the ability to sort and filter the data. Data editing: You can use Adminer to add, edit, and delete records in your database tables, as well

How to check Disk is SSD or HDD on Linux

Image
In this tutorial, How to check Disk is SSD or HDD on Linux . Solid-state drives (SSDs) are fast, silent, and less prone to failure than traditional hard disk drives (HDDs). HDD store information on a rotating disk known as a platter SSD use flash memory to store and persist data. Using lsblk command to check HDD or SSD lsblk -o name,rota | tail If you get a 1 then the disk is an HDD. A 0 (zero) on the column rota is SSD. The output terminal as below: Using the cat Command cat /sys/block/sda/queue/rotational If the result is 1, then the disk is an HDD. the output 0 ( zero) that disk is ssd. The output terminal as below:  

How to Change Mac Address in Linux

Image
In this tutorial, we'll explore the process of changing MAC addresses in Linux. MAC addresses are used to uniquely identify devices on a network. Altering a MAC address can be useful for enhancing anonymity and security while connected to networks. Steps to Change MAC Address in Linux: 1. Open Terminal: Begin by opening the terminal and listing all network interfaces on your server using the following command: ip link show The output terminal below: 2. Select Interface: Identify the network interface for which you want to change the MAC address. For example, let's select the docker0 network interface. 3. Take Interface Down: Before changing the MAC address, take the selected network interface down using the following command: sudo ifconfig docker0 down 4. Change MAC Address: Now, you can change the MAC address to your desired value. For instance, to change from 02:42:c2:c6:e8:39 to 02:42:b2:b6:c8:40, use the following command: sudo ifconfig docker0 hw ether 02:42:b2:b6:c8:40