vulnerabilities

All posts tagged vulnerabilities by Linux Bash
  • Posted on
    Featured Image
    The Linux Bash (Bourne-Again SHell) is not just a powerful shell and scripting language; it's a gateway to managing your entire Linux environment, from simple file operations to configuring systems and installing software. As Linux users often seek wider functionality beyond the core distribution packages, third-party software sources become invaluable. However, these sources also introduce a spectrum of security implications that users must navigate diligently. This article dives into understanding these third-party sources, assessing risks, and adopting best practices to maintain a secure Linux environment.
  • Posted on
    Featured Image
    With cyber threats on the rise, ensuring that your network's security configurations such as SSL (Secure Sockets Layer) and TLS (Transport Layer Security) are up to the mark is crucial. This is where sslscan, a powerful command-line tool, becomes an essential asset. sslscan tests SSL/TLS enabled services to discover supported cipher suites. In this blog, we explore what sslscan is, how to install it, and how to use it effectively. sslscan queries SSL/TLS services, such as HTTPS, to know what cipher suites are supported and provides other related details like certificate information. It is particularly useful for system administrators and security professionals for quick checks or automated tasks regarding SSL/TLS configuration assessments.