Ankan Basu

Grep command to search and in place replace

Just a command worth saving.   grep -rl ‘findmatch’ filename | xargs sed -i ‘s/original/replacement/g’

Details

My favorite nmap commands

nmap –sT -p- -Pn 192.168.18.132 nmap –sS -p- -Pn 192.168.0.100 nmap –sUV 192.168.0.100 nmap –sX -p- -Pn 192.168.0.100 ...

Details

Add Git Branch Name to Shell Prompt

PS1=’\[\033[0;32m\]\[\033[0m\033[0;32m\]\u\[\033[0;36m\] @ \w\[\033[0;32m\]\n$(git branch 2>/dev/null | grep “^*” | colrm 1 2)\[\033[0;32m\]??\[\033[0m\033[0;32m\] \$\[\033[0m\033[0;32m\]\[\033[0m\] ‘ Credit: https://gist.github.com/justintv/168835  

Details

Reset default MySQL root pass in Centos 7

This post is mainly for my own benefit since I lost track of the steps I followed to ...

Details

Cryptography Warm Up – CTF challenge

Here is a starter problem for everyone. Since you will be using computer to break my secret code, ...

Details

Steganography Example – CTF – Chicken Curry

OK, in this Steganography challenge today, I have used one of my favorite dishes – chicken curry. This ...

Details

Top 10 Wireshark Fileters

I found this youtube video very useful to learn some of the most common WireShark filters. tcp,port == ...

Details

Steganography – Hide and Seek – Solve it

CTF lovers, I have hidden a secret message with the image of a “tree turtle” I took almost ...

Details

Hash Type in Linux Password

A reference table when you review /etc/shadow file: $1$ md5 $2a$ Blowfish $2y$ Blowfish, with correct handling of ...

Details