In this post I will share the link of the documentation for webinar ( “Hacking and Defending a Linux-Based Capture the Flag” ) held on 17 of April by Jay Beala. If you are not familiar with webinar, it is basically a web-based seminar. This Webinar mainly talked about how to attack Donkey Docker CTF case and how to defends it.
Click here to see the documentation.
DVWA which stand for Damn Vulnerable Web Application is a very vulnerable web application. Its existent helps us to study more about how to use ethical hacking tools in a safe environment without breaking the law.
Below is the steps of how to install the DVWA.
Linux shell scripting is basically a file that contains script, with this script you can give your shell permission to execute it. This is the example of how to install the bash shell if there is no scripting shell in your unix/linux terminal.