<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Stories by Ahm3d_Sec on Medium]]></title>
        <description><![CDATA[Stories by Ahm3d_Sec on Medium]]></description>
        <link>https://medium.com/@ahm3d_sec?source=rss-99d4c2899002------2</link>
        <image>
            <url>https://cdn-images-1.medium.com/fit/c/150/150/1*I_CDqzazEGv7LgaknN6QBQ.jpeg</url>
            <title>Stories by Ahm3d_Sec on Medium</title>
            <link>https://medium.com/@ahm3d_sec?source=rss-99d4c2899002------2</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Wed, 20 May 2026 13:47:06 GMT</lastBuildDate>
        <atom:link href="https://medium.com/@ahm3d_sec/feed" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[OverTheWire leviathan : level1-level7]]></title>
            <link>https://medium.com/@ahm3d_sec/overthewire-leviathan-level1-level7-74d8e220b317?source=rss-99d4c2899002------2</link>
            <guid isPermaLink="false">https://medium.com/p/74d8e220b317</guid>
            <category><![CDATA[overthewire]]></category>
            <category><![CDATA[ethical-hacking]]></category>
            <category><![CDATA[leviathan]]></category>
            <category><![CDATA[linux]]></category>
            <dc:creator><![CDATA[Ahm3d_Sec]]></dc:creator>
            <pubDate>Mon, 09 Mar 2026 01:53:25 GMT</pubDate>
            <atom:updated>2026-03-09T01:53:25.790Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/768/1*MNKk0qTWxmgvP0s79RSFzA.png" /></figure><h3>Introduction :</h3><p>The <a href="http://overthewire.org/wargames/leviathan/">Leviathan</a> wargame is an online game powered by the <a href="http://overthewire.org/">OverTheWire</a> community. This wargame doesn’t require any knowledge about programming, just some basic Linux commands.</p><p>This is a quick write-up of my solutions but, before you read that post, please, try your luck and do it yourself. Enjoy 🙂</p><h3>leviathan 00 Solution</h3><p>We have credentials :</p><ul><li>username: <strong>leviathan0</strong></li><li>password: <strong>leviathan0</strong></li><li>ssh server: <strong>leviathan.labs.overthewire.org</strong> with the port of <strong>2223</strong></li></ul><p>Now just SSH into the server, we found the .backup The directory contains an HTML file, we use cat bookmarks.html | grep password</p><p>The password is : <strong>PPIfmI1qsA</strong></p><h3>leviathan 01 Solution</h3><p>We have a <strong>setuid</strong> binary that checks or password, After I tried many most used passwords like “<strong>admin, password,12356, love, secret</strong>” nothing works</p><h3>What is ltrace :</h3><p>ltrace is a Linux command line that allows us to see dynamic library calls that a program makes during its execution.</p><p>Just run ltrace check , now just insert any random password like the following :</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/727/1*UZQeWI42vY19bE5VWCTNCA.png" /></figure><p>The binary compares any password if the password is equal to “<strong>sex”</strong> you get <strong>/bin/sh</strong> shell if not it said: <strong>Wrong password.</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/811/1*sHyoOkg1S9paaknq9cg7UQ.png" /></figure><p>I used <strong>/bin/bash -i</strong> to switch from /bin/sh shell into /bin/bash for more stability.. The passowrd stored in <strong><em>/etc/leviathan_pass/leviathan2</em></strong></p><p>The password is: <strong>mEh5PNl10e</strong></p><h3>Bonus :</h3><p>Here is a Python script that brute force the password instead of using ltrace :</p><pre>#!/usr/bin/python3<br><br>import os <br>wordlist =[&#39;123456&#39;, &#39;12345&#39;, &#39;123456789&#39;, &#39;password&#39;, &#39;iloveyou&#39;, &#39;princess&#39;, &#39;1234567&#39;, &#39;rockyou&#39;, &#39;12345678&#39;, &#39;abc123&#39;, &#39;love&#39;, &#39;moka&#39;, &#39;time&#39;, &#39;sex&#39;, &#39;prince&#39;, &#39;football&#39;, ]<br>for i in wordlist:<br>    a=os.popen(f&quot;echo {i} | /home/leviathan1/check&quot;)<br>    output = a.read()<br>    if &quot;Wrong&quot; in output:<br>        print(f&quot;[-] Trying {i}&quot;)<br>    else:<br>        print(f&quot;[+] Match Found  {i}&quot;.center(50,&quot;-&quot;))<br>        a.close<br>        break</pre><h3>leviathan 02 Solution</h3><p>As usual we have <strong>setuid</strong> binary that check if we have permission to read the content of our selected file .</p><p>we run ltrace ./printfile /etc/leviathan_pass/leviathan3</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/768/1*jdu2XqFbLROSzOREHbBIDQ.png" /></figure><p>To solve this just create directory in <strong>/tmp/level2</strong> and do the following :</p><ul><li>create /tmp/leve2 directory</li><li>create file in /tmp/level2/foo</li></ul><p>Now just run ./printfile /tmp/level2/&#39;foo;bash -p&#39;</p><ul><li>executing the binnary wile the file argument which is foo and adding second command .</li><li>bash -p tell linux to create bash shell with that user , As we know the binary owned by leviathan3</li></ul><figure><img alt="" src="https://cdn-images-1.medium.com/max/765/1*u-vBFcKRlhYeQdavQZERXw.png" /></figure><p>The password : <strong>Q0G8j4sakn</strong></p><h3>leviathan 03 Solution</h3><p>We have a binary in the home directory that asks for a password, A correct password leads us into shell.</p><p>After using <strong>ltrace</strong> we see the following :</p><pre>leviathan3@gibson:~$ ltrace ./level3 <br>__libc_start_main(0x80492bf, 1, 0xffffd504, 0 <br>strcmp(&quot;h0no33&quot;, &quot;kakaka&quot;)                                                         = -1<br>printf(&quot;Enter the password&gt; &quot;)                                                     = 20<br>fgets(Enter the password&gt; hello<br>&quot;hello\n&quot;, 256, 0xf7e2a620)                                                  = 0xffffd2dc<br>strcmp(&quot;hello\n&quot;, &quot;snlprintf\n&quot;)                                                   = -1<br>puts(&quot;bzzzzzzzzap. WRONG&quot;bzzzzzzzzap. WRONG<br>)                                                         = 19<br>+++ exited (status 0) +++<br>leviathan3@gibson:~$</pre><p>the function strcmp() used to compare to password , in this case comparing “hello” with “snlprintf” .</p><p>So we have now the password “snlprintf”</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/768/1*afFU4fORQZsH8pNUpViXYg.png" /></figure><h3>leviathan 04 Solution</h3><p>I found a hidden directory called .trash in the home folder, We have bin binary which is owned by leviathan5.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/768/1*9DLTkSTAJ1i3ED3jQXK7JQ.png" /></figure><p>Now just convert binary into ASCII I found an awesome <a href="https://www.binaryhexconverter.com/binary-to-ascii-text-converter">site</a> that converts binary into ASCII.</p><h3>What is Binary Data:</h3><p>The binary is 0 and 1 so every code, image, text, audio everything we write is converted automatically into 0 or 1 and stored and processed by a computer to give up the result.</p><h3>What is ASCII:</h3><p>ASCII is “American Standard Code for Information Interchange.” this means that it is a character encoder that assigns unique numbers (codes) to represent characters, for example:</p><ul><li>The ASCII code for the letter ‘A’ is 65.</li><li>The ASCII code for the digit ‘0’ is 48.</li><li>The ASCII code for the exclamation mark ‘!’ is 33. and so on</li></ul><figure><img alt="" src="https://cdn-images-1.medium.com/max/768/1*i6YUESD6hXbnXEuCxlkRKQ.png" /></figure><p>The password is : <strong>EKKlTF1Xqs</strong></p><h3>leviathan 05 Solution</h3><p>As usual, we have steuid binary that opens the /tmp/file.log, we use the command ln -s to create a link for a file in this case /etc/leviathan_pass/leviathan5.</p><pre>leviathan5@gibson:~$ ls<br>leviathan5<br>leviathan5@gibson:~$ ./leviathan5 <br>Cannot find /tmp/file.log<br>leviathan5@gibson:~$ ln -s /etc/leviathan_pass/leviathan6 /tmp/file.log<br>leviathan5@gibson:~$ ./leviathan5 <br>YZ55XPVk2l<br>leviathan5@gibson:~$</pre><p>The password is <strong>YZ55XPVk2l</strong></p><h3>leviathan 06–07 Solution (last one )</h3><p>We have a <strong>setuid</strong> binary that checks or password, After I tried many most used digit passwords like “0000,1234,4321,9999” nothing worked, so i decided to write the Python script :</p><pre>#!/usr/bin/python3<br><br>import os<br>import sys<br>binary = &quot;/home/leviathan6/leviathan6&quot;<br>for i in range(0, 9999):<br>    data = str(i).zfill(4)<br>    command = os.popen(f&quot;{binary} {data}&quot;)<br>    output = command.read()<br>    if &quot;Wrong&quot; in output:<br>        print(f&quot;Trying : {data}&quot;)<br>    else:<br>        print(f&quot;[+] Match found {output}&quot;)<br>        sys.exit(1)</pre><figure><img alt="" src="https://cdn-images-1.medium.com/max/768/1*vYR-6DhIiCu5SatOkGI5xg.png" /></figure><p>Now after reaching 7123, the script hangs indicating that the right password is <strong>7123 </strong>now just ran the binary agin with the password <strong>7123 </strong>you will see the<strong> /bin/sh </strong>spawn</p><pre>leviathan6@gibson:/tmp/aa$ cd ~<br>leviathan6@gibson:~$ ls<br>leviathan6<br>leviathan6@gibson:~$ ./leviathan6 7123<br>$ /bin/bash -i <br>leviathan7@gibson:~$ cat /etc/leviathan_pass/leviathan7 <br>8GpZ5f8Hze<br>leviathan7@gibson:~$</pre><p>I use cd ~ to change directory from /tmp/aa into /home/leviathan7/ .</p><p>The password is : <strong>8GpZ5f8Hze</strong></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=74d8e220b317" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[DNS Enumeration : The Beginners Guide]]></title>
            <link>https://medium.com/@ahm3d_sec/dns-enumeration-the-beginners-guide-54cd372de10f?source=rss-99d4c2899002------2</link>
            <guid isPermaLink="false">https://medium.com/p/54cd372de10f</guid>
            <category><![CDATA[dns]]></category>
            <category><![CDATA[linux-tutorial]]></category>
            <category><![CDATA[ethical-hacking]]></category>
            <dc:creator><![CDATA[Ahm3d_Sec]]></dc:creator>
            <pubDate>Sat, 07 Mar 2026 01:10:49 GMT</pubDate>
            <atom:updated>2026-03-07T01:10:49.717Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/768/1*o7weTfGui8un6FQVPYIRLw.png" /></figure><h3>Introduction :</h3><p>Hello everyone, and welcome to my blog! so today we gonna learn what is DNS and how DNS enumeration works in order to secure our home and organization network.</p><p>Have you ever wondered how DNS enumeration works? if not you are lucky today we gonna learn how DNS works in order to manipulate it right 🙂</p><h3>What is DNS :</h3><p>DNS stands for Domain Name System and provides a simple way for us to communicate with devices like smartphones, tablets, and servers on the internet without even remembering their IP.</p><p>An IP address is basically a set of 4-digit numbers like 192.168.1.1 ranging from 0–255 and looks like a house that has a unique address for sending mail directly to it.</p><p>When you want to visit a website, it’s not exactly convenient to remember this complicated set of numbers, and that’s where DNS helps.</p><h3>Domain Hierarchy:</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*yQCtNJEVk1R57BaFuKHz4g.png" /></figure><h3>Root :</h3><p>A root server is a nameserver in the Domain Name System whose role is to provide the addresses of top-level domain (TLD) servers</p><h3>Top-level domain (TLD):</h3><p>TLD is the last part of a domain name, for example, in the domain name thehackingmastery.org, the TLD is .org.</p><p>Top-level domains are basically used to identify various categories of websites, like <strong>.com</strong> for commercial websites, <strong>.org</strong> for non-profit organizations, <strong>.edu</strong> for educational, and so on.</p><p>There are many TLDs among them:</p><ul><li><strong>.com</strong> for commercial website</li><li><strong>.net</strong> for network websites</li><li><strong>.org</strong> for non-profit organizations</li><li><strong>.edu</strong> for educational websites</li><li><strong>.gov</strong> for government websites</li><li><strong>.mil</strong> for military websites</li><li><strong>.aero</strong> for aviation websites</li><li><strong>.asia</strong> for Asian websites</li><li><strong>.info</strong> for information websites</li><li><strong>.museum</strong> for museum websites</li><li><strong>.me</strong> for personal websites</li><li><strong>.biz</strong> for business websites</li><li><strong>.coop</strong> for cooperative websites</li></ul><p>TLDs are the most important part of the Domain Name System, which has the role of translating domain names like google.com into IP of 142.250.200.142. So when you type a domain name into your web browser, the DNS will look up the IP address of the website and direct your browser to that address.</p><h3>Second-level domain (SLD):</h3><p>The second-level domain is a domain that is directly below a top-level domain which is the <strong>root</strong>. For example, in <em>thehackingmastery.org,</em> an example is the second-level domain of the <strong>.org</strong></p><p>Second-level domain commonly refers to the organization that registers the domain name called the registrar.</p><h3>What is a Subdomain :</h3><p>The subdomain is basically a domain that is a small part of the main domain. For example, let’s say you have an online store and once a user wants to purchase an item instead of going into the main site <strong>exmple.com</strong> he will be redirected to <strong>payment.exmple.com</strong> in this example the web application uses the subdomain shop.example.com to process the payment process.</p><h3>hosts :</h3><p>A host file is a file used to map domain names to IP addresses and can be used as an alternative to a DNS server.</p><pre>127.0.0.1     localhost<br>255.255.255.255    broadcasthost<br>::1             localhost<br>223.145.12.73 thehackingmastery.org www.thehackingmastery.org</pre><p>For Windows, the host file is located in :</p><pre>C:\Windows\System32\Drivers\etc\hosts</pre><p>In Linux : /etc/hosts</p><h3>DNS Record</h3><h4>A Record</h4><p>Used to resolve to IPv4 addresses, for example, 104.248.10.217</p><h4>AAAA Record</h4><p>Used resolve to IPv6 addresses, for example 1603:434:20::681a:be1</p><h4>CNAME Record</h4><p>This type of record is used to resolve from the main domain into other domains, for example, let’s say we have <strong>example.com</strong> online shop has the subdomain name store.exmple.com which returns a CNAME record <strong>shops.shopify.com</strong>. Another DNS request would then be made to <strong>shops.shopify.com</strong> immediately.</p><h4>MX Record</h4><p>These types of records are used to resolve to the address of the servers that handle the email for the domain you are querying</p><h4>TXT Record</h4><p>TXT records are free text fields where any text-based data can be stored. Those TXT records have multiple uses, but some common ones can be <strong>to list</strong> servers that have <strong>the authority</strong> to send an email this can help in the battle against spam and spoofed email.</p><h3>DNS Enumeration:</h3><p>DNS enumeration is a common technique used by hackers to gather information about target networks like IP addresses, IPV6 address mail servers, and so on, for this demonstration we gonna see the most used DNS enumeration tools</p><h3>dig</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/843/1*jPV3_OMtE9Z_KmAVohZRww.png" /></figure><p>For this demonstration, we gonna use dig on google.com</p><pre>┌─[root@Intel]─[~]<br>└──╼ #dig google.com </pre><pre>; &lt;&lt;&gt;&gt; DiG 9.18.16-1~deb12u1~bpo11+1-Debian &lt;&lt;&gt;&gt; google.com<br>;; global options: +cmd<br>;; Got answer:<br>;; -&gt;&gt;HEADER&lt;&lt;- opcode: QUERY, status: NOERROR, id: 20011<br>;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1</pre><pre>;; OPT PSEUDOSECTION:<br>; EDNS: version: 0, flags:; udp: 4096<br>; COOKIE: 4167b39180ce7c431fab15f465480a0a20b875b739a62bff (good)<br>;; QUESTION SECTION:<br>;google.com.			IN	A</pre><pre>;; ANSWER SECTION:<br>google.com.		236	IN	A	142.250.200.142</pre><pre>;; Query time: 36 msec<br>;; SERVER: 192.168.1.1#53(192.168.1.1) (UDP)<br>;; WHEN: Sun Nov 05 22:34:05 +01 2023<br>;; MSG SIZE  rcvd: 83</pre><p>As you see that google.com domain has an IP address of <strong>142.250.200.142</strong>, we can also use the dig command to query for other types of DNS records like NS or TXT like the following :</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/753/1*dSDLSBEupUPp0uikqPqi_A.png" /></figure><p>This is for NS records:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/768/1*MpJNDazFT_6JFLWdbS0XVQ.png" /></figure><h3>host</h3><p>host is a simple DNS enumeration utility used to perform DNS lookups similar to dig</p><pre>┌─[root@Intel]─[~]<br>└──╼ #host google.com <br>google.com has address 142.250.201.78<br>google.com has IPv6 address 2a00:1450:4003:80f::200e<br>google.com mail is handled by 10 smtp.google.com.</pre><p>As you see the host command performs a query scan to A (IPV4), AAAA (IPV6), and mail by default</p><h3>DNSEnum</h3><p>It is a Perl script that gathers DNS information from a specified domain similar to dig and host command but it can also be used to to perform zone transfers and brute force subdomains.</p><p>DNSEnum is a discovery tool with multithread multi-function including nslookup, zone transfer, google scraping, reverse lookups, and finally domain brute force which makes DNSEum special then dig and host command.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/768/1*831dOmH5nHykN6iMWzN9bg.png" /></figure><p>Greate now to perform DNS enumeration with dnsenum just run the following :</p><p>dnsenum google.com</p><p>The output :</p><pre>Host&#39;s addresses:<br>__________________</pre><pre>google.com.                              13       IN    A        142.250.200.142<br></pre><pre>Name Servers:<br>______________</pre><pre>ns3.google.com.                          1800     IN    A        216.239.36.10<br>ns1.google.com.                          1800     IN    A        216.239.32.10<br>ns2.google.com.                          1800     IN    A        216.239.34.10<br>ns4.google.com.                          1800     IN    A        216.239.38.10<br></pre><pre>Mail (MX) Servers:<br>___________________</pre><pre>smtp.google.com.                         245      IN    A        142.250.102.26<br>smtp.google.com.                         245      IN    A        142.250.27.26<br>smtp.google.com.                         245      IN    A        142.250.102.27<br>smtp.google.com.                         245      IN    A        142.250.27.27</pre><h3>Conclusion:</h3><p>DNS enumeration is the most valuable technique for gathering information used by hackers and cyber security professionals about a domain, it has some potential risks such as leaking information from TXT records or performing denial of service. In that situation, you must use it at your own risk.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=54cd372de10f" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Active Directory : The Beginners Guide]]></title>
            <link>https://medium.com/@ahm3d_sec/active-directory-the-beginners-guide-6faf942c8ab7?source=rss-99d4c2899002------2</link>
            <guid isPermaLink="false">https://medium.com/p/6faf942c8ab7</guid>
            <category><![CDATA[windows]]></category>
            <category><![CDATA[active-directory]]></category>
            <category><![CDATA[windows-server]]></category>
            <category><![CDATA[azure-active-directory]]></category>
            <dc:creator><![CDATA[Ahm3d_Sec]]></dc:creator>
            <pubDate>Sat, 07 Mar 2026 00:54:48 GMT</pubDate>
            <atom:updated>2026-03-07T00:54:48.983Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/656/1*zjDn4eAGR7bvCaFYNnJwWQ.png" /></figure><h3>What is Active Directory :</h3><p>Active Directory is basically a service provided by Microsoft that allows companies schools, universities, and corporations to manage and organize their network and resources. Active Directory essentially allows us to centralize all computers, servers, and users in one server instead of managing or configuring users, servers, and computers one by one, that is helpful because it saves our time as you know time equals money.</p><h3>Advantages of Active Directory:</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*MKmRqyttO8Ufp8BLj7qD3A.png" /></figure><p>There are many reasons why organizations choose services like Active Directory. The main reason is Centralised identity management. That means users can log on and manage a variety of resources from one centralized place witch called the domain controller.</p><p>Administrators can easily create, delete, and disable users’ accounts in the domain controller which is the server that has the Active Directory installed on it. They can also set access permissions and control who can access specific resources or directories that increase security and create a secure environment.</p><p>Let’s imagine you are a student in school or university networks, you will usually be provided with a username and password that allow you to log in from any computers available on campus. Your credentials such as username and password are valid for all machines because whenever you input them on a machine you will be able to log in, this authentication will be automatically sent to the domain controller (the Active Directory server), which checks your credentials and validates whether your username and password are true or not. With Active Directory, your credentials don’t need to exist locally on each machine because they are sorted and available throughout the Active Directory network.</p><p>So basically in Active Directory teachers can allow or restrict students from accessing some applications or games in Windows clients or even accessing tick tock on university computers.</p><h3>Active Directory Tools :</h3><h3>Server Manager:</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*F47iXfQrF50E_Fzuu6sNCQ.png" /></figure><p>Server Manager is basically a Windows server management tool that provides us with a centralized interface for managing almost all of its environment functions. Server Manager allows us administrators to perform multiple tasks related to server configuration, like monitoring, maintenance, and so on.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/768/1*UEWYqxzQvRdGNObGgozhEA.png" /></figure><p>The Windows Server Manager tool allows us to install Active Directory, DNS, DHCP, Fax Server, and many more services with only a few clicks.</p><h3>Active Directory Domain and Trusts:</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/768/1*kRG6VDWu7zNaVNpVL18MmA.png" /></figure><p>Active Directory Domain and Trusts are normally used for managing relationships and trust between domains and forests in a Windows Server, so basically this tool allows administrators to manage domains and configure domain trees, and forest in settings.</p><h3>Active Directory Module for Windows Powershell :</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/768/1*WhdqOpYCL-qwdQEuMLA5Tw.png" /></figure><p>The Active Directory PowerShell is a set of cmd lines that make administrators run PowerShell commands in order to manage Active Directory from the PowerShell command line. These cmdlets are part of the Active Directory module that run command to add or remove users and groups and install new services like DNS DHCP from Active Directory Powershell.</p><h3>Active Directory Sites and Services :</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/768/1*yhHj7FBZm8x3moagX6PP6g.png" /></figure><p>Is a service that allows admins to manage and configure the replication topology and site infrastructure in an AD environment witch it is a must-use tool to show and manage the physical structure of the Active Directory forest of each building.</p><h3>Active Directory Users and Computers :</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/768/1*Ec8uBCLImBvQmf3uqW1-wg.png" /></figure><p>Active Directory Users and Groups provides a graphical user interface to configure and manage users, groups, computers, computers, and organizational units which is a set of small object containers that contain user services to make them easy to configure.</p><h3>ADSI Edit :</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/768/1*R1Aj9HHjpRy_MxZB1jLUNg.png" /></figure><p>ADSI stands for Active Directory Service Interfaces that allow IT administrators to display, edit, and hopefully create the object in Active Directory</p><p>It gives us a graphical user interface with an Active Directory database which allows us administrators to fully connect to different domains and domain controllers with the help of LDAP servers to perform various tasks related to directory services.</p><h3>Main Components of Active Directory:</h3><h3>Domain:</h3><p>Basically domain is a thing that connects users’ computers and other devices like printers to share files and communicate between devices in a network that is normally controlled by administrators using some security policy rules, the main goal is to centralize the management of all devices within the network.</p><h3>Domain Controller:</h3><p>Domain Controller is a server that an active directory was installed into it, Domain Controller allows users to log in to the cooperation domain to perform a certain action like sharing files over the network which makes administrators able to control them using some security policies.</p><h3>Organizational Units :</h3><p>Organizational units are something like manipulating containers, each container contains users, groups, and machines which makes it easier for the administration to make changes like adding or removing users from specific groups and so on.</p><h3>Group Policy:</h3><p>Groups Plocy is basically a set of rules and parameters that allows us administrators to control users, groups, and machines. For example, let’s say in university a teacher wants to block Microsoft Store (to not allow students to download games) from all computers connected in a domina “ST1.local”. With Group Policy the teacher can block Microsoft Store by selecting Local Group Policy Editor &gt; User Configuration -&gt; Administrative Templates -&gt; Windows Components -&gt; Store, and voila the Microsft Stor is blocked from all student computers.</p><h3>Replication:</h3><p>Replication means synchronization between the main Active Directory and other domain controllers affiliated with it, if the main active directory adds a new user called “john” then other domain controllers will add that user to their AD database.</p><h3>Conclusion :</h3><p>So Active Directory is an amazing service that keeps everything organized in the Windows Server network, which makes it easy for administrators to control everything within the network. It’s like a central hub that handles user, group, machine, web server, authentification, access permissions, resource management and so much more. Making the organization network work successfully in a secure environment.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=6faf942c8ab7" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Burp Suite : The Beginners Guide]]></title>
            <link>https://medium.com/@ahm3d_sec/burp-suite-the-beginners-guide-169c5f45acb3?source=rss-99d4c2899002------2</link>
            <guid isPermaLink="false">https://medium.com/p/169c5f45acb3</guid>
            <category><![CDATA[linux]]></category>
            <category><![CDATA[linux-tutorial]]></category>
            <category><![CDATA[burpsuite]]></category>
            <category><![CDATA[ethical-hacking]]></category>
            <dc:creator><![CDATA[Ahm3d_Sec]]></dc:creator>
            <pubDate>Thu, 05 Mar 2026 23:49:36 GMT</pubDate>
            <atom:updated>2026-03-05T23:49:36.429Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/768/1*Iox0MUXILxuy1phwzCyF_g.png" /></figure><h3>What is Burp Suite?</h3><p>Burp suite is a framework which is written in Java that allows us to interface and manipulate requests over a web application penetration.</p><p>Burp Suite had a pretty good reputation among the industry cybersecurity and hacking tools for hands-on web app security assessments. Burp Suite is also commonly used to penetrate mobile applications, it has some features that allow us to use APIs (Application Programming Interfaces) that power most mobile apps and web application</p><h3>Burp Suite installation :</h3><h3>For Linux:</h3><p>First, go into the Burp Suite <a href="https://portswigger.net/burp/releases/community/latest">download</a> section, then download the community edition because it is free, we love free stuff right 🙂</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*tmt_WUktGvlNnJR9STh-rA.png" /></figure><p>Once you download the Burp Suite Package to install it just run the following :</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/686/1*ObAu9plgfeGKXFxiETm7Dg.png" /></figure><pre>┌─[lol@Intel]─[/tmp/Download]<br>└──╼ $chmod +x burpsuite_community_linux_v2023_10_3_6.sh <br>┌─[lol@Intel]─[/tmp/Download]<br>└──╼ $./burpsuite_community_linux_v2023_10_3_6.sh <br>Unpacking JRE ...<br>Starting Installer ...</pre><p>Now a small window will prompt, just click next install and wait for the installation</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/510/1*RKjp8CxY0Bn-Vvn42nXHSA.png" /></figure><h3>For Windows :</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/768/1*TlwHZPv43HuL735yP6gV6A.png" /></figure><p>As usual, once you download the Burp Suite Community install it by clicking into the Burp installer and running it as administrator, you will prompt a small window just click next, next, and install like in the previous Linux installation.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/768/1*lDOg6-SNfrzfDA5H9WWzww.png" /></figure><h3>Installing the proxy extension :</h3><p>We need a proxy extension because it allows us to forward any request we make in the browser directly to Burp suite software in order to manipulate requests and penetrate web applications.</p><p>In my case, I have a Firefox browser. Now just install the <a href="https://addons.mozilla.org/fr/firefox/addon/foxyproxy-standard/">FoxyProxy</a> extension, once you install it it looks like this:</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/357/1*Kg9s_0a-kWEG4YdY4eS1mQ.png" /></figure><p>To add the <strong>burp</strong> configuration just click <strong>option</strong>&gt;<strong>add </strong>to copy my configuration, this allows you to connect the burp suite with the proxy extension so you turn it off whatever you want.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/768/1*QZOFhdt42sli9EzRMSCf1g.png" /></figure><h3>Installing Burp certificate :</h3><p>Burp Suite certificate is a certificate that makes an easy to intercept and analyze encrypted HTTPS traffic during web pen testing.</p><p>Well, this certificate should be installed in your browser to make the burp suite work properly while intercepting HTTP and HTTPS requests.</p><p>To install it you need first to enable the burp option in the FoxyProxy extension like this :</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/366/1*ozY_5oKRDo2AV3K_UMkYYw.png" /></figure><p>Then start your Burp Suite application and type in your browser <a href="http://burpsuite/">http://burpsuite/</a> then click <strong>CA Certificate</strong> to download the certificate</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/768/1*yLTgt67q4hTx-p4VbbJXng.png" /></figure><p>Finally, just install the burp ca certificate in Firefox by following this <a href="https://portswigger.net/burp/documentation/desktop/external-browser-config/certificate/ca-cert-firefox">article</a></p><h3>Components of Burp Suite</h3><h3>Proxy</h3><p>Proxy module, acting as a door between the client and the web application. By using the Proxy section users can intercept HTTP and HTTPS traffic, logs, and history requests by this it provides a deep visibility into the communication between the user and web server.</p><p>The main goal of the proxy section is to find or identify bugs and vulnerabilities in order to fix them.</p><h3>Intruder</h3><p>The Intruder module allows to perform attacks on web applications. Whatever brute force using some desired wordlists or fuzzing,</p><p>It enables you to configure your preference attacks whose main goal is to send crafted HTTP and HTTPS requests over and over again by injecting multiple different selected payloads into predefined positions every time.</p><p>Intruder enables us as Pentesters to focus analysis of potential vulnerabilities by brute forcing and fuzzing certain parts of the web application server to see how the web application reacts thus we can detect or even exploit vulnerabilities.</p><h3>Repeater</h3><p>The repeater module allows you to manually send and modify HTTP requests from proxy requests to the Repater section doing that makes precision testing easier.</p><p>Using the Repeater helps to make changes in requests by crafting server-side attacks in web applications, which includes finding and exploiting vulnerabilities in order to secure the environment.</p><h3>Scanner</h3><p>The Scanner module provides us with an automated process of identifying security vulnerabilities in web applications usually by scanning for common vulnerabilities by implumenting <strong>Owasp’s top 10.</strong> Usually, Owsap focuses on critical vulnerabilities that are mostly exploited worldwide.</p><p>By scanning for common threats such as SQL injection, Server Side Template Injection, and cross-site scripting, is really helpful while doing vulnerability assembly</p><h3>Decoder</h3><p>The Decoder module in Burp Suite serves the provide a more sophisticated option to encode and decode data within web applications for example:</p><ol><li>Perform URL decoding, then HTML decoding.</li><li>Edit the decoded data as you wish.</li><li>Reapply the HTML encoding, then the URL encoding.</li></ol><h3>Hands-on Practice</h3><p>Great now after we learn how to use Bupr Suite tools as well as install the FoxyProxy extension to penetrate any web application and mobile, we gonna spawn a vulnerable web server from Tryhackme to intercept and manipulate requests. As a wise man said: “Practice makes perfect” ❤️‍🔥</p><h3>Enumeration :</h3><p>The first thing you gonna do is scan that IP using Nmap by using the following command :</p><pre>nmap -sS -p- 10.10.31.189 | tee result.txt</pre><ul><li>nmap -sS used to do stealth scan</li><li>-p- tells Nmap to scan every port</li><li>10.10.31.189 is our vulnerable server IP address</li><li>tee result.txt used to save the output of Nmap in a file called result.txt</li></ul><pre>PORT     STATE    SERVICE<br>22/tcp   open     ssh<br>80/tcp   open     http<br>9999/tcp open     abyss</pre><h3>HTTP Server :</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/768/1*TMf9e0602lH0TCQo9vkTPw.png" /></figure><p>Now first thing we gonna do is to run on the burp option in the FoxyProxy extension, by doing that we will be able to run the Burp Suite properly.</p><p>Great now refresh your tab you will prompted in Burp Suite like that :</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/768/1*pHuDlKZSIU4g7UNA7DwCWw.png" /></figure><p>As we see in the picture above this how a request looks like, let’s explain what we have here :</p><ul><li>GET / used to fetch the content of the root in the web application, usually <em>index.hml</em> or <em>index.php</em>.</li><li>Host is the IP address of the target server</li><li>User-Agent is the name of your browser, in my case I use Firefox</li><li>Accept tells the webserver to accept text, images, HTML, and so on</li></ul><p>You can read more about request headers and how it works by clicking <a href="https://blog.postman.com/what-are-http-headers/">here</a></p><h3>Exploitation :</h3><p>As a web pentest, you must check for every page in the web application to see if there are any hidden bugs, the Support looks suspicious to me, let’s test it out 🙂</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/768/1*4oPPTQobDtq4zRZiiN9r_Q.png" /></figure><p>Let’s add contact information and see what web application react.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/622/1*n5fUztAF4QAYVkl0sXw2OA.png" /></figure><p>That is interesting as we can manipulate the email section to see if it is vulnerable to XSS. Cross-site scripting is a vulnerability that allows a hacker to inject malicious Javascript payload to non-sanitized input like search bar contact forum, and so on.</p><p>To do this let’s Intercept the support forum again and add our malicious payload</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/768/1*IltP1MKpiOath1kbjzv1PA.png" /></figure><p>Our XSS payload is telling the web application to say “<em>hacked</em>” just to test if it is vulnerable or not. Now forward this request and voila</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/612/1*5DKQ4F1x31RSVEf6LqTADQ.png" /></figure><p>Now we confirm that the server is vulnerable to XSS, let’s see if the web application is vulnerable to HTML injection, HTML injection is a vulnerability that allows a hacker to inject HTML code in non-sanitized input like search bar, comment, and support forms, and so on.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/768/1*4e4KiMzmMTKAPP2VecJvkA.png" /></figure><p>We use the <strong>h1</strong> attribute to make a title called “<em>Pwned 1337</em>” in the email section which is likely not sanitized.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/768/1*Bf0EApdQxPohRLHw_dlLLw.png" /></figure><h3>Conclusion :</h3><p>Burp Suite is a powerful tool that allows cyber security professionals to identify flow or vulnerability in web applications by fuzzing or brute forcing certain locations within the webserver to catch hidden vulnerabilities like XSS ( Cross-site scripting ), SQL injection, Server Side Template injection, and more critical vulnerability, this java tool can literally manipulate any request header and data by using the decoder section which can encode or decode data multiple time and forward the request into a web application to see how the server react to secure the web application from malicious attack.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=169c5f45acb3" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[What is Metasploit | The Beginner’s Guide]]></title>
            <link>https://medium.com/@ahm3d_sec/what-is-metasploit-the-beginners-guide-3556c995dd50?source=rss-99d4c2899002------2</link>
            <guid isPermaLink="false">https://medium.com/p/3556c995dd50</guid>
            <category><![CDATA[kali-linux]]></category>
            <category><![CDATA[linux]]></category>
            <category><![CDATA[ethical-hacking]]></category>
            <category><![CDATA[metasploit]]></category>
            <dc:creator><![CDATA[Ahm3d_Sec]]></dc:creator>
            <pubDate>Thu, 05 Mar 2026 23:34:32 GMT</pubDate>
            <atom:updated>2026-03-05T23:34:32.627Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/759/1*g5bheM9X5YlUYAic8Ac1Lg.png" /></figure><h3>Introduction :</h3><p>Metasploit is the most widely used exploitation framework in pen testing or red teaming. Metasploit is ruby ruby-based exploitation tool that is used to check for vulnerabilities in networks, and systems, in order to fix them before bad guys.</p><p>Metasploit had two versions: Metasploit Pro, Metasploit framework</p><ul><li><strong>Metasploit Pro: </strong>Had many benefits including facilitating the automation and management of tasks by using the Graphical User Interface (GUI)</li><li><strong>Metasploit Framework</strong>: It is an open source that uses only a command line interface (CLI).</li></ul><p>The Metasploit Framework has multiple tools that allow information gathering, scanning, exploitation, exploit development, post-exploitation, and more. The main usage of the Metasploit Framework focuses on penetration, vulnerability research, and exploit development.</p><h3>Component of Metasploit :</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*WiEKZ2g0IvfB5UDx7WkLDw.png" /></figure><h3>Msfconsole</h3><p>It is a command line interface for Metasploit which allows us to access and control various modules, payloads, and exploits.</p><h3>Armitage</h3><p>It is a graphical user interface of Metasploit that interface provides a more user-friendly way to interact with Metasploit and perform multiple tasks including managing targets and launching post exploitation attacks.</p><h3>Exploits</h3><p>exploits are malicious code that take over a target system by taking advantage of a vulnerability.</p><pre>├── aix<br>├── android<br>├── apple_ios<br>├── bsd<br>├── bsdi<br>├── dialup<br>├── firefox<br>├── freebsd<br>├── hpux<br>├── irix<br>├── linux<br>├── mainframe<br>├── multi<br>├── netware<br>├── openbsd<br>├── osx<br>├── qnx<br>├── solaris<br>├── unix<br>└── windows</pre><h3>Payloads</h3><p>Payloads are small pieces of code that are injected into a compromised system after an exploit is successful. They serve an attacker with countless options such as remote control, data exfiltration, and so on.</p><p>Metasploit can offer plenty of its payloads, including setting up reverse shells and interpreter sessions.</p><pre>── adapters<br>├── singles<br>├── stagers<br>└── stages</pre><h3>Auxiliary Modules:</h3><p>Auxiliary modules are used for scanning, fingerprinting, information gathering, and brute force attacks over networks, services, and software in Linux, windows, and Mac</p><pre>├── admin<br>├── analyze<br>├── bnat<br>├── client<br>├── cloud<br>├── crawler<br>├── docx<br>├── dos<br>├── fileformat<br>├── fuzzers<br>├── gather<br>├── parser<br>├── pdf<br>├── scanner<br>├── server<br>├── sniffer<br>├── spoof<br>├── sqli<br>├── voip<br>└── vsploit</pre><h3>Post Exploitation</h3><p>Once a system is compromised, this module allows attackers and pen testers to perform many tasks like privilege escalation, lateral movement, and data exfiltration with high-privilege</p><pre>├── admin<br>├── analyze<br>├── bnat<br>├── client<br>├── cloud<br>├── crawler<br>├── docx<br>├── dos<br>├── fileformat<br>├── fuzzers<br>├── gather<br>├── parser<br>├── pdf<br>├── scanner<br>├── server<br>├── sniffer<br>├── spoof<br>├── sqli<br>├── voip<br>└── vsploit</pre><h3>Shellcode</h3><p>It is a small piece of code that is injected into the vulnerable and exploited system’s memory as part of a payload. It is responsible for executing specific actions on the compromised system, such as spawning a shell, privilege escalation, post-exploitation, and so on.</p><h3>Encoders</h3><p>Encoders are typically a method, tools, or scripts used to obfuscate or encode malicious code like payloads and shellcodes in order to evade detection by antivirus software, and IDS “Intrusion detection system”</p><pre>├── cmd<br>├── generic<br>├── mipsbe<br>├── mipsle<br>├── php<br>├── ppc<br>├── ruby<br>├── sparc<br>├── x64<br>└── x86</pre><h3>Hands-on practice</h3><p>Awesome now that we know the component of Metasploit and how it works let’s apply it to this <a href="https://tryhackme.com/room/metasploitintro">vulnerable machine</a>.</p><h3>Enumeration :</h3><p>What enumeration means is to scan or gather information about any target we had permission to by using Nmap, if you don’t know what Nmap is just complete the Nmap <a href="https://tryhackme.com/room/furthernmap">room</a> in Tryhackme.</p><p>We run in our terminal the following : nmap -sS -sC -Pn 10.10.90.251</p><ul><li>Nmap is used to scan for open ports on the target machine in this case is a Windows server</li><li>-sS Tells Nmap to perform a SYN scan.</li><li>-sC allow Nmap to run the default script</li><li>-Pn 10.10.90.251 tells Nmap to scan our target without DNS checking</li></ul><pre>Starting Nmap 7.93 ( https://nmap.org ) at 2023-10-27 00:46 +01<br>Stats: 0:00:06 elapsed; 0 hosts completed (1 up), 1 undergoing SYN Stealth Scan<br>SYN Stealth Scan Timing: About 35.57% done; ETC: 00:47 (0:00:09 remaining)<br>Nmap scan report for 10.10.90.251<br>Host is up (0.11s latency).<br>Not shown: 991 closed tcp ports (reset)<br>PORT      STATE SERVICE<br>135/tcp   open  msrpc<br>139/tcp   open  netbios-ssn<br>445/tcp   open  microsoft-ds<br>3389/tcp  open  ms-wbt-server<br>49152/tcp open  unknown<br>49153/tcp open  unknown<br>49154/tcp open  unknown<br>49155/tcp open  unknown<br>49159/tcp open  unknown</pre><pre>Host script results:<br>| smb-security-mode: <br>|   account_used: guest<br>|   authentication_level: user<br>|   challenge_response: supported<br>|_  message_signing: disabled (dangerous, but default)<br>|_nbstat: NetBIOS name: JON-PC, NetBIOS user: , NetBIOS MAC: 02b850a3d2ef (unknown)<br>| smb2-time: <br>|   date: 2023-10-26T22:45:32<br>|_  start_date: 2023-10-26T22:40:57<br>|_clock-skew: mean: 38m26s, deviation: 2h53m12s, median: -1h01m34s<br>| smb2-security-mode: <br>|   210: <br>|_    Message signing enabled but not required<br>| smb-os-discovery: <br>|   OS: Windows 7 Professional 7601 Service Pack 1 (Windows 7 Professional 6.1)<br>|   OS CPE: cpe:/o:microsoft:windows_7::sp1:professional<br>|   Computer name: Jon-PC<br>|   NetBIOS computer name: JON-PC\x00<br>|   Workgroup: WORKGROUP\x00<br>|_  System time: 2023-10-26T17:45:32-05:00</pre><pre>Nmap done: 1 IP address (1 host up) scanned in 93.57 seconds</pre><p>As you see we have a lot of information including ports and their version and type of operation system. you may ask what Metasploit does with this, the answer is to find a vulnerability on the Windows server right 🙂</p><p>Now to start the Metasploit firmware just run <strong>msfconsole</strong> in your terminal and run the following command :</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*xbe3gcOPfUo7YKKXqSY54Q.png" /></figure><p>So basically eternalblue is a vulnerability in samba share in Windows which was exploited in 2017 by hackers used to create ransomware called <a href="https://fr.wikipedia.org/wiki/WannaCry">wannacry</a> which affected more than 200,000 Windows in the world Wilde.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/768/1*A9vZHqnfOZF3EBItLs_7aw.png" /></figure><p>As you see we use the <strong>options</strong> to see the choices we have in order to exploit this vulnerability</p><ul><li><strong>RHOSTS</strong>: Is the target machine in this case, it is a Windows server</li><li><strong>RPORT</strong> : The port that vulnerable software runs through, in this case, is the Samba server</li><li><strong>SMBUser</strong>: The username of samba share</li><li><strong>SMBPass</strong>: The password obviously</li><li><strong>LHOST</strong>: The attacker IP address, in this case, is tun0 because we use the Tryhackme VPN</li><li><strong>LPORT</strong>: Our desired prot the spawn the shell through</li></ul><figure><img alt="" src="https://cdn-images-1.medium.com/max/768/1*A6P0VGN5vNXj2fiut4KqEw.png" /></figure><p>Now type exploit to start the exploit in order to get the <strong>Meterpreter shell</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/768/1*AYJ2RylyEmFrnJy2I8pS_A.png" /></figure><p>Boom now you can do whatever you want in this Windows client, for example, you can run sysinfo to get more information about the user and his operating system like the following :</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/556/1*NkJpIGnVGF52EAAq32ASVQ.png" /></figure><p>Or your moves from Meterpreter session into running the cmd.exe command by running the shell</p><pre>(Meterpreter 1)(C:\Windows\system32) &gt; shell <br>Process 2948 created.<br>Channel 1 created.<br>Microsoft Windows [Version 6.1.7601]<br>Copyright (c) 2009 Microsoft Corporation.  All rights reserved.</pre><pre>C:\Windows\system32&gt;whoami<br>whoami<br>nt authority\system<br>C:\Windows\system32&gt;</pre><p>The funny is you can take screenshots from dark-pc by running screenshot in Meterpreter session</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/635/1*Yn0m8knIIV8FsKFWZ_XadA.png" /></figure><h3>The Screenshot :</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/768/1*oLf6lJnIjpZFwyqlwncM6Q.jpeg" /></figure><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=3556c995dd50" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Difference between Debian and Arch ?]]></title>
            <link>https://medium.com/@ahm3d_sec/difference-between-debian-and-arch-c42493363c7a?source=rss-99d4c2899002------2</link>
            <guid isPermaLink="false">https://medium.com/p/c42493363c7a</guid>
            <category><![CDATA[operating-systems]]></category>
            <category><![CDATA[arch-linux]]></category>
            <category><![CDATA[arch-vs-debian]]></category>
            <category><![CDATA[linux]]></category>
            <category><![CDATA[debian]]></category>
            <dc:creator><![CDATA[Ahm3d_Sec]]></dc:creator>
            <pubDate>Sun, 01 Mar 2026 16:16:29 GMT</pubDate>
            <atom:updated>2026-03-01T16:16:29.500Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/945/1*sQuycflTKDgQHQHI-EOyLw.jpeg" /></figure><h3>What is Debian Linux ?</h3><p>Debian is a well known open source Linux distribution that has earned a reputation for its stability, security, and adaptability. Ian Murdock founded it in 1993, and it has since grown into a large community driven project with thousands of developers and contributors from all over the globe. To handle software packages and updates, Debian employs the Debian package management system (dpkg) and the Advanced Packaging Tool (APT). It also supports a wide variety of hardware architectures and has an official repository with over 59,000 software packages. Debian is well known for its strict adherence to free software ideals and commitment to the GNU Project’s principles. Its development is driven by a volunteer community who work on different parts of the distribution, such as packaging and testing, as well as documentation and support.</p><p>based on the Linux kernel and includes a variety of software apps already installed, such as web browsers, office suites, multimedia tools, and more. Its package administration system, APT, makes it simple to install, remove, and update software packages. Debian is supported by a big community of developers and volunteers who collaborate to keep the system stable and up to date. Overall, Debian is known and trusted operating system that continues to serve as a solid foundation for many users’ computing requirements.</p><p>Debian values security, with daily security updates and patches, as well as features like SELinux and AppArmor that help prevent unauthorized access and defend against malware and other threats. Furthermore, Debian is highly customizable and can be adapted to plenty of use cases and tastes. It is widely used by individuals, businesses, educational institutions, and governments all over the globe, and it has a solid reputation for stability and dependability.</p><p>Overall, Debian is a strong and versatile operating system that has contributed significantly to the open source software community.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*Xx0P1IRJvr6b_ED3M1k72Q.png" /></figure><h3>What is Arch Linux ?</h3><p><a href="https://medium.com/@ahm3d_sec/what-is-arch-linux-108975114142">Arch </a>Linux is a free and open source Linux distribution famous for its ease of use, adaptability, and minimalism. It is a rolling release distribution, which means that rather than having specific releases with set software versions, it constantly updates its packages to provide users with the most recent software versions.</p><p>Arch Linux is lightweight and configurable, with a focus on simplicity and individual control. Pacman is a package management system that makes it simple to install, update, and handle software packages. Furthermore, Arch Linux is well known for its extensive documentation, which includes detailed directions on how to set up and customize the system to meet individual requirements.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*Gp7d0ZYLZt-dCWj4Mra0eA.jpeg" /></figure><p>rch Linux, unlike many other Linux distributions, does not include a graphical installer or a configured desktop experience. Instead, users must install and configure the system themselves, which can be intimidating for some users but offers a high level of flexibility and control over the system.</p><p>Arch Linux is popular among coders and advanced users who value its adaptability and customizability. It is popular for its speed, stability, and dependability, and its minimalistic approach makes it an excellent option for operating on older or less powerful hardware. Overall, Arch Linux is a well known and respected Linux distribution that gives users extensive control and customization over their machine.</p><h3>Difference between Debian and Arch:</h3><p>Debian has been near for over two decades and is a stable and dependable distribution. It is popular for focusing on security and stability, and its applications are thoroughly evaluated before being added to the official repositories. Debian has a big and active community, and it provides a diverse set of software packages for various use cases.</p><p>Arch, on the other hand, is a more modern distribution that aims to provide a straightforward, lightweight system that can be customized to suit the requirements of the user. Arch’s philosophy is to keep things simple and to provide the user with a basic set of tools that enable them to build their system from the ground up.</p><p>The package management method is one of the most noticeable differences between Debian and Arch. Debian employs the Advanced Package Tool (APT), an effective and user friendly software package management system. APT simplifies the installation, updating, and removal of packages while also ensuring that dependencies are taken care of properly.</p><p>Arch, on the other hand, uses the Pacman package manager, which is a more basic and command line based system. Pacman is known for being fast and effective, and it enables users to install and update packages quickly. It does, however, require more manual configuration than APT and does not always manage dependencies as well as APT.</p><p>The release schedule of Debian and Arch is another difference. Debian has a steady and slow release cycle, with significant releases every few years. This method guarantees that the distribution is stable and reliable, but it may also mean that some software packages are now out of present. Arch, on the other hand, has a rolling release schedule, which means that updates are constantly released and users always have the most up to date software.</p><p>In terms of user experience, Debian is usually considered to be more user friendly as well as simpler to use out of the box. Its installer is simple, and its default desktop experience (GNOME) is polished and simple to use. Arch, on the other hand, necessitates more preparation and configuration to get started. The installer is simple, and the user must install and setup the desktop environment, drivers, and other necessary tools themselves.</p><p>Finally, Debian and Arch are two very distinct Linux distributions that cater to very different user types. Debian is a stable and dependable distribution with a large number of software packages.</p><h3>Conclusion</h3><p>Debian and Arch are two famous Linux distributions that take very different approaches and have very different philosophies. Debian has been around since 1993 and is a stable, dependable, and popular distribution. It is well known for its strict adherence to free software ideals and big, well maintained software package repositories. Arch, on the other hand, is a more adaptable, customizable version aimed at advanced users who prefer a hands on approach to Linux. It has a minimalist philosophy and a rolling release model, which means that software updates are published on a regular basis and users have access to the most recent software versions. While Debian is perfect for those who value stability and usability.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=c42493363c7a" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[What Is Arch Linux ?]]></title>
            <link>https://medium.com/@ahm3d_sec/what-is-arch-linux-108975114142?source=rss-99d4c2899002------2</link>
            <guid isPermaLink="false">https://medium.com/p/108975114142</guid>
            <category><![CDATA[pacman]]></category>
            <category><![CDATA[archos]]></category>
            <category><![CDATA[linux]]></category>
            <category><![CDATA[operating-systems]]></category>
            <dc:creator><![CDATA[Ahm3d_Sec]]></dc:creator>
            <pubDate>Tue, 24 Feb 2026 14:42:55 GMT</pubDate>
            <atom:updated>2026-02-24T14:42:55.416Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/945/1*jylQDgKHoOXZeBK3ngJAWw.jpeg" /></figure><p>Experienced users have come to appreciate the freedom and beauty of Arch Linux, a potent, lightweight, and highly flexible operating system. In opposition to the majority of other Linux distributions, it uses a rolling release plans, which means that it is constantly updated with the most recent software releases, providing that users constantly have access to the best tools and features.<br>The simplicity of Arch Linux is one of its most unique characteristics. With only the basic components required for a usable operating system, it is meant to be as lean and efficient as possible. This means that users are in charge of setting up and installing any necessary additional software and components.<br>Also, Arch Linux has earned a reputation for its strong package management</p><p>Users can quickly install and manage software packages from third party sources as well as from the official Arch Linux repository through the use of the package manager, known as Pacman. Since Pacman is a command line tool, some users may find it scary at first. However, once you get used to it, Pacman is simple to use and powerful.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*5gJLZmIrXQcGSCZ5K_Tu-A.png" /><figcaption>Pacman</figcaption></figure><p>The most important aspect of the distribution is the Arch Linux community. Passionate about their operating system, Arch Linux users often give back to the community by developing and maintaining software packages, producing documentation, and serving other users with problem solving. The Arch Linux wiki is a fantastic tool for users of all skill levels because it offers comprehensive documentation on how to install, configure, and utilize the operating system and each of its components.</p><p>In general, experienced Linux users who appreciate adaptability, personalization, and a minimalist desktop style might want to think about switching to Arch Linux. Users of the distribution have access to a powerful, effective, and highly flexible operating system that can be adjusted to suit their unique requirements. It is a top option for users who wish to stay up to date with the most recent developments in Linux technology due to its active community, solid package management system, and rolling release strategy.</p><p>However, using Arch Linux could have certain disadvantages. First off, because the distribution is so basic, users who are unfamiliar with Linux or who do not want to put in the time and effort to install and modify their system may not find it to be the best option. This because it uses a rolling release structure, there is a chance that upgrades could often affect the stability of the system. Following standard practices for updating the system, such as performing routine backups and testing updates in a virtual machine before installing them on the primary system, can help to reduce this risk.</p><h3>The benefits of using Arch Linux</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*Gp7d0ZYLZt-dCWj4Mra0eA.jpeg" /><figcaption>Arch Linux Desktop</figcaption></figure><p>The simplicity and popularity of Arch Linux among those who love it have not gone ignored, in fact, there are numerous important factors that led to its popularity among users. Below, we will list some of Arch Linux’s features:</p><h3>1. You Are Free to Build Your Own PC</h3><p>You have the freedom to create your own PC when using Arch Linux, which is one of its most significant advantages. Arch Linux is a do it yourself operating system which can be installed on almost any computer, unlike many other Linux distributions that are already configured on specified hardware. This enables you to select the precise hardware components you desire, verifying that your system is appropriate for what you want.</p><p>You have complete control over every part of the PC you build to run Arch Linux, from the processor and chipset to the graphics card and storage disks. With this kind of freedom, you may design a system that is ideal for your particular purpose, whether it is for software development, video editing, or gaming.</p><p>Additionally, building your own PC might be a cost effective choice, as you can select components that suit within your budget. For customers who are on a small budget but yet want a reliable and powerful system, this can be extremely helpful.</p><h3>2-The Arch Linux User Repository</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/768/1*_8QfG-iWUD8zQzdamd0B5g.png" /></figure><p>The Arch Linux User Repository aka AUR is a community driven repository of user contributed packages for the Arch Linux operating system.</p><p>Users may quickly install and manage a wide range of software on their PCs because to the huge number of software packages accessible in the AUR that are not included in the official Arch Linux repositories.</p><p>The AUR, which gives users access to a sizable software repository that is regularly updated and managed by the community, is a unique characteristic of Arch Linux. It is a proof to the thriving and dedicated community of Arch Linux users who are committed to the operating system and prepared to give of their time and knowledge to help it grow.</p><p>In general, Arch Linux users can benefit extremely from the Arch Linux User Repository. Users may quickly install and manage a wide spectrum of software on their systems because to the large repository of software packages it offers that do not exist in the official Arch Linux repositories. The very existence of the AUR provides proof of the active and committed community of Arch Linux users who are enthusiastic about the software and are prepared to put in the time and effort necessary to improve it.</p><h3>3-The Arch Linux wiki</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/768/1*E6E0A2n2DkZM52oJCqJ-6Q.png" /></figure><p>Anyone using or planning on using Arch Linux should definitely check out the <a href="https://wiki.archlinux.org/">Arch wiki</a>. The wiki is a rich and regularly updated source of knowledge on every aspect of Arch Linux, from setup and configuration to optimization and troubleshooting.</p><p>The Arch Linux community manages the wiki, therefore it is a group effort that is always developing and getting stronger. The wiki is a goldmine of knowledge on anything from using Arch Linux basically to doing complex system administration tasks.</p><p>The Arch Linux wiki is a really helpful resource for anyone using or passionate about Arch Linux, in general. For Arch Linux users across the world, it is an important source of knowledge and inspiration due to its focus on simplicity, accuracy, and involvement in the community.</p><h3>4-Independent Distribution</h3><p>Arch Linux is an independent Linux distribution that is supported by a strong user community and a small but passionate group of developers. As an autonomous distribution, Arch Linux is free to prioritize the needs and preferences of its users first because it is not restricted by any specific commercial sponsor or agenda.</p><p>Because of its anonymity, Arch Linux is very adaptable and capable of changing to meet the needs of its users. Arch Linux, as opposed to some other Linux distributions, can be installed on almost any machine and is ready to be adjusted to each user’s unique needs and preferences. Some other Linux distributions may be reliant upon particular hardware or software platforms.</p><h3>5-Packman</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/768/1*ovxu7eo_mc1s07e3-NqIgQ.jpeg" /></figure><p>On an Arch Linux system, Pacman offers an easy and user friendly command line interface for managing software packages. Users can use Pacman to find and install packages from third party repositories like the Arch Linux User Repository (AUR) and other unofficial repositories as well as from the official Arch Linux repositories.</p><p>Pacman’s powerful reliance resolution method is just one advantage. Dependencies between packages are immediately resolved by Pacman, ensuring that all required packages are installed and configured properly. As a result, users no longer have to worry about manual resolving dependencies and issues while installing and managing complicated software packages and libraries.</p><h3>6-Simple Installation</h3><p>The straightforward installation process of Arch Linux is one of its unique features. Arch Linux gives users a base system that they can customize and build over from scratch, as opposed to other Linux distributions that offer a graphical installer and a preconfigured desktop environment.</p><p>At first, users who are used to more efficient installation procedures could find this basic approach scary. However, it is this very simplicity that gives Arch Linux its incredible power and flexibility. Users can design a highly efficient and personalized system that suits their unique needs and preferences by starting with an elementary structure and building it up from there.</p><h3>7-Open Source</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/768/1*CQElVSeZ6279dVSsbPusQg.jpeg" /></figure><p>All of the software packages that come with the distribution are free and open source since Arch Linux has been dedicated to the values of open source software. This dedication to open source covers the whole Arch Linux ecosystem, including the Arch User Repository (AUR) and the Arch Linux wiki, in addition to the software packages itself.</p><p>There are many reasons why open source software is essential. Most importantly, it supports transparency and accountability by ensuring that users have access to the source code and may check it for bugs, security flaws, and other problems. This creates a sense of community ownership and responsibility and encourages trust and confidence in the project as a whole.</p><h3>8-Customization:</h3><p>One of the unique features of Arch Linux is its flexibility and customizability. Arch Linux is extremely responsive and can be modified to match the unique needs and tastes of individual users because it is designed to be lightweight and minimalist with a focus on efficiency and ease of use.</p><p>The package management system of Arch Linux, which is based on the Pacman package manager, enables this customizability. Users can install, update, and remove software packages using the straightforward and user friendly interface of Pacman, a command line based package manager.</p><p>In general, Arch Linux’s success and popularity are greatly influenced by its capacity for adaptation and customizability. Arch Linux gives fans the ability to design incredibly customized productive computing environments by giving them a lightweight, minimal system that is easily customizable.</p><h3>Conclusion</h3><p>Arch Linux is a popular operating system that is known for its adaptability, customization, and simplicity. Because of its rolling release model, users always have access to the most recent software updates and features. While Arch Linux is not the most user friendly option, its dedicated user community offers a wealth of resources and support to those willing to put in the effort to learn the system. Overall, Arch Linux is an excellent choice for advanced Linux users who prioritize freedom of choice over simplicity and simplicity of use.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=108975114142" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[CentOS vs Ubuntu Which is The Best ?]]></title>
            <link>https://medium.com/@ahm3d_sec/centos-vs-ubuntu-which-is-the-best-6f18e5333c17?source=rss-99d4c2899002------2</link>
            <guid isPermaLink="false">https://medium.com/p/6f18e5333c17</guid>
            <category><![CDATA[centos-vs-ubunutu]]></category>
            <category><![CDATA[operating-systems]]></category>
            <category><![CDATA[centos]]></category>
            <category><![CDATA[linux]]></category>
            <category><![CDATA[ubuntu]]></category>
            <dc:creator><![CDATA[Ahm3d_Sec]]></dc:creator>
            <pubDate>Tue, 24 Feb 2026 14:28:32 GMT</pubDate>
            <atom:updated>2026-02-24T14:28:32.098Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/768/1*-3zPdXY3sdxu8pXQpw3WPA.png" /></figure><p>Are you new to Linux and don’t know which distribution to use? Or are you an advanced Linux user thinking about switching to a new distribution? Making a decision can be difficult with so many options accessible. In this piece, we’ll look in depth at two popular distributions, Ubuntu and CentOS, to help you make an informed decision. Ubuntu and CentOS both have large user bases and are extensively used in the industry. We’ll look at the main distinctions between Ubuntu and CentOS.</p><h3>What Is Ubuntu?</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*IykgEbU21Gg2jfEzgij6mw.jpeg" /></figure><p>Based on the Linux kernel, Ubuntu is an open-source and free operating system. Since its initial release in 2004, it has grown to be one of the a very well Linux distributions. A Southern African ideology that highlights the importance of community and sharing is where the word “<a href="https://medium.com/@ahm3d_sec/what-is-ubuntu-9c26549a3a35">ubuntu</a>” originates. It embodies the cooperative, friendly, and supportive principles that form the basis of the Ubuntu operating system.</p><p>The intuitive user interface of Ubuntu is one of its standout qualities. Ubuntu is made to be simple to use for anyone, regardless of technical experience, in contrast to certain other Linux distributions that demand a certain level of technical understanding.</p><p>For the majority of users, it is an all in one solution because it comes with a variety of pre-installed applications like a web browser, office suite, media player, and more.</p><p>Ubuntu’s focus on security is another benefit. The operating system has a reputation for having robust security protections and is frequently updated to address flaws and shield users from potential attacks. Ubuntu also comes with encryption tools and a built-in firewall to protect user data.</p><p>Furthermore, a large developer community that produces software and applications for simple installation through the Ubuntu Software Center makes Ubuntu extremely customizable. The operating system is also made to work with a variety of hardware and may be used with both desktop and mobile devices</p><h3>What is CentOS ?</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/768/1*oDuLND-puRB05whYC-LBAA.jpeg" /></figure><p><a href="https://medium.com/@ahm3d_sec/what-is-centos-a9c8917f6d88">CentOS </a>was created by deriving its source code from Red Hat Enterprise Linux (RHEL). In corporate settings, data centers, and web servers, it is a well liked and reliable operating system. As a free and open source substitute for RHEL, CentOS is intended to give the same level of dependability and security with community assistance as opposed to the professional support offered by Red Hat. The operating system is ideal for users that need a safe and reliable environment to execute mission critical systems such as server applications and web services.</p><p>Via the YUM package manager, CentOS offers a large selection of software packages that may be installed, and it supports a number of architectures, including x86 64, ARM, and PPC. Major releases of CentOS are supported for up to ten years, and it has a long running release cycle.</p><p>Fore those who want a trustworthy and safe operating system for their servers without incurring the additional costs of commercial operating systems frequently choose for CentOS. It is a project that is driven by the community and is looked after by a group of volunteers that collaborate to keep the software current, safe, and dependable.</p><p>For users who want to utilize the same software stack as RHEL but don’t want to pay for the commercial support, CentOS is a great option because it is built to be compatible with the RHEL software ecosystem. CentOS also has a sizable and vibrant developer, user, and administrator community that actively participates in the development of the operating system by submitting bug reports, changes, and new features.</p><h3>What’s the Biggest Difference Between CentOS vs. Ubuntu?</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*ocGoJb5b3wtc3S0puPSUdA.png" /></figure><p>Ubuntu and CentOS are both popular Linux based operating systems for server and desktop environments. Here are a few key distinctions between the two:</p><h3>Origin and Development :</h3><p>CentOS is based on the Red Hat Enterprise Linux (RHEL) source code, whereas Ubuntu is based on the Debian Linux distribution. As a result, CentOS is intended to be a stable, secure, and reliable operating system compatible with RHEL, whereas Ubuntu is more focused on usability and flexibility.</p><h3>Release Cycle:</h3><p>CentOS has a longer release cycle than Ubuntu, with major releases typically supported for up to ten years. In comparison, Ubuntu typically has a shorter release cycle, with standard releases released every six months and long term support releases supported for five years.</p><h3>Package Management:</h3><p>To install, update, and remove software packages, CentOS uses the YUM package manager, whereas Ubuntu uses the APT package manager. While the functionality of both package managers is similar, their syntax and commands differ, so users might have to adjust to the various package management system when switching between the two.</p><h3>Desktop environments:</h3><p>Ubuntu provides several desktop environments, including the default GNOME desktop, KDE, XFCE, and LXDE, whereas CentOS is primarily a server operating system and does not include a default desktop environment. Users can, however, install their preferred desktop environment using the suitable package manager.</p><h3>User Base:</h3><p>New users and desktop users prefer Ubuntu, whereas enterprise users, data centers, and web servers prefer CentOS.</p><p>Both Ubuntu and CentOS are excellent operating systems, but they relate to various audiences. Ubuntu is more focused on usability and flexibility, whereas CentOS is intended to be a stable and reliable platform for enterprise users. Finally, the choice between Ubuntu and CentOS is determined by the user’s specific needs and requirements.</p><h3>Conclusion</h3><p>Ubuntu is popular among desktop users and small businesses due to its ease of use, user friendly interface, and flexibility. It also provides long term support releases, making it an excellent choice for those who require long term stability.</p><p>CentOS, on the other hand, is intended to be a stable, secure, and dependable platform for business users, data centers, and web servers. It is based on the Red Hat Enterprise Linux (RHEL) source code and provides a free and open source alternate solution to RHEL. CentOS has a longer release cycle and up to ten years of support, making it an excellent choice for purpose server environments.</p><p>When deciding between Ubuntu and CentOS, it is critical to consider the user’s specific needs and requirements. If simplicity and adaptability are important, Ubuntu is an excellent choice. If stability and dependability are critical, CentOS is the way to go. Both operating systems have advantages and disadvantages, so it is critical to weigh the pros and cons and select the one that best meets your needs. Finally, for those looking for a dependable and secure operating system, both Ubuntu and CentOS are excellent choices</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=6f18e5333c17" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[What Is Centos ?]]></title>
            <link>https://medium.com/@ahm3d_sec/what-is-centos-a9c8917f6d88?source=rss-99d4c2899002------2</link>
            <guid isPermaLink="false">https://medium.com/p/a9c8917f6d88</guid>
            <category><![CDATA[centos]]></category>
            <category><![CDATA[operating-systems]]></category>
            <category><![CDATA[linux]]></category>
            <dc:creator><![CDATA[Ahm3d_Sec]]></dc:creator>
            <pubDate>Wed, 18 Feb 2026 19:02:17 GMT</pubDate>
            <atom:updated>2026-02-18T19:02:17.207Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/945/1*LHABWE3Kv5bVWDeCQm8-_A.jpeg" /></figure><p>CentOS is a Linux operating system that is built on the original source code of Red Hat Enterprise.</p><p>It is an open source, free operating system that is extensively used in server and web hosting environments. It provides a stable and secure platform on which to operate a variety of applications and services, such as web servers, database servers, and email servers. It is common among system administrators and developers due to its dependability, security, and ease of maintenance. CentOS also includes a large software package and tool repository, making it simple to install and administer software on the system. Because of its long term support and predictable release cycle, it is a reliable option for enterprise level deployments.</p><p>CentOS is intended to be a reliable and safe operating system for servers, workstations, and personal computers. It’s popular in the business sector because it offers a stable platform for hosting web applications, databases, and other mission critical services. It has a reputation for its long term support and dependable performance, making it an excellent option for organizations that place a high value on stability and security. It also has a large user and developer community that supports its growth and provides assistance via online forums and documentation. CentOS is offered in a variety of architectures, including x86, ARM, and PowerPC. Overall, It is a famous and stable operating system that can be used for a variety of purposes.</p><h3>History of CentOS</h3><p>CentOS was created in 2002 as a free alternative to Red Hat business Linux (RHEL), the dominant business Linux distribution at the time. It was founded by a group of volunteers who saw the need for a stable, dependable, and community driven operating system that companies and organizations could use without the need for expensive licenses or support contracts.</p><p>CentOS 2.0, the first version, was published in May 2004 and was based on the source code of RHEL 2.1AS. Since then, several major versions have been published, each based on the matching RHEL release.</p><p>The development team works carefully to ensure that the CentOS distribution is compatible with RHEL, which means that software packages intended for RHEL will run on CentOS without modification, and vice versa.</p><p>long term support (LTS) strategy is one of its strengths. CentOS major releases are supported for ten years from the date of release, ensuring that businesses can depend on It for a reliable and safe operating system in the long run. This is especially essential for companies that rely on a stable platform for critical applications.<br>Red Hat stated in 2014 that it would discontinue support for CentOS, causing concern among CentOS users.</p><p>Red Hat announced in December 2020 that it was moving its focus to It Stream and would discontinue support for CentOS Linux 8 at the end of 2021, a decade earlier than previously planned. The CentOS user community, which depended on It for stable, long term support, was outraged by this decision. The CentOS community, on the other hand, has pledged to continue development of CentOS Linux as a community driven project without Red Hat’s support.</p><h3>Features of CentOS</h3><h3>Stability:</h3><p>One of the main reasons for CentOS’s popularity is its stability. It is intended to be a long term support release that gives users a stable and dependable platform on which to run their apps. Because It has a slow release cycle, updates are fully tested before they are published. This means that users can rely on It for crucial applications without fear of unexpected crashes or downtime.</p><h3>Security:</h3><p>Security is another important aspect of CentOS. developers are dedicated to delivering a secure operating system that can resist a variety of security threats. CentOS has a strong security strategy that includes security updates on a regular basis, firewalls, and secure configuration defaults.</p><p>It additionally supports SELinux, which improves system security by having mandatory access controls.</p><h3>Compatibility:</h3><p>CentOS is compatible with a broad variety of hardware and software settings. It supports several platforms, including x86, x86_64, ARM, and PowerPC. It is also compatible with a wide range of common applications, including Apache, MySQL, PHP, and many more. As a result, it is an excellent option for developers looking for a dependable and compatible platform for their applications.</p><h3>Speed:</h3><p>CentOS is known for its high speed. It has a simple design which highlights economy and speed. It runs smoothly on a wide variety of hardware configurations because it uses the most recent stable kernel releases and optimized libraries</p><p>It also has a small memory footprint, making it appropriate for use on low resource systems.</p><h3>Community Support:</h3><p>CentOS has a big and active community that offers users help and support. The community offers documentation, guides, and forums where users can seek assistance and discuss their CentOS experiences. This makes troubleshooting any issues that users may face while using It easier.</p><h3>Customization:</h3><p>CentOS is highly customizable, allowing users to tailor the system to their particular requirements. It includes a number of tools and utilities that enable users to customize various elements of the system, including the desktop environment, networking, and security settings. As a result, it is an excellent option for users who require a flexible and customizable operating system.</p><h3>Package Management</h3><p>It utilizes the YUM package management system, which enables users to quickly install, update, and remove software packages. YUM gives users access to a massive repository of packages, making it simple to discover and install the software they require. It also supports dependencies, which guarantees that when a new software package is installed, all required packages are installed.</p><h3>Virtualization:</h3><p>CentOS supports a variety of virtualization platforms, including KVM, Xen, and VirtualBox.</p><p>Users can run multiple operating systems on a single physical machine, making it an excellent option for virtualized environments.</p><h3>Cloud Support:</h3><p>Because of its stability, security, and compatibility, CentOS is widely utilized in cloud computing environments. Many popular cloud platforms, including Amazon Web Services, Google Cloud Platform, and Microsoft Azure, support it. Furthermore, It includes tools and utilities that make it simple for users to handle and deploy cloud instances.</p><h3>Open Source:</h3><p>CentOS is free and open source software, which means that users can use, change, and distribute it without restriction. This makes it an excellent option for users who require a dependable and inexpensive operating system for personal or business use.</p><h3>Conclusion</h3><p>Finally, CentOS Linux is a dependable and stable operating system that is widely used in both personal and professional environments. It’s known for its security features, long term support, and compatibility with numerous software applications. The most recent CentOS Linux release offers users a modern and user friendly interface, as well as a number of powerful tools and utilities to boost productivity and streamline workflows. Despite the availability of other Linux distributions, CentOS Linux continues to be a popular choice among users due to its open source nature, adaptability, and solidity. Generally speaking, CentOS Linux is a valuable and affordable option for those seeking a powerful and stable operating system.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=a9c8917f6d88" width="1" height="1" alt="">]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[What is Ubuntu ?]]></title>
            <link>https://medium.com/@ahm3d_sec/what-is-ubuntu-9c26549a3a35?source=rss-99d4c2899002------2</link>
            <guid isPermaLink="false">https://medium.com/p/9c26549a3a35</guid>
            <category><![CDATA[linux]]></category>
            <category><![CDATA[ubuntu]]></category>
            <category><![CDATA[operating-systems]]></category>
            <dc:creator><![CDATA[Ahm3d_Sec]]></dc:creator>
            <pubDate>Wed, 18 Feb 2026 18:29:59 GMT</pubDate>
            <atom:updated>2026-02-18T18:29:59.251Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/1*IykgEbU21Gg2jfEzgij6mw.jpeg" /></figure><p>Ubuntu is a famous open source operating system that is based on the Linux kernel. It was founded with the intention of making computing more accessible, user friendly, and free for everybody. The name Ubuntu is derived from a South African ideology of community and kindness that highlights people’s connectivity and duty to one another.</p><p>One of Ubuntu’s primary features is its user friendly interface, which makes it simple to use for people of different ability levels. It also includes a variety of preinstalled software, such as browser, office productivity suite, music player, and others. The software center in Ubuntu makes it simple to locate and install extra programs, including many open source apps.</p><p>Ubuntu is recognized for its strong dedication to security and privacy. Ubuntu is built to be virus and malware resistant, and it offers a number of tools to help keep your system secure. It also protects your privacy by giving you control over what information is collected and shared.</p><p>Ubuntu is not only simple to use and secure, but it is also flexible. Users can select from a variety of desktop environments and themes, and there are multiple customization options to make the system look and feel exactly how they want it.</p><p>I believe that Ubuntu a popular free and open source Linux based operating system. Ubuntu is meant to be user friendly and may be worked on any number of platforms including desktops, laptops, servers, and even some smartphones. It is well known for its user friendly interface and already comes with a variety of software, including a web browser, office suite, media player, and many others. Ubuntu is also widely used for programming, software development, and other technical reasons, and it has a strong developer community that supports its development and provides user support.</p><h3>What is the History of Ubuntu?</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*hKxTXFHWtAhOsvaK.jpg" /></figure><p>Mark Shuttleworth, a South African entrepreneur who had previously made a fortune by selling his company, developed Ubuntu in 2004. He had long been interested in open source software and saw a chance to create a Linux based operating system that was accessible and simple to use for everyone.</p><p>The term Ubuntu is derived from the South African ideology of Ubuntu, which shows people’s interdependence and duty to one another. He chose the name to symbolize the company’s commitment to open source software and community involvement.</p><p>In October 2004, the first version of Ubuntu, 4.10, was launched. It was based on the Debian Linux kernel and came with the GNOME desktop environment and lots of pre installed apps. Ubuntu immediately established a reputation for being user friendly and accessible, and it was especially popular among Linux newcomers.</p><p>Ubuntu has continued to grow and improve over time. New features include the Unity desktop environment, the Ubuntu Software Center, and the Ubuntu One cloud storage service. With the release of the Ubuntu Touch and Ubuntu Core platforms, it additionally widened its focus to include mobile and IoT devices.</p><h3>Ubuntu vs Linux</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/501/0*mEXy7hXGnoCRvcsO" /></figure><p>One of the biggest differences between Ubuntu and Linux is that Ubuntu is a more easy to use operating system that is designed to be simple to use, especially for individuals who are unfamiliar with Linux. It has a graphical user interface similar to other popular operating systems such as Windows and macOS.</p><p>As a result, Linux is frequently seen as a highly technical operating system, primarily utilized by developers, system administrators, and other IT experts. Linux distributions such as Arch Linux or Gentoo Linux sometimes require more technical expertise and experience to install and configure.</p><p>One more difference between Ubuntu and Linux is the applications supplied. Ubuntu includes a variety of software preinstalled, including LibreOffice, the Firefox web browser, and the Thunderbird email client, among others. These applications have been designed to meet the majority of a typical user’s basic requirements.</p><p>In contrast, Linux often requires users to manually install and configure the software they needed. This takes more effort, but it gives you more flexibility and control over the system.</p><p>In terms of supporting and community, both Ubuntu and Linux have active and passionate user and developer communities. However, Ubuntu offers a more concentrated and organized support structure, which may make it easier for users to seek assistance when needed.</p><p>In the end, Ubuntu is a Linux based operating system that is meant to be user friendly and simple to use, but Linux as a whole is a more technical operating system that is frequently utilized by developers and IT experts. Ubuntu comes with a large choice of preinstalled software and a more structured support form, whereas Linux distributions often demand more manual configuration and customization but provide greater system control.</p><h3>Why Ubuntu is so popular ?</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/768/1*Q0hjdvz5Q9RHc9wxMdwp7w.jpeg" /></figure><p>Ubuntu is a member of the most popular and frequently used Linux distributions in the world for a variety of reasons. To begin with, Ubuntu is open source, which means that its source code is freely available to anyone who wishes to use it or contribute to its development. This has resulted in an active community of developers and users who have generated hundreds of software packages that can be quickly installed and updated using Ubuntu’s embedded package manager.</p><p>Another factor that influences Ubuntu’s popularity is its ease of use. The distribution includes a user friendly desktop environment that is easy to use, making it suitable for users of all skill levels. Furthermore, Ubuntu has a huge and active user community that provides aid.</p><p>One of the main reasons for Ubuntu’s popularity is its dedication to user privacy and data protection. Unlike many commercial operating systems, Ubuntu does not gather or display targeted advertising to users. As a result, it has become a popular option for individuals and companies who value privacy and data ownership.</p><p>Furthermore, the open source nature of Ubuntu has resulted in a huge and active developer community that contributes to the development of the operating system and its staying software packages. This has resulted in a wealth of free and open source software that can be simply installed and used on Ubuntu, giving users access to a wide set of tools and apps.</p><p>Another feature that makes up Ubuntu’s attract is its support for any number of hardware platforms. Ubuntu is built to function smoothly across a variety of devices, whether you’re using a desktop computer, laptop, or server, making it an ideal choice for users across a variety of sectors and professions.<br>In general, the success of Ubuntu may be given to a number of factors, including its open source nature, ease of use, security measures, compatibility with hardware and software, and dedication to user privacy and accessibility. These characteristics have made it popular among users all over the world, from individuals and small enterprises to huge corporations and government agencies.</p><h3>5 Reasons why you Should Use Ubuntu:</h3><h3>1-Security</h3><p>Ubuntu’s regular updates and fixes are one way it guarantees security. These updates are distributed on a regular basis and contain solutions for any known security vulnerabilities, assuring the system’s security and protection against potential attacks.</p><p>Ubuntu also comes with a number of security measures meant to protect against both external and internal threats. Ubuntu, for example, provides a firewall that may be configured to restrict incoming traffic from unknown sources, as well as tools for encryption and network security.</p><p>The user account management mechanism in Ubuntu is another essential component of its security. Ubuntu needs secure passwords and provides a number of tools for managing user accounts and permissions. This helps to ensure that sensitive data and system resources are only accessible to authorized users.</p><p>Finally, because Ubuntu is open source, users and developers can analyze the system’s code and highlight any potential security concerns. This contributes to the rapid identification and correction of vulnerabilities, making Ubuntu one of the most safe operating systems available today.</p><h3>2-Customizability</h3><p>One of the primary elements that separated Ubuntu from other operating systems is its ability to be customized. Ubuntu gives users lots of options for customizing their system to their specific needs and preferences. Users can customize the look and feel of their desktop environment, adjust system settings, and install software tailored to their unique requirements. Users have complete control over their computer environment with Ubuntu, making it an excellent choice for both amateur and professional users.</p><p>Furthermore to its customizability, Ubuntu provides an excellent support network ready to assist customers with any problems they may have. The Ubuntu support community is made up of experienced users and developers who are enthusiastic about the operating system and wish to assist others in making the most of it. Users can interact with other Ubuntu users through forums, wikis, and chat rooms, where they can ask questions, get advice, and share their experiences.</p><h3>3-Ubuntu Community</h3><p>The Ubuntu community is well known for its friendliness, and users can expect prompt and accurate responses to their questions. Whether it’s a simple question about how to install software or a sophisticated technical issue, users can turn to the Ubuntu support community for assistance in resolving their issues.</p><p>Overall, Ubuntu is a fantastic choice for users looking for a flexible and dependable operating system due to its customizability and large support community. Whether you are a beginner or a professional developer, Ubuntu gives you the tools and resources you need to build a computer environment that meets your individual requirements.</p><h3>4-User Interface</h3><p>The user interface of Ubuntu is one of its most popular aspects. The user interface, commonly known as the desktop environment, is the graphical interface with which users interact when operating systems are used. GNOME, Unity, KDE, and Xfce are among the user interface alternatives available in Ubuntu. Each interface has its own distinct set of features and design, allowing users to tailor their experience to their preferences.</p><p>The GNOME user interface is Ubuntu’s default and is noted for its simplicity and elegance. The interface is modern in appearance and feel, with a dock on the left side of the screen for rapid access to frequently used applications.</p><p>Unity is another famous Ubuntu user interface that was debuted in 2010. Unity has a sidebar that allows you to quickly access applications, files, and preferences. The UI also has a search function, which helps users to rapidly locate files and apps. Unity has received accolades for its elegant design and ease of use.</p><p>KDE is another Ubuntu user interface alternative that offers a more traditional desktop environment. KDE is well known for its customisable interface, which includes a wide range of themes, icons, and widgets. The interface also includes a task manager, which allows users to switch between open programs rapidly.</p><h3>5-System Requirements</h3><p>Ubuntu’s system requirements different based on the version and purpose of the operating system. There are, however, some minimal conditions that must be completed in order to assure a smooth and accurate functioning.</p><p>The recommended system requirements for desktop use in Ubuntu 20.04 LTS are at least a 2 GHz dual core processor or greater, 4 GB of RAM, and a minimum of 25 GB of hard disk space. A 2 GHz or faster processor, 2 GB of RAM, and at least 25 GB of hard disk space are the minimum requirements for a functioning machine. These specifications will enable the system to run most applications and execute most functions without difficulty.</p><p>Regarding servers usage, Ubuntu 20.04 LTS requires at least a 2 GHz quad core processor or greater, 4 GB of RAM, and a minimum of 25 GB of hard disk space. A 1 GHz processor, 512 MB of RAM, and at least 1 GB of hard drive space are the minimum requirements for a functioning server.</p><p>It should be noted that these are only the minimal system requirements; users may require higher specifications to operate more demanding programs or undertake strenuous tasks. Running virtual machines or complicated software development environments, for example, may necessitate additional RAM and CPU power.</p><h3>Conclusion</h3><p>Ubuntu is a massively popular and user-friendly operating system that provides users with a stable and reliable platform to work on. It is based on the Debian Linux distribution and is known for its simplicity, adaptability, and security. Ubuntu is simple to install and includes a large number of pre-installed applications, making it an excellent choice for home users, students, and businesses. It’s also a popular choice for developers, system administrators, and enthusiasts who need a powerful and customizable operating system. The open-source nature of Ubuntu allows users to modify and personalize the operating system to meet their specific needs.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=9c26549a3a35" width="1" height="1" alt="">]]></content:encoded>
        </item>
    </channel>
</rss>