diff --git a/content/posts/guides/system-hardening.md b/content/posts/guides/system-hardening.md index a3088d5..470eef1 100644 --- a/content/posts/guides/system-hardening.md +++ b/content/posts/guides/system-hardening.md @@ -1,7 +1,7 @@ --- title: "Preventing Hacks" author: "Hyperling" -date: "2025-11-13T20:00:00-07:00" +date: "2025-11-13T21:00:00-07:00" tags: - tech - hacking @@ -11,17 +11,18 @@ tags: - lynis - nmap - metasploit -categories: - - guides series: - sysadmin -# TBD/TODO: Is the theme oreventing this from working properly? +categories: + - guides toc: true -#toc_start_level: 3 +#toc_start_level: 2 #toc_end_level: 5 --- -How to check for system vulnerabilities. +## Tips on System Penetration Testing + +How to check for system vulnerabilities through self-audits. *A few of these tools can be used offensively. It is bad etiquette to use them on systems which you do not own. Please respect others and do not attempt to cause harm.* @@ -118,7 +119,7 @@ Most vulnerabilities are fixed by upgrading software, migrating to safer softwar ### Metasploit -***This tool IS aggressive and should NEVER be used against any systems you do not own or have explicit permission to test against.*** Thank you. +***This tool IS aggressive and should NEVER be used against any systems you do not own or have explicit permission to test against.*** **Thank you.** I recommend playing with Metasploit if you have extra time so that you can learn how easy it is to penetrate an exploit once it is found with NMap.