Kali Linux Command Reference: Basic to Intermediate Shell

This cheat sheet covers essential commands for system navigation, file management, user administration, and networking in Kali Linux, spanning foundational concepts (Lessons 1-2) and more advanced topics (Lessons 3-4).

System Information and Navigation

ConceptCommand / InfoKey Point
OS Infouname -aShow kernel, version, and architecture
HostnamehostnameShow the system’s hostname (L3-4)
List filesls, ls -l, ls -als-l = detailed listing, -a = show hidden files
Manualman <cmd>View command help documentation
Read More

System Programming Fundamentals: Linking, Memory, and Concurrency

Linking

  • The linker is unaware of local variables that exist only within functions.
  • Local variables with the same name as global variables follow their local scope.

Symbol Types in Linking

Global Symbols

  • Symbols defined by module m (e.g., m.cpp) that can be referenced by other modules.
  • Includes non-static C functions and non-static global variables.

External Symbols

  • Global symbols referenced by module m but defined by some other module.

Local Symbols

  • Symbols defined and referenced exclusively by module m.
  • Includes
Read More

Implementing Hash Tables with Chaining and Linear Probing

Hash Function Implementation

def hash_func(key, size):
return sum(ord(c) for c in key) % size

Hash Table with Chaining

class HashTableChaining:
def __init__(self, size):
self.table = [[] for _ in range(size)]
self.comparisons = 0

Insert Method

def insert(self, name, number):
index = hash_func(name, len(self.table))
self.table[index].append((name, number))

Search Method

def search(self, name):
index = hash_func(name, len(self.table))
for n, num in

Read More

Malware Types and Cyber Attack Defense Strategies

Malware: Malicious Software Defined

Malware is malicious software designed to disrupt systems, steal information, or gain unauthorized access. The primary goals of malware include:

  • Disruption: Shutting down processes or freezing systems.
  • Data Theft: Exfiltrating sensitive data like passwords.
  • Unauthorized Access: Providing attackers with a secret entry point.
  • Covert Control: Enabling remote command and control (C&C) operations, often forming botnets.

The fundamental concept of malware has remained

Read More

Comprehensive Java Concepts and Key Features Explained

1. What is Java and Explain Features of Java?

2. Why is Java a Platform Independent Language?

3. What is Byte Code and the Importance of Byte Code?

4. What is the Difference Between Byte Code and Machine Code?

5. What is the Difference Between Platform Independency and Cross Platform?

6. What is OOP and Explain in Depth?

7. What are the Pillars of OOP?

8. What is the Difference Between Semi Object Oriented and Pure Object Oriented?

9. What is JDK, JRE, and JVM?

10. What is the Difference Between JDK, JRE,

Read More

Understanding Packet Transmission in Extended LANs and Protocols

15. Consider the extended LAN connected using bridges B1 and B2 in the given figure. (a) A sends a packet to C. (b) E sends a packet to F. (c) F sends a packet to E. (d) G sends a packet to E. (e) D sends a packet to A. (f) B sends a packet to F.

a.) B1 will forward this packet on ports 2, 3, and 4. B2 will forward it on ports 1, 2, and 3. b.) B2 will forward this packet on ports 1, 3, and 4. B1 will forward it on ports 1, 2, and 3. c.) B2 will not forward this packet on any of its ports, and
Read More