Linux - NewbieThis Linux forum is for members that are new to Linux.
Just starting out and have a question?
If it is not in the man pages or the how-to's this is the place!
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Introduction to Linux - A Hands on Guide
This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter.
For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed with system and network administration. This book contains many real life examples derived from the author's experience as a Linux system and network administrator, trainer and consultant. They hope these examples will help you to get a better understanding of the Linux system and that you feel encouraged to try out things on your own.
Click Here to receive this Complete Guide absolutely free.
So, guilty until proven innocent? OP didn't mention his motives. Do folks have to provide that information before we can help them?
You are trying to spin this...please don't. NO ONE is saying the OP is guilty of ANYTHING, nor that their motives aren't good. The ONLY thing at issue is liability to this website, *IF* such help is given, and the OP uses that information for something bad. Can I show you how to pick locks? You bet..WILL I, if I don't know you? Nope...sorry.
No one is keeping the OP from reading the documentation on either of those programs...no one is saying those programs aren't useful, that you can't learn from them, nor that they can be used for legitimate purposes. No one is keeping the OP from reading any of the bash scripting tutorials, and some things (like timeout) were already provided to help the OP along. Even *IF* folks provide their motives up front, the chances of people helping are still going to be slim, because NO ONE HERE CAN REALLY KNOW if they're telling the truth.
To put it in different context...if the OP were to post asking for help sending out 500,000 emails a day, there aren't many people who wouldn't assume they were spammers, and they'd probably not get help either. COULD they be legit? Sure...and no one is keeping them from learning how to configure a big mail system. No one is going to turn them away for a SPECIFIC question ("I'm seeing xxx in the logs when I have all caps in the address, and the mail is not going. Any advice?"). And there is NOTHING illegal about spam email, although it is sleazy.
Ok, so I'm guessing it simply boils down to this particular site's rules governing what information is considered allowed. I can respect that, despite its ridiculous nature.
When I think of this whole thing, it reminds me of those cops that ask for papers, despite their lack of reasonable articulable suspicion. Upon requesting why the cops want that info, they say, "We don't KNOW what your intentions are. We don't know if you're a convicted felon or not. That's why we're asking for your papers".
Just to clarify, I am computer hardware specialist that is just getting into cli,linux and software, I am a complete noob at the before mentioned topics, however all these tests are being done on my own private lab and I dont wish to hack anyone simply to test my own network security.
Thanks guys for your help.
The truth is I need to read up more on this. I have no Idea where to start and how the syntax would go.
Read up more on what topic? Scripting itself? Please see the links in my signature for information about BASH scripting. My tired statement is that anything one does in a command line can be scripted. So those earlier commands and the timing options you need to accomplish, I feel you can do those with a BASH script, and it sounds like for now you need to start with learning something about BASH scripting to proceed any further.
And I do see your later update where you say you're doing this for testing.
OK do you feel that reading about BASH scripting is the right choice? Have you attempted any scripts as yet? Or are researching how to start some?
Hey guys, I just want to apologize for all the confusion I have caused here. It was not my intention.
The thing is that I cant make a decent paycheck in Hardware, I can solder 400 pin fpga chip with one hand better than a pick and place and a reflow oven, I pioneered BGA reworks here in Brazil, The first iPhone Hardware unlock in Brazil was done me, but there is no money in it. Then I read up up on pentesting and Network Security audits and saw how profitable it could be, so thats what struck my interest.
I did some basic reading of python and completed simple tuts but nothing intersting.
I am completely lost on the syntax of the script I want to make, but this is what I have thought of.
return reaver -i mon0 -c x -b "xx:xx:xx:xx" -a -vv sleep 1m
and the cool thing about me understanding how to write this script is because I know what I want it do so that would help alot with the understanding of scripting in general. In alot of the tuts they tell you whats supposed to happen and show you, but when you wanna start writing your own you kinda dont know where to start.