AI Block Lab - Cyber Security
Cyber Security
Articles
Using Gobuster to Find Hidden Directories
Learn how to use Gobuster to discover hidden directories on a web server using a wordlist for security testing and penetration testing.
Using the find Command to Detect Compromised or Modified Files
Learn how to use the Linux find command to detect compromised, modified, or suspicious files on your server. This guide covers practical examples for identifying recent changes, insecure permissions, unusual ownership, and potential security threats.

