Loading...
Skip to Content

AI Block Lab - Cyber Security

Cyber Security

Articles

Add Image Description

Using Gobuster to Find Hidden Directories

Learn how to use Gobuster to discover hidden directories on a web server using a wordlist for security testing and penetration testing.
Add Image Description

Using the find Command to Detect Compromised or Modified Files

Learn how to use the Linux find command to detect compromised, modified, or suspicious files on your server. This guide covers practical examples for identifying recent changes, insecure permissions, unusual ownership, and potential security threats.