Search Results for: Session

New ‘SessionManager’ Backdoor Targeting Microsoft IIS Servers in the Wild

July 2, 2022 A newly discovered malware has been put to use in the wild at least since March 2021 to backdoor Microsoft Exchange servers belonging to a wide range of entities worldwide, with infections lingering in 20 organizations as of June 2022. Dubbed SessionManager, the malicious tool masquerades as a module for Internet Information Services …

New ‘SessionManager’ Backdoor Targeting Microsoft IIS Servers in the Wild Read More »

What Is Session Hijacking, and How Can It Be Prevented? 

What Is Session Hijacking, and How Can It Be Prevented? Session hijacking is a technique used by hackers to gain access to a target’s computer or online accounts. In a session hijacking attack, a hacker takes control of a user’s browsing session to gain access to their personal information and passwords. This article will explain…

The post What Is Session Hijacking, and How Can It Be Prevented?  appeared first on Cybersecurity Exchange.

Right way to record and share our Terminal sessions

The Terminal, also known as the command line or a Terminal emulator, is an crusial component of any useful operating system. It is by far one of the most important applications on MacOS and Linux. The Terminal provides an efficient interface to access the true power of a computer better than any graphical user interface.

Sometimes we need to share our terminal or terminal commands to others to show or solve some issue. In that case we use screenshots which are not so satisfying. If we use a screen recorder apps but recording a screen and send the video file is annoying, here steps in asciinema.

Asciinema record and share terminal on Linux

Asciinema is a free and open source solution for recording terminal sessions and sharing them on the web in a easy way. Now this seems very interesting, lets try asciinema on our Kali Linux system. It also can be installed on various systems like MacOS, Linux, BSD even from source and pip.

To install it on our Kali Linux system we can run following command:

sudo apt install asciinema

After giving sudo password the installation process will start. In the following screenshot we can see that asciinema is installing.

asciinema installing on Kali Linux

This is very little tool should be installed on some seconds. After the installation process is complete we can run this tool and start record our terminal.

To start the recording we need to use the following command on our terminal.

asciinema rec

In the following screenshot we can see that it is started and we can see in the following screenshot:

asciinema started

Now we can type any command and it will be recorded. Now we need to remember one thing that it records only the terminal, not other apps or the whole screen. When we feel that our recording is complete we can press CTRL+D or run exit command, shown in the following screenshot:

asciinema save options

Here it is clearly written that if we want to upload it on asciinema.org then we need to just press Enter⤶ and to save it on just our system we need to use CTRL+C.

We press Enter⤶ to upload it on asciinema.org and in the following screenshot we got the link of the recording.

asciinema uploaded

Now we can open this on our browser, here we might need an asciinema.org account. If it requires then we can easily create it by using mail id. Asciinema doesn’t requires any password they verify the mail address (?We can use temp-mail for a temporary mail id?), and we are ready to rock. We can see various options there as shown in the following screenshot.

asciinema website options

We can share it in various way. We can directly send someone the link. Asciinema also supports oEmbed/Open Graph/Twitter Card protocols, displaying a nice thumbnail where possible. We can also easily embedded an asciicast on any HTML page. If we want to put a recording in a blog post, project’s documentation or in a conference talk slides. As we embedded a asciinema terminal record, please check below:

We also can play our locally saved asciinema records (with *.cast file extension), by using following command:

asciinema play filename.cast

This is about record and share our terminal in a very easy way. Forget screen recording apps and blurry video. Enjoy a lightweight, purely text-based approach to terminal recording on our Kali Linus system.

Love our articles? Make sure to follow us on Twitter and GitHub, we post article updates there. To join our KaliLinuxIn family, join our Telegram Group. We are trying to build a community for Linux and Cybersecurity. For anything we always happy to help everyone on the comment section. As we know our comment section is always open to everyone. We read each and every comment and we always reply.

updated with the information security news

50 Cyber Security Interview Question & Answers For Sure Shot Success – Networking and Security

12. The world has recently been hit by ……. Attack/virus etc. What have you done to protect your organization as a security professional? Different organizations work in different ways, the ways to handle incident is Different for all. Some take this seriously and some not. The answer to this should be the process to handle …

50 Cyber Security Interview Question & Answers For Sure Shot Success – Networking and Security Read More »

ISO 42001 Requirement 7

Understanding Context of the Support of ISO 42001 Requirement 7

Introduction:ISO 42001 is a vital standard for organizations aiming to establish an effective energy management system (EnMS). Requirement 7 of ISO 42001 emphasizes the importance of providing support to ensure the successful implementation and maintenance of the EnMS. Understanding the context of this support is crucial for organizations seeking compliance and reaping the benefits of …

Understanding Context of the Support of ISO 42001 Requirement 7 Read More »

Chat GPT for Accounting Training Course

Chat GPT for Accounting Training Course ChatGPT is a powerful AI language model that can understand and generate human-like text. In the field of accounting, ChatGPT can be leveraged to automate tasks, provide real-time financial information, analyze data, and generate reports. This instructor-led, live training (online or onsite) is aimed at accountants who wish to …

Chat GPT for Accounting Training Course Read More »

ChatGPT for Banking Training Course​

ChatGPT for Banking Webinar ChatGPT is an advanced AI-based language model that can understand and generate human-like text. In the banking industry, ChatGPT can be utilized to enhance customer interactions, automate processes, and provide personalized financial guidance. This instructor-led, live training (online or onsite) is aimed at banking professionals who wish to harness the power …

ChatGPT for Banking Training Course​ Read More »

Cisco Issues Patch for High-Severity VPN Hijacking Bug in Secure Client

March 9, 2024 Cisco has released patches to address a high-severity security flaw impacting its Secure Client software that could be exploited by a threat actor to open a VPN session with that of a targeted user. The networking equipment company described the vulnerability, tracked as CVE-2024-20337 (CVSS score: 8.2), as allowing an unauthenticated, remote …

Cisco Issues Patch for High-Severity VPN Hijacking Bug in Secure Client Read More »

What is Digital Forensics

Digital forensic science is a branch of forensic science that focuses on the recovery and investigation of material found in digital devices related to cybercrime. The term digital forensics was first used as a synonym for computer forensics. Since then, it has expanded to cover the investigation of any devices that can store digital data.…

The post What is Digital Forensics appeared first on Cybersecurity Exchange.

Five Key Elements of Cybersecurity Framework and How Organizations Can Best Implement Them

Date: March 26, 2024Time: 12:30 AM AEDT | 2:30 PM CET | 7:00 PM ISTTopic: Five Key Elements of Cybersecurity Framework and How Organizations Can Best Implement Them Register Abstract: Ransomware is one of modern cybersecurity’s most pervasive and damaging threats. To combat this ever-evolving threat, organizations must adopt a comprehensive approach to recovery. The National…

The post Five Key Elements of Cybersecurity Framework and How Organizations Can Best Implement Them appeared first on Cybersecurity Exchange.

Open Whatsapp chat
Whatsapp Us
Chat with us for faster replies.