Linux Lite 3.6 Light weight Review 2017 – Check the new Features & Download the ISO for more

Hello Friends, how are you. I know I am posting this article after a long time. Today we are talking about Linux Lite. Linux Lite is a very useful & favourite Linux Distro used by newbie users of Linux. This Linux distro is famous with their light weight desktop that is very friendly with their users.

Before you check the next part you can read some of our articles written on Linux environment.

They has released a version in April i.e. Linux Lite 3.4 based on Ubuntu 16.04.2 & Linux kernel 4.4. The developers of Linux Lite have worked for five months & released a new version. There are lot of improvements that are made in the latest version.

I have written some of the most important features & changes that are provided in the new version. Read them below.

Linux Lite 3.6 Changes and Features

There are various Lite sources in Linux 3.6. The repository selector helps us to find the nearest repository which is decided on your current location. This feature is helpful in getting a faster download speed. This can be see in the Lite sources in the Settings.linux lite 3.6 lite sources.

linux lite 3.6
linux lite 3.6

Another feature that we are talking about is an online & offline search engine for the Help Manual. This is the result of four fee software projects, confirmed by the developer team.

The welcome screen is changed as Arch Theme in Mozilla ThunderBird is included in theme continuity.

The GUI & code changes are changed at some aspect in minor Lite Upgrade & Lite Welcome. You will find some also spot new wallpapers, better BluRay support, and better Broadcom wireless support.

linux lite 3.6 lite sources
linux lite 3.6 lite sources

The major components & packages that are changed in the new version i.e.

  • Kernel (custom kernel available for versions 3.13 – 4.12)
  • Firefox 55.0.2
  • Thunderbird 52.2.1
  • LibreOffice
  • VLC – 2.2.2
  • Gimp 2.8.22
  • Base: Ubuntu 16.04.3

Linux Lite 3.6 Download and Upgrade

If you want to download this & install this in your PC , then you can go to this link. You can download it in 32-bit and 64-bit hardware.

If you are trying to do an update, then then you can’t make the upgrade path from Beta releases & Series 2 to Series 3.

Linux Lite 3.4 released , Check the new features & Download ISO from here

Linux Lite 3.4 OS is now available to download. This operating system is based on Ubuntu 16.04.2 and Linux kernel 4.4. After five months of research & development, Linux lite has come with Lite updates notify & zRAM.

Linux Lite 3.4

Linux Lite has become on of the fastest using OS in the whole world. This distribution is not just famous about the user friendly features but also of its low resource demands which lets you use it in old PC’s.

The official release of Linux Lite 3.4 final was announced a few days ago by the developers. This new update has improved the user experience & focus more on security features. The most popular update from this OS is it’s now application called Lite Updates Notify.

Features of Linux Lite 3.4

Lite Updates Notify is a desktop software which allows you to keep track for all the updates that are helpful in being aware about updates released. How frequently you like to update is up to you. You can set the reminder for a update for every hour to three weeks.

The welcome screen of Linux Lite has a new look. After the installation it will ask you to download the updates & to create a restore point.

Linux Lite 3.4
Linux Lite 3.4

Another feature is named as zRAM. It is a compressed device that is helpful to work smoothly in old PCs. This also provides better compatibility for joysticks.

It has also given the option to Hibernate & sleep in the previous version. In the latest version, you can remove the option to shutdown more quickly from the menu.

Linux Lite 3.4 Change log

  • Kernel 4.4.0-70
  • Firefox 52.0.1
  • Thunderbird 45.7.0
  • LibreOffice
  • VLC – 2.2.2
  • Gimp 2.8.20
  • Netflix support in Firefox
  • Lite Help Manual – tutorial to switch from repositories.
  • Execute bash scripts by double click
  • Desktop Notifications theme
  • 2 new Wallpapers, Fireworks, Waterfalls (community chosen)
  • Ubuntu 16.04.2

That’s all for this new version of Linux Lite. If you like to use this after knowing about it , then you can download it from the link. The direct link or the torrent can be taken from here.

So if you find the information useful, then you can check the details from here. If you want to provide any feedback, then please comment below to let us know. Thanks.

How to do WordPress Pen testing using WPScan

WordPress is a open source tool used for blogging & other beautiful websites design. WordPress is a CMS (Content management System) that works through Php & Sql. Here we are going to conduct Wordpress testing using wpscan.

WordPress testing using wpscan

WordPress is so much used by everyone that many questions have arrived in the security of this technology.


WordPress testing using wpscan. WPScan is pen testing tool that is used for checking the vulnerability of a WordPress website. It was developed by Ryan Dewhurst and sponsored by Sucuri. It is pre-installed with many distributions of linux such as BackBox Linux, Kali Linux, Pentoo, SamuraiWTF, BlackArch. WPScan do not support windows.

Wordpress testing using wpscan
WordPress testing using wpscan

WPScan can enumerate theme, plugins, users, HTTP proxy but it does not check the source code of the page.

Also Read : RHEL 6.9 the last version of RHEL family is released

Commands Used in Pen testing WordPress site

One by one all the commands are written below. There are many things which you need to do for the testing of WordPress site.
Enumerate WordPress version, theme and plugin
• wpscan –url –enumerate p
• wpscan –url –enumerate t
Enumerate WordPress users
• wpscan –url –enumerate u

How to pentest your WordPress website

Launch a brute-force attack
wpscan –url –wordlist /root/Desktop/password.txt –username kcwto
Enumerate timthumbs
If you are still using TimThumb, even after a very serious vulnerability, you have one more reason to be concerned.
wpscan –url –enumerate tt
Store the output in a separate File
wpscan –url –debug-output 2>debug.log

Also Read : Learn basics of Linux hacking for hacking aspirants Part 14

Pen testing is an art that depends on the analysis & knowledge of the hacker. The commands given here are the basics of testing. You must be aware about every aspect of the site for which the test is conducted.

Write us in the comment box for any help. Thank You.

RHEL 6.9 the last version of RHEL family is released on 20th march 2017

RHEL has released the last version i.e. RHEL 6.9. Red hat series has now come to an end where the last version has released. This version comes with updated TLS 1.2 and better support for PCI-DSS standard. The updated version has made easier to port RHEL 6 workloads to container-based application. Now you can use them on other platforms too.

RHEL 6.9

Red Hat is one of the leading open source software providers to the world. RHEL is a community who that provides reliable and high-performing cloud, Linux, middleware, storage and virtualization technologies. They also provides support & training for operating their products. Here we are talking about the new version of RHEL 6.9 which is also the last instalment of RHEL.

Also Read : Parrot Linux with a new Updated version with kernel 4.9.13

RHEL 6.9 is available for its users. On 20th march 2017, Red Hat has announced the release of their last version of RHEL 6 family. RHEL was more popular in enterprises. The second phase of RHEL 6’s development cycle has ended now.

As phase 2 is finished Red Hat 6 will receive only security updates till 2020. Now in the phase RHEL will focus on the development of RHEL 7 platform. A version of RHEL 7 that is 7.3 was released last year.

RHEL 6.9
RHEL 6.9

The recent updates that are included in RHEL 6.9 is TLS 1.2 protocol which strengthen communication security. Enhanced support for PCI-DSS standard is also given which is used for secure online transaction for money in terms of Visa & Master Card. The retail firms who uses RHEL 6 will be get more security than before.

Features of RHEL 6.9

RHEL 6.9 is now compatible with modern applications which are working with cloud storage. RHEL provides a easier method for a application to move from a workloads into container-based applications. Applications can now easily deployed in RHEL Atomic Host, RHEL 7, and the Open Shift Container Platform.

Jim Totton the vice president and general manager of RedHat said during the release. “For more than six years, Red Hat Enterprise Linux 6 has provided enterprise IT with a more secure, stable and reliable platform for mission-critical workloads, from financial systems to national security applications. Red Hat Enterprise Linux 6.9 shows our continued commitment to providing a solid backbone for production deployments, adding security and stability enhancements and an updated container base image to address a variety of vital business IT needs.”

All these service & features which are discussed here are only available to RHEL subscribers. Those who would like to update the system can do it as a free subscription.

Also Read : Learn basics of Linux hacking for hacking aspirants Part 14

if you find the information useful please write a comment for us. Like us on Facebook for more Updates like this one.

Learn basics of Linux hacking for hacking aspirants Part 14

This tutorial is based on the mysql kali linux. MySQL is a very popular database application used in almost all web application. This will let you know about working the MySQL application.

Install MySQL Kali Linux

Before going into the deep, I am going to give a small introduction for mysql kali linux. MySQL is a GPU license application for the manipulation of database. Since MySQL was developed by sun microsystems & later was purchased by Oracle in 2008 & 2009 respectively.

Oracle & free source decided to let MySQL freeware for the users. Because of this reason the web technologies used the MySQL as its backend. The following technologies that use MySQL are

  • Kayak
  • Wikipedia
  • YouTube
  • WordPress
  • Facebook
  • LinkedIn
  • Twitter

Most of all content management system like Joomla & Ruby on rails also uses MySQL as their database. So if you are going to learn MySQL, then it would be helpful in the hacking career.

Install mysql kali linux

Before installing MySQL, you need to update your repositories. The command to update the repositories is

apt-get update

This command will take some time according to your Internet Connection. After it is done go to the next step.

Also Read : Learn basics of Linux hacking for hacking aspirants Part 13

To install MySQL , type the command given

apt-get install mysql-server

During, the installation, there will a message flashed that will ask you for the root password. If you ignored the password section, then you can set the password by shell script.


A message will appear on the screen asking for password.

mysql kali linux
mysql kali linux

After this there will be many more messages on the screen which you need to enter.

Start MySQL

Type the command on the terminal.

mysql -u root -p

After the command, password needs to be entered.

In case you are far away from the database server, like being a hacker then you need to use this command.

mysql -u root -p

This command will take to the database after you enter the password.

Show Database

To hack a database, now we have to use the command to display the database.

show databases;

As the command will show the details of database, now you can

Use a field name of database like this

use <database field name>;

This command will show you a message “”Database changed”.

Find a Table

To display a table use show command in the following syntax.

show tables;

Select Data

To see a specific data from the table you can use select command.

SELECT <columns> FROM <table>

Also Read : Learn basics of Linux hacking for hacking aspirants Part 12

Now these are the important MySQL commands that are used in the MySQL database management. If you have any questions regarding it, ask in the comment box. Thank You.

How to use Google Dorks , Google Dorking Commands – Google Dorks List

Google is not used for searching some information. You can use this search engine for the hacking activities. If you are trying to learn some hacking techniques from this article, we will provide you some ways to use google hacking.

Google Dorking List –  Google Dorks Download

Google is also used for hacking purpose. Many government organisation uses Google search engine for hacking. By using right query several helpful data can be retrieved. In this article, we will provide you methods that can be used by hacker to gather some additional information.

National security agency has released a book that has given many methods to use search engine .The name of the book is “Untangling the Web: A Guide to Internet Research”. These searching methods are very out of the box. This book is consisting of more than 600 pages which is totally based on search engine uses.

Book explains that using google for hacking is not a matter of public. This is a very confidential book, which should not be given to anyone. Google spiders allow google to guide in the non- restricted sections. The restricted sections are specified by robots.txt.

Google Dorking List -  Google Dorks Download
Google Dorking List –  Google Dorks Download

Google started the restriction algorithm on the resources two years back. Still sometimes there are little data that is not seen by google. This data can be seen by Google search. If you can find & use the data for some use, this can be done to learn hacking.

What we see in Google Dorks ?

Type of data that can be seen in Google search results are written below.

  • User Login Information.
  • Corporate information
  • Private data
  • Government related data.
  • Websites and server Errors.

Some popular methods that are used by others for Google hacking.

Searching through file extension

There are various companies who keep their data in excel files. These files can be searched in the Google search engine. You just need to specify the file extension, company name & some phrases that are used in the company like proprietor, confidential etc. You can also use the url of the company.

You can see by this example. [filetype :xls site : za confidential]

Also ReadBasics of Linux for the purpose of Ethical hacking

Search Login Information

Login data of any website can also be searched in the google search. There is a fixed sequence in most foreign websites. This can be done as [filetype:xls site : ru login]

Search Passwords

This often very occasionally in the search results. You can search [intitle:”index of’ site:za password] to find some of those.

Numrange Searches

NSA has named it as the creepiest searches of google. You need to apply for two numbers which are divided, without any gap. [ 617..780]

Bypass the Registration process

There are some sites who are pushy for registration. If you don’t want to make registration in the site. Then this can be used for it.

[ inurl:directory]

[ inurl:index]

[ inurl:companies]

[ inurl:database]

These are some of those techniques which I learn from it. If you you want to learn more from them, you can read the e-book.

Also ReadLearn basics of Linux hacking for hacking aspirants

If you like the information, then please tell us in the comment box. If you any question then you can tell us in the comment box. Thank You.