Shelling our way up

Outsmart Malicious Hackers


Everybody has a favorite shell; not so many under Windows as there are under Linux, but anyway…

As most will tell you there favorite shell under Linux would be bash, as under Windows not really having what to chose from they would say cmd.exe (ok, bash can be used under Windows via cygwin, if I remember well).

But if you remeber well I wrote an article a while back about PowerShell, and so it seems that nowadays Windows users have a brand new shell which at some points can be quite impresive…

Anyway this article was ment to compare bash – PowerShell, but rather than doing that I would advice you to take a look on Wikipedia Comparison of computer Shells; this way you can decide which shell is the best (suitable) for you…

P.S. PowerShell being a freshly developed shell may have some glitches, as I found one some time ago NetCat & PowerShell -> disaster

Posted in: Hacking News

,


Latest Posts:


StaCoAn - Mobile App Static Analysis Tool StaCoAn – Mobile App Static Analysis Tool
StaCoAn is a cross-platform tool which aids developers, bug bounty hunters and ethical hackers performing mobile app static analysis on the code of the application for both native Android and iOS applications.
snallygaster - Scan For Secret Files On HTTP Servers snallygaster – Scan For Secret Files On HTTP Servers
snallygaster is a Python-based tool that can help you to scan for secret files on HTTP servers, files that are accessible that shouldn't be public and can pose a s
Portspoof - Spoof All Ports Open & Emulate Valid Services Portspoof – Spoof All Ports Open & Emulate Valid Services
The primary goal of the Portspoof program is to enhance your system security through a set of new camouflage techniques which spoof all ports open and also emulate valid services on every port.
Cambridge Analytica Facebook Data Scandal Cambridge Analytica Facebook Data Scandal
One of the biggest stories of the year so far has been the scandal surrounding Cambridge Analytica that came out after a Channel 4 expose that demonstrated the depths they are willing to go to profile voters, manipulate elections and much more.
GetAltName - Discover Sub-Domains From SSL Certificates GetAltName – Discover Sub-Domains From SSL Certificates
GetAltName it's a little script to discover sub-domains that can extract Subject Alt Names for SSL Certificates directly from HTTPS websites which can provide you with DNS names or virtual servers.
Memcrashed - Memcached DDoS Exploit Tool Memcrashed – Memcached DDoS Exploit Tool
Memcrashed is a Memcached DDoS exploit tool written in Python that allows you to send forged UDP packets to a list of Memcached servers obtained from Shodan.


3 Responses to Shelling our way up

  1. Pantagruel April 21, 2008 at 9:29 pm #

    I started using bash shell some odd 15 years ago and haven’t switched since. It might not be able to cover all available options but once proficient you tend to stick with it (you might also call me downright lazy for not trying more suitable shells).
    Cygwin works quite nice on the windows platform but you can just as well use a cd/dvd based linux distro to get a real shell.
    I have tried Ch shell for windows and was quite impressed (www.softintegration.com) but could be bothered to rewrite the bunch of scripts I use on a regular basis.

  2. zupakomputer April 23, 2008 at 6:46 pm #

    Well! That is interesting & helpful both. And to think some folks aren’t up on some .NET dev tools being any use for making games! There’s certainly the features you’d want for that listed for Power Shell.

    And for some other things too ;like darknet topics.

    Also, there’s a linux interface for at least some .NET tools…..I keep thinking, as I’m trying to recall its name, that it is something like mono..but I might be thinking of the firewall there.

    Haven’t used much bash meself, but it seems pretty intuitive once you get used to it. Intend to / hope to get around to more of that. Still pretty much covers all you need.

    I think the Bourne movies are refering to bash/sh in their titles; those older hacker guides where they’d always tell you to get a unix shell account for free-anonymity.

  3. backbone April 29, 2008 at 3:12 pm #

    zupakomputer you said it right… it’s called Mono!