command execution
2024-08-27
Command execution or command injection is a type of cyberattack in which an attacker executes arbitrary commands on a remote host by means of a ...
Read More
disabling bashrc
2024-08-27
It may be necessary to disable bashrc for a number of reasons:
Read More
a user added a mistake in .bashrc or .bash_profile that causes the shell to be ...
hasshServer
2024-08-27
hasshServer is an MD5 hash created from the set of algorithms used by an SSH server used for software fingerprinting purposes.
Read More
IRC
2024-08-27
Internet Relay Chat (IRC) is a protocol that provides a text-based chat system over a computer network.
Read More
PermitRootLogin
2024-08-27
PermitRootLogin is a setting found in OpenSSH servers that defines whether or not sshd will accept logins from the root user.
This setting can be ...
Read More
process masquerading
2024-08-27
Process masquerading aka process name stomping is an anti-analysis/deception technique used by malware in which a malicious process changes its name ...
Read More
procfs
2024-08-27
procfs or the proc file system, is a virtual filesystem that provides information about the system. Its data can be accessed with typical filesystem ...
Read More
protocol
2024-08-27
In computer science, a protocol is an official procedure that governs how two entities communicate with each other, especially over a computer network ...
Read More
ps command
2024-08-27
The ps command shows information about actively running processes on a system. The ps command is common on Linux and Unix-like systems.
Read More
SSH identity key
2024-08-27
A SSH identity key is a private key used to authenticate users using the SSH protocol.
OpenSSH provides a command ssh-keygen to create identity keys.
Read More