command execution

2024-08-27

Command execution or command injection is a type of cyberattack in which an attacker executes arbitrary commands on a remote host by means of a ...

Read More

disabling bashrc

2024-08-27

It may be necessary to disable bashrc for a number of reasons:

  • a user added a mistake in .bashrc or .bash_profile that causes the shell to be ...

Read More

hasshServer

2024-08-27

hasshServer is an MD5 hash created from the set of algorithms used by an SSH server used for software fingerprinting purposes.

Read More

IRC

2024-08-27

Internet Relay Chat (IRC) is a protocol that provides a text-based chat system over a computer network.

Read More

PermitRootLogin

2024-08-27

PermitRootLogin is a setting found in OpenSSH servers that defines whether or not sshd will accept logins from the root user.

This setting can be ...

Read More

process masquerading

2024-08-27

Process masquerading aka process name stomping is an anti-analysis/deception technique used by malware in which a malicious process changes its name ...

Read More

procfs

2024-08-27

procfs or the proc file system, is a virtual filesystem that provides information about the system. Its data can be accessed with typical filesystem ...

Read More

protocol

2024-08-27

In computer science, a protocol is an official procedure that governs how two entities communicate with each other, especially over a computer network ...

Read More

ps command

2024-08-27

The ps command shows information about actively running processes on a system. The ps command is common on Linux and Unix-like systems.

Read More

SSH identity key

2024-08-27

A SSH identity key is a private key used to authenticate users using the SSH protocol.

OpenSSH provides a command ssh-keygen to create identity keys.

Read More