PID file

2024-08-26

A PID file (Process ID file) is a file that stores the process ID of a running process.

Read More

rootkits hiding CPU usage

2024-08-26

A common feature of a rootkit is to hide or obscure an infected system or process’ CPU usage. This is frequently seen in conjunction with ...

Read More

socket

2024-08-26

A socket is a data structure within computer software that allows data to be transmitted over a network.

Read More

stealthshell-petrich2024

2024-08-26

Stealth Shell: A Fully Virtualized Attack Toolchain

by Ryan Petrich

Phrack Magazine issue 71 article 14. 2024

https://phrack.org/issues/71/14.html ...

Read More

userland

2024-08-26

Userland or userspace refers to all code running outside of an operating system’s kernel. This is typically code ran by users of the system, ...

Read More

watchdog

2024-08-26

A watchdog is a hardware or software component that intervenes if it detects strange behavior. Commonly, watchdog processes are implemented on Linux ...

Read More

account

2024-08-25

An account on a computer system is an identifier that is tied to a specific user, software, or process.

Read More

command history

2024-08-25

Command history are log files or internal methods that keep a ledger of commands that have been ran within a shell session.

Read More

Daniel Roberson

2024-08-25

Daniel Roberson (aka dmfr) is an American hacker, cybersecurity professional, developer, and author from Las Vegas, Nevada.

Daniel is a black belt in ...

Read More

fingerprint

2024-08-25

A fingerprint is a unique trait used to identify a specific entity.

in a cybersecurity context, malware and legitimate software and be ...

Read More