PID file
2024-08-26
A PID file (Process ID file) is a file that stores the process ID of a running process.
Read More
rootkits hiding CPU usage
2024-08-26
A common feature of a rootkit is to hide or obscure an infected system or process’ CPU usage. This is frequently seen in conjunction with ...
Read More
socket
2024-08-26
A socket is a data structure within computer software that allows data to be transmitted over a network.
Read More
stealthshell-petrich2024
2024-08-26
Stealth Shell: A Fully Virtualized Attack Toolchain
by Ryan Petrich
Phrack Magazine issue 71 article 14. 2024
https://phrack.org/issues/71/14.html ...
Read More
userland
2024-08-26
Userland or userspace refers to all code running outside of an operating system’s kernel. This is typically code ran by users of the system, ...
Read More
watchdog
2024-08-26
A watchdog is a hardware or software component that intervenes if it detects strange behavior. Commonly, watchdog processes are implemented on Linux ...
Read More
account
2024-08-25
An account on a computer system is an identifier that is tied to a specific user, software, or process.
Read More
command history
2024-08-25
Command history are log files or internal methods that keep a ledger of commands that have been ran within a shell session.
Read More
Daniel Roberson
2024-08-25
Daniel Roberson (aka dmfr) is an American hacker, cybersecurity professional, developer, and author from Las Vegas, Nevada.
Daniel is a black belt in ...
Read More
fingerprint
2024-08-25
A fingerprint is a unique trait used to identify a specific entity.
in a cybersecurity context, malware and legitimate software and be ...
Read More