Team TESO

2024-08-28

TESO (Team TESO, 7350) was a hacker group formed in Austria in the late 90s. TESO was active between 1998 and 2004 and responsible for many high ...

Read More

telephone

2024-08-28

A telephone is a telecommunications device that connects two or more users to have a conversation when they are too far apart to speak normally. ...

Read More

upgradingpty-ropnop2017

2024-08-28

Upgrading Simple Shells to Fully Interactive TTYs

by ropnop 2017

https://blog.ropnop.com/upgrading-simple-shells-to-fully-interactive-ttys/ ...

Read More

argv

2024-08-27

argv (the argument vector) is an array of pointers to NULL-terminated character strings representing the command line arguments passed to a ...

Read More

command execution

2024-08-27

Command execution or command injection is a type of cyberattack in which an attacker executes arbitrary commands on a remote host by means of a ...

Read More

disabling bashrc

2024-08-27

It may be necessary to disable bashrc for a number of reasons:

  • a user added a mistake in .bashrc or .bash_profile that causes the shell to be ...

Read More

hasshServer

2024-08-27

hasshServer is an MD5 hash created from the set of algorithms used by an SSH server used for software fingerprinting purposes.

Read More

IRC

2024-08-27

Internet Relay Chat (IRC) is a protocol that provides a text-based chat system over a computer network.

Read More

PermitRootLogin

2024-08-27

PermitRootLogin is a setting found in OpenSSH servers that defines whether or not sshd will accept logins from the root user.

This setting can be ...

Read More

process masquerading

2024-08-27

Process masquerading aka process name stomping is an anti-analysis/deception technique used by malware in which a malicious process changes its name ...

Read More