account
2024-08-25
An account on a computer system is an identifier that is tied to a specific user, software, or process.
Read More
command history
2024-08-25
Command history are log files or internal methods that keep a ledger of commands that have been ran within a shell session.
Read More
Daniel Roberson
2024-08-25
Daniel Roberson (aka dmfr) is an American hacker, cybersecurity professional, developer, and author from Las Vegas, Nevada.
Daniel is a black belt in ...
Read More
fingerprint
2024-08-25
A fingerprint is a unique trait used to identify a specific entity.
in a cybersecurity context, malware and legitimate software and be ...
Read More
home directory
2024-08-25
A home directory (or user folder on Windows) is a directory assigned to a user account intended for them to keep their personal files.
Read More
plaintext
2024-08-25
Plaintext refers to human-readable data on a computer system.
Read More
rsh
2024-08-25
The restricted shell (rsh) is used to set up environments that are more restricted than the standard shell.
bash provides rbash as a restricted shell ...
Read More
runtimeprocessinfection-anonymous2002
2024-08-25
Runtime Process Infection
by anonymous (2002)
Phrack Magazine. Issue 59 article 8.
https://phrack.org/issues/59/8.html
Read More
Notes ...
SOCKS
2024-08-25
SOCKS is an Internet protocol that enables traffic to flow between a client and server through a proxy server.
SOCKS5 operates in a similar manner as ...
Read More
SSH forwarding/tunneling
2024-08-25
SSH forwarding or tunneling is a secure and encrypted pathway from a user’s local machine to a remote location over the SSH protocol.
With the ...
Read More