account

2024-08-25

An account on a computer system is an identifier that is tied to a specific user, software, or process.

Read More

command history

2024-08-25

Command history are log files or internal methods that keep a ledger of commands that have been ran within a shell session.

Read More

Daniel Roberson

2024-08-25

Daniel Roberson (aka dmfr) is an American hacker, cybersecurity professional, developer, and author from Las Vegas, Nevada.

Daniel is a black belt in ...

Read More

fingerprint

2024-08-25

A fingerprint is a unique trait used to identify a specific entity.

in a cybersecurity context, malware and legitimate software and be ...

Read More

home directory

2024-08-25

A home directory (or user folder on Windows) is a directory assigned to a user account intended for them to keep their personal files.

Read More

plaintext

2024-08-25

Plaintext refers to human-readable data on a computer system.

Read More

rsh

2024-08-25

The restricted shell (rsh) is used to set up environments that are more restricted than the standard shell.

bash provides rbash as a restricted shell ...

Read More

runtimeprocessinfection-anonymous2002

2024-08-25

Runtime Process Infection

by anonymous (2002)

Phrack Magazine. Issue 59 article 8.

https://phrack.org/issues/59/8.html

Notes ...
Read More

SOCKS

2024-08-25

SOCKS is an Internet protocol that enables traffic to flow between a client and server through a proxy server.

SOCKS5 operates in a similar manner as ...

Read More

SSH forwarding/tunneling

2024-08-25

SSH forwarding or tunneling is a secure and encrypted pathway from a user’s local machine to a remote location over the SSH protocol.

With the ...

Read More