FFUF, which stands for “Fuzz Faster U Fool,” is a fast and flexible open-source web fuzzing tool written in the Go programming language. It is primarily used for discovering hidden…
System Info Obtain System information Search for kernel exploits using scripts Use Google to search for kernel exploits Use searchsploit to search for kernel exploits Interesting info in env vars? Passwords in PowerShell history? Interesting info in Internet settings? Drives? WSUS exploit?…
System Information Get OS information Check the PATH, any writable folder? Check env variables, any sensitive detail? Search for kernel exploits using scripts (DirtyCow?) Check if the sudo version is vulnerable Dmesg signature verification failed More system enum (date, system stats,…
A bind shell is a type of remote access shell in which the target (or victim) machine opens a specific network port and listens for incoming connections. Once this port is open, an attacker can connect to it from a remote location and gain command-line access to the target system, allowing them to execute commands as if they were physically present at the machine.
A reverse shell is a technique used to gain remote command-line access to a computer, typically as part of a cyberattack. Unlike a traditional remote shell (or “bind shell”), where an attacker connects directly to a target system that is listening for incoming connections, a reverse shell works by having the victim’s machine initiate an outbound connection to the attacker’s computer. This reversal of roles is what gives the technique its name.
Common ports Port numberService nameTransport protocolDescription7EchoTCP, UDPEcho service19CHARGENTCP, UDPCharacter Generator Protocol, has severe vulnerabilities and thus is rarely used nowadays20FTP-dataTCP, SCTPFile Transfer Protocol data transfer21FTPTCP, UDP, SCTPFile Transfer Protocol command…
In Linux, “dirty” refers to a page waiting for a disk write (page cache writes to disk whenever the page becomes “dirty”). The Linux Dirty Pipe vuln (CVE-2022-0847) affects all…
Using ransomwarewatch commands Ransomwarewatch is a github project that scans and stores ransomware data from the dark web. It has a CLI interface you can use to query the database.…
The worst passwords in the world In the worst passwords list, you might find it horrifying that many people even use qwerty or 123456, which is quite funny. Others use their own name or…
About FTP In an FTP connection, two channels are opened. First, the client and server establish a control channel through TCP port 21. The client sends commands to the server, and…