Bind shell cheatsheet

Bind shell cheatsheet

A bind shell is a type of remote access shell in which the target (or victim) machine opens a specific network port and listens for incoming connections. Once this port is open, an attacker can connect to it from a remote location and gain command-line access to the target system, allowing them to execute commands as if they were physically present at the machine.
Reverse shell cheatsheet

Reverse shell cheatsheet

A reverse shell is a technique used to gain remote command-line access to a computer, typically as part of a cyberattack. Unlike a traditional remote shell (or “bind shell”), where an attacker connects directly to a target system that is listening for incoming connections, a reverse shell works by having the victim’s machine initiate an outbound connection to the attacker’s computer. This reversal of roles is what gives the technique its name.
FTP hacking

FTP hacking

About FTP In an FTP connection, two channels are opened. First, the client and server establish a control channel through TCP port 21. The client sends commands to the server, and…
How to generate PGP keys

How to generate PGP keys

How to generate PGP keys using GPG on Linux The GNU Privacy Guard application allows you to encrypt and decrypt information, create public and private encryption keys, and use or…
DNS hacking

DNS hacking

About DNS DNS is a system for resolving computer names into IP addresses, and it does not have a central database. The information is distributed over many thousands of name…