Microsoft and CrowdStrike announced on Monday that they are spearheading an industry initiative to map threat actor names. Their objective is to simplify the process for the cybersecurity community to align intelligence effectively.
Honeywell, a prominent industrial giant, released its 2025 Cybersecurity Threat Report on Wednesday. The report reveals a significant increase in ransomware and other malware attacks within the industrial sector.
FFUF, which stands for “Fuzz Faster U Fool,” is a fast and flexible open-source web fuzzing tool written in the Go programming language. It is primarily used for discovering hidden…
System Info Obtain System information Search for kernel exploits using scripts Use Google to search for kernel exploits Use searchsploit to search for kernel exploits Interesting info in env vars? Passwords in PowerShell history? Interesting info in Internet settings? Drives? WSUS exploit?…
System Information Get OS information Check the PATH, any writable folder? Check env variables, any sensitive detail? Search for kernel exploits using scripts (DirtyCow?) Check if the sudo version is vulnerable Dmesg signature verification failed More system enum (date, system stats,…
A bind shell is a type of remote access shell in which the target (or victim) machine opens a specific network port and listens for incoming connections. Once this port is open, an attacker can connect to it from a remote location and gain command-line access to the target system, allowing them to execute commands as if they were physically present at the machine.
A reverse shell is a technique used to gain remote command-line access to a computer, typically as part of a cyberattack. Unlike a traditional remote shell (or “bind shell”), where an attacker connects directly to a target system that is listening for incoming connections, a reverse shell works by having the victim’s machine initiate an outbound connection to the attacker’s computer. This reversal of roles is what gives the technique its name.
Common ports Port numberService nameTransport protocolDescription7EchoTCP, UDPEcho service19CHARGENTCP, UDPCharacter Generator Protocol, has severe vulnerabilities and thus is rarely used nowadays20FTP-dataTCP, SCTPFile Transfer Protocol data transfer21FTPTCP, UDP, SCTPFile Transfer Protocol command…
In Linux, “dirty” refers to a page waiting for a disk write (page cache writes to disk whenever the page becomes “dirty”). The Linux Dirty Pipe vuln (CVE-2022-0847) affects all…