Explore >> Select a destination


You are here

0xboku.com
| | cocomelonc.github.io
3.5 parsecs away

Travel
| | [AI summary] The post explains reverse shell techniques in cybersecurity, detailing how attackers use them to gain remote control over a target system by connecting back to their machine, with examples in various programming languages and tools like netcat.
| | blog.nuculabs.de
3.0 parsecs away

Travel
| | Hello and welcome to Nucu Labs agent! We've been contracted by some external contractors to help them break..., I mean, assist them in making their life easier with their "competition". We obtained their competition's software from a poorly configured AWS server. Their competition, X, uses the software in order to setup a private communication channel to their servers, the software is simple, it fires up a server, listens on a port and waits for the right password, when the right password is entered, the server remembers the client and stops asking for passwords, simple.
| | nagekar.com
2.5 parsecs away

Travel
| | [AI summary] The author discusses developing a TCP banner grabbing utility in C, encountering issues with port scanning and banner interpretation, and seeks feedback on the code.
| | www.anmolsarma.in
8.2 parsecs away

Travel
| TL;DR: DCCP is a relatively newer transport layer protocol which draws from both TCP and UDP. Jump straight to the example C code. Background Historically, the majority of the traffic on the Internet has been over TCP which provides a reliable connection-oriented stream between two hosts. UDP has been mainly used by applications whose brief transfers would be unacceptably slowed by TCP's connection establishment overhead or those for which timeliness is more important than reliability.