|
You are here |
rot256.dev | ||
| | | | |
gtfobins.github.io
|
|
| | | | | [AI summary] The text explains various methods to exploit Perl scripts for privilege escalation and maintaining access in restricted environments through techniques like reverse shells, SUID binaries, and capability manipulation. | |
| | | | |
www.justus.pw
|
|
| | | | | [AI summary] The user successfully gained access to a system by exploiting a Heartbleed vulnerability, decrypted an RSA key using a password obtained from memory, and then used that key to log in as the 'hype' user. After enumerating the system, they accessed a Tmux session to gain root access and retrieved the root flag. | |
| | | | |
pentestmonkey.net
|
|
| | | | | [AI summary] This article provides a cheat sheet for creating reverse shells in various scripting languages during penetration testing. | |
| | | | |
dataprot.net
|
|
| | | Login credentials enable us to access any private or restricted system, account, or device. At a minimum, they include a username & password. | ||