|
You are here |
pentestmonkey.net | ||
| | | | |
blog.ikuamike.io
|
|
| | | | | Summary Over the weekend I participated in Metasploit Community December CTF by Rapid7 with team fr334aks . We ended up getting position 57/413. The CTF was meant to be beginner-friendly. Intro Teams are provided with their own instance of a kali box which is public facing to act as a jump host to reach an ubuntu VM which hosts the challenges. On the ubuntu VM there are 20 open ports for each challenge. | |
| | | | |
gtfobins.github.io
|
|
| | | | | [AI summary] The text explains various methods to exploit Perl scripts for privilege escalation and maintaining access in restricted environments through techniques like reverse shells, SUID binaries, and capability manipulation. | |
| | | | |
cocomelonc.github.io
|
|
| | | | | [AI summary] The post explains reverse shell techniques in cybersecurity, detailing how attackers use them to gain remote control over a target system by connecting back to their machine, with examples in various programming languages and tools like netcat. | |
| | | | |
www.uptycs.com
|
|
| | | Remote Code Execution (RCE): explore essential strategies to enhance your AWS cloud security & protect against RCE threats. | ||