r3kind1e - Cybersecurity Insights and Penetration Testing

「The quieter you become, the more you are able to hear.」

Establishing Persistence On Linux

Establishing Persistence On Linux Persistence consists of techniques that adversaries use to keep access to systems across restarts, changed credentials, and other interruptions that could cut off ...

Become a Muslim become a hacker

Become a Muslim become a hacker I’m @r3kind1e. To write my experiences, I made many mental preparations. You may wonder why I struggle to write an introduction about myself. That’s because of the ...

Dumping Hashes With Hashdump

Dumping Hashes With Hashdump We can dump Linux user hashes with the hashdump post exploitation module. Linux password hashes are stored in the /etc/shadow file and can only be accessed by the root...

Linux Privilege Escalation Exploiting A Vulnerable Program

Linux Privilege Escalation: Exploiting A Vulnerable Program Linux Privilege Escalation The privilege escalation techniques we can utilize will depend on the version of the Linux kernel running on t...

Linux Post Exploitation Modules

Linux Post Exploitation Modules The MSF provides us with various post exploitation modules for both Windows and Linux. We can utilize these post exploitation modules to enumerate information about...

Pivoting

Pivoting(旋转) Pivoting(旋转) Pivoting is a post exploitation technique that involves utilizing a compromised host to attack other systems on the compromised host’s private internal network. After gai...

Clearing Windows Event Logs

Clearing Windows Event Logs Windows Event Logs The Windows OS stores and catalogs all actions/events performed on the system and stores them in the Windows Event log. Event logs are categorized ba...

Windows Keylogging

Windows Keylogging Keylogging Keylogging is the process of recording or capturing the keystrokes entered on a target system. This technique is not limited to post exploitation, there are plenty of...

Enabling RDP

Enabling RDP The Remote Desktop Protocol (RDP) is a proprietary GUI remote access protocol developed by Microsoft and is used to remotely connect and interact with a Windows system. RDP uses TCP p...

Establishing Persistence On Windows

Establishing Persistence On Windows Persistence consists of techniques that adversaries use to keep access to systems across restarts, changed credentials, and other interruptions that could cut of...