r3kind1e - Cybersecurity Insights and Penetration Testing

「The quieter you become, the more you are able to hear.」

Metasploit Framework Architecture

Metasploit Framework Architecture MSF Architecture A module in the context of MSF, is a piece of code that can be utilized by the MSF. The MSF libraries facilitate the execution of modules without...

Introduction to the Metasploit Framework

Introduction to the Metasploit Framework The Metasploit Framework (MSF) Course Topic Overview Introduction to The Metasploit Framework Metasploit Fundamentals Information Gathering & Enu...

Filtering WiFi

Filtering WiFi(过滤 WiFi) 1 2 tshark -v ls 1 tshark -r WiFi_traffic.pcap -Y 'wlan' 1 tshark -r WiFi_traffic.pcap -Y 'wlan.fc.type_subtype==0x000c' 1 tshark -r WiFi_traffic.pcap -Y 'eapol' 1 t...

WiFi Traffic Analysis

WiFi Traffic Analysis Statistics->Protocol Hierarchy (wlan.fc.type_subtype == 0x0008): We’re going to look for Beacon. It’s a wireless LAN subtype of 0008. !(wlan.wfa.ie.wpa.version == 1): We ...

Filtering Basics

Filtering Basics apply a filter with -Y: 1 2 tshark -r HTTP_traffic.pcap -Y 'http' tshark -r HTTP_traffic.pcap -Y 'http' | more 1 tshark -r HTTP_traffic.pcap -Y 'ip.src==192.168.252.128 &&am...

Tshark

Network-Based Attacks Course Topic Overview Network Attacks Service related Man in the Middle (MITM) Packet analysis Labs Learning Objectives Describe network attacks. Identify network tr...

How to Comfort a Friend Who is Hurting (Exactly What to Say)

How to Comfort a Friend Who is Hurting (Exactly What to Say) How to Comfort a Friend Who is Hurting (Exactly What to Say) This video teaches you simple techniques for how to comfort a friend who ...

Dumping Linux Password Hashes

Dumping Linux Password Hashes Linux Password Hashes Linux has multi-user support and as a result, multiple users can access the system simultaneously. This can be seen as both an advantage and disa...

Exploiting SUID Binaries

Exploiting SUID Binaries Exploiting SUID Binaries In addition to the three main file access permissions (read, write and execute), Linux also provides users with specialized permissions that can be...

Exploiting Misconfigured Cron Jobs

Exploiting Misconfigured Cron Jobs Cron Jobs Linux implements task scheduling through a utility called Cron. Cron is a time-based service that runs applications, scripts and other commands repeate...