r3kind1e - Cybersecurity Insights and Penetration Testing

「The quieter you become, the more you are able to hear.」

Exploiting Misconfigured Cron Jobs

Exploiting Misconfigured Cron Jobs Cron Jobs Linux implements task scheduling through a utility called Cron. Cron is a time-based service that runs applications, scripts and other commands repeate...

Linux Kernel Exploits

Linux Kernel Exploits Linux Kernel Exploitation Kernel exploits on Linux will typically target vulnerabilities in the Linux kernel to execute arbitrary code in order to run privileged system comman...

Exploiting SAMBA

Exploiting SAMBA Exploiting SAMBA SMB (Server Message Block) is a network file sharing protocol that is used to facilitate the sharing of files and peripherals between computers on a local network ...

Exploiting SSH

Exploiting SSH Exploiting SSH SSH (Secure Shell) is a remote administration protocol that offers encryption and is the successor to Telnet. It is typically used for remote access to servers and sy...

Exploiting FTP

Exploiting FTP FTP (File Transfer Protocol) is a protocol that uses TCP port 21 and is used to facilitate file sharing between a server and client/clients. It is also frequently used as a means of...

Exploiting Bash CVE-2014-6271 Vulnerability (Shellshock)

Exploiting Bash CVE-2014-6271 Vulnerability (Shellshock) CVE-2014-6271 - Shellshock Shellshock (CVE-2014-6271) is the name given to a family of vulnerabilities in the Bash Shell (sin V1.3) that all...

Frequently Exploited Linux Services

Frequently Exploited Linux Services Linux is a free and open source operating system that is comprised of the Linux kernel, which was developed by Linus Torvalds, and the GNU toolkit, which is a co...

Pass-The-Hash Attacks

Pass-The-Hash Attacks Pass-The-Hash Pass-the-hash is an exploitation technique that involves capturing or harvesting NTLM hashes or clear-text passwords and utilizing them to authenticate with the ...

Dumping Hashes With Mimikatz

Dumping Hashes With Mimikatz(使用 Mimikatz 转储哈希) Mimikatz Mimikatz 是 Benjamin Delpy (@gentilkiwi) 编写的 Windows 后期利用工具。 它允许从内存中提取明文密码、哈希和 Kerberos 票证。 SAM(安全帐户管理器)数据库是 Windows 系统上存储散列用户密码的数据库文件。 Mimi...

Searching For Passwords In Windows Configuration Files

Searching For Passwords In Windows Configuration Files(在 Windows 配置文件中搜索密码) Windows 配置文件 Windows 可以自动执行各种重复性任务,例如在许多系统上大规模推出或安装 Windows。 这通常通过使用无人参与的 Windows 安装实用程序来完成,该实用程序用于自动在系统上大规模安装/部署 Window...