r3kind1e - Cybersecurity Insights and Penetration Testing

「The quieter you become, the more you are able to hear.」

Persistence Via Cron Jobs

Linux Persistence Persistence Via Cron Jobs Linux implements task scheduling through a utility called Cron. Cron is a time-based service that runs applications, scripts and other commands repeatedl...

Persistence Via SSH Keys

Linux Persistence Persistence Via SSH Keys Linux is typically deployed as a server operating system and as a result, Linux servers are typically accessed remotely via services/protocols such as SSH...

Persistence Via RDP

Windows Persistence(Windows持久化) Persistence Via RDP(通过RDP实现持久化) Demo: Persistence Via RDP(演示:通过RDP实现持久化) We’re going to be exploring the process of establishing persistent access on a Windows targe...

Persistence Service

Windows Persistence Persistence Via Services Establishing Persistence On Windows Persistence consists of techniques that adversaries use to keep access to systems across restarts, changed creden...

Linux Privilege Escalation - SUDO Privileges

Linux Privilege Escalation - SUDO Privileges(Linux权限提升 - SUDO权限) Demo: Linux Privilege Escalation - SUDO Privileges(演示:Linux权限提升 - SUDO权限) We’re going to be exploring the process of identifying bin...

Linux Privilege Escalation - Weak Permissions

Linux Privilege Escalation Linux Privilege Escalation - Weak Permissions LinEnum LinEnum - LinEnum is a simple bash script that automates common Linux local enumeration checks in addition to identi...

Windows Privilege Escalation

Windows Privilege Escalation(Windows权限提升) Demo: Windows Privilege Escalation(演示:Windows权限提升) We will be exploring the process of utilizing the credentials we obtained in the previous video when we ...

Identifying Windows Privilege Escalation Vulnerabilities

Windows Privilege Escalation Identifying Windows Privilege Escalation Vulnerabilities Identifying PrivEsc Vulnerabilities In order to elevate your privileges on Windows, you must first, identify pr...

Upgrading Non-Interactive Shells

Upgrading Non-Interactive Shells(升级非交互式Shell) Demo: Upgrading Non-Interactive Shells(演示:升级非交互式Shell) This is pertinent to Linux post exploitation. We have exploited a few Linux systems. And one of...

Transferring Files To Linux Targets

Transferring Files To Linux Targets(将文件传输到Linux目标) Demo: Transferring Files To Linux Targets(演示:将文件传输到Linux目标) We’ll be exploring the process of how to transfer a file to a Linux target that you ha...