jm33_ng
  • Cryptography
  • Ctf
  • Misc
  • Pentest
  • Programming
  • Tools
  • Vulnerabilities

jm33_ng


an infosec newbie's tech blog

NetCat - File Transfer and More

Date Sun 24 July 2016 Tags netcat / reverse shell / file transfer / post exploitation

What is NetCat

  • According to its manual:
    Netcat is a simple Unix utility which reads and writes data across network connections, using TCP or UDP protocol. 
    It is designed to be a reliable "back-end" tool that can be used directly or easily driven by other programs and scripts.  
    At the …

View comments.

more ...

Pentest Diary - 1

Date Thu 21 July 2016 Tags pentest / google hacking / sqli / sqlmap / reverse shell / router / login bypass

An SQLi

Find a target by googling

  • Yea, before googling for your target, do a research on your target system, pay attention to:

    • Version number on every page?
    • Identical keywords?
    • What's in the target URL?
    • Use - to avoid irrelevant search results
  • My google search results for CVE-2014-1945

    "welcome to opendocman …

View comments.

more ...

  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • »

About jm33

Who

  • weaponizer / linux user / vimer / pythonist / gopher / gray hat / male / siscon / freak

Contact

  • Online CV

  • 3A5DBF07

  • Leave a message

  • Social

    • Twitter
    • LinkedIn
    • StackOverflow
    • Github
  • Recent Posts

    • emp3r0r - Process Injection And Persistence
    • emp3r0r - Break Out Of Internal Network
    • Pure Memory Based Emp3r0r Agents
    • SSHD Injection and Password Harvesting
    • Process Injection On Linux
  • Tags

    • 443
    • active directory
    • ad
    • announcement
    • anonymity
    • antivirus
    • anyconnect
    • apache
    • assembly
    • baidu
    • blackhat
    • buffer overflow
    • C#
    • career
    • censorship
    • change
    • cisco
    • code maintainance
    • compton
    • Coursera
    • crypto
    • cryptography
    • ctf
    • CVE
    • CVE-2018-18955
    • CVE-2018-7750
    • dairy
    • Diary
    • DNS污染
    • DPI
    • email
    • emp3r0r
    • exploit
    • file transfer
    • gf
    • gfw
    • github
    • Glowing Bear
    • golang
    • google hacking
    • great wall
    • greatwall
    • hacking
    • hacking tool
    • HiWiFi
    • HTTP2
    • https
    • injection
    • IRC
    • 极路由
    • Joomla
    • KCP
    • kcptun
    • kernel
    • killer
    • lede
    • life
    • linux
    • linux kernel
    • lkm
    • local privilege escalation
    • log cleaner
    • login bypass
    • LPE
    • macos
    • mass exploit
    • mec
    • memory layout
    • mentohust
    • Misc
    • multi-threaded crawler
    • mysql
    • namespace
    • netcat
    • network
    • nic
    • nikto
    • nmap
    • obfs4
    • obfsproxy
    • ocserv
    • openwrt
    • OSIN
    • paramiko
    • pentest
    • pep8
    • PGP
    • php
    • pi
    • plan
    • port-forwarding
    • post-exploitation
    • privilege escalation
    • programming
    • project
    • proxy
    • ptrace
    • PTRACE_TRACEME
    • pythonic
    • quote
    • RCE
    • reverse shell
    • reversing
    • rootkit
    • router
    • s2-045
    • scanner
    • scramblesuit
    • SEED lab
    • shadowsocks
    • shadowsocks-plus
    • shellcode
    • skydog
    • smartphone
    • socket
    • sqli
    • sqlmap
    • SS
    • sshd
    • SSL
    • Stanford
    • sudo
    • systemd
    • Thomas Jefferson
    • TMUX
    • tools
    • Tor
    • trasparent proxy
    • vim
    • virtualbox
    • vpn
    • wayland
    • web
    • weechat
    • windows
    • windows domain
    • windows server
    • xfce4
    • xfwm
    • xhost
    • xml
    • xmpp
    • zoomeye

© 2021 jm33-ng - About this site

Creative Commons License Content licensed under a Creative Commons Attribution-NonCommercial 4.0 International License, except where indicated otherwise.

Images hosted on this site are either my own or from Google Image Search