jm33_ng
  • Course notes
  • Misc
  • Pentest
  • Programming
  • Tools
  • Vulnerabilities

jm33_ng


cyber security / noob developer / poor English

emp3r0r - Break Out Of Internal Network

Date Wed 06 January 2021 Tags pentest / post-exploitation / emp3r0r / linux / proxy

proxy-banner

intro

from what i have heard of, pentesters/hackers manually set up their port mapping in their target networks, some people would even use iptables

please allow me to save you from those shitty works with emp3r0r

when an agent lands on a host, it checks if there were internet …

View comments.

more ...

Delete An Entry From wtmp/btmp/utmp Log Files

Date Fri 05 June 2020 Tags pentest / post-exploitation / log cleaner / linux

last

Stop Deleting Everything!

many folks like to rm -f /var/log/*tmp, which I have to say is not a right way to cover your trail, if the admin would ever think of checking login logs, an empty log will certainly catch his attention

but *tmp files are all binary …

View comments.

more ...

  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • »

About jm33

Who

  • Cyber Security Researcher

Contact

  • 0x3A5DBF07

  • Mastodon

  • Leave a message

  • Social

    • Twitter
    • GitHub
    • LinkedIn
    • StackOverflow
  • Recent Posts

    • Use Python for Linux Post-Exploitation
    • emp3r0r - Injection
    • emp3r0r - SSH
    • emp3r0r - 0x00
    • emp3r0r - Break Out Of Internal Network
  • Tags

    • 2024
    • 404
    • 443
    • active directory
    • ad
    • announcement
    • antivirus
    • anyconnect
    • apache
    • arch
    • assembly
    • asu
    • backdoor
    • baidu
    • blackhat
    • bridge
    • buffer overflow
    • C#
    • career
    • censorship
    • cgo
    • cisco
    • code maintainance
    • compton
    • conhost
    • conpty
    • Coursera
    • credential harvesting
    • crypto
    • cryptography
    • CVE
    • CVE-2018-18955
    • CVE-2018-7750
    • diary
    • DNS污染
    • DPI
    • elf
    • email
    • emp3r0r
    • exploit
    • file transfer
    • gdb
    • gfw
    • ghidra
    • github
    • Glowing Bear
    • golang
    • gpu
    • great wall
    • greatwall
    • hacking
    • hacking tool
    • HiWiFi
    • HTTP2
    • https
    • injection
    • IRC
    • 极路由
    • KCP
    • kcptun
    • kernel
    • killer
    • lede
    • libvirt
    • life
    • linux
    • linux kernel
    • lkm
    • loader
    • log cleaner
    • LPE
    • macos
    • mass exploit
    • mec
    • memory layout
    • mentohust
    • Misc
    • mouse
    • multi-threaded crawler
    • namespace
    • natural scroll
    • netcat
    • network
    • nic
    • obfs4
    • obfsproxy
    • ocserv
    • openwrt
    • paramiko
    • pentest
    • pep8
    • PGP
    • pi
    • port-forwarding
    • post-exploitation
    • privilege escalation
    • programming
    • project
    • proxy
    • ptrace
    • PTRACE_TRACEME
    • python
    • pythonic
    • qemu
    • QQ
    • quote
    • RCE
    • redteam
    • reverse shell
    • reversing
    • rootkit
    • s2-045
    • scanner
    • scramblesuit
    • secure boot
    • SEED lab
    • sfu
    • shadowsocks
    • shadowsocks-plus
    • shell
    • shellcode
    • socket
    • SS
    • ssh
    • ssh-harvester
    • sshd
    • SSL
    • Stanford
    • sudo
    • switch
    • systemd
    • terminal
    • Thomas Jefferson
    • TMUX
    • tools
    • trasparent proxy
    • vim
    • virtualbox
    • virtualization
    • vpn
    • wayland
    • web
    • weechat
    • windows
    • windows domain
    • windows server
    • xfce4
    • xfwm
    • xhost
    • xml
    • zoomeye

© 2022 jm33-ng - About this site

Creative Commons License Content licensed under a Creative Commons Attribution-NonCommercial 4.0 International License, except where indicated otherwise.

Images hosted on this site are either my own or from the Internet