Command Injection A command injection occurs when a user input is not sanitised. A basic example can be a ping command. If a user can enter the IP of the machine and the IP is not sanitised, we co...
Notes | Linux Privilege Escalation
Linux PE (Privilege Escalation) Exploiting a bug, a design defect, or a configuration oversight in an operating system or software program to acquire elevated access to resources that are typicall...
Notes | Password Cracking
Password Cracking We are now in an era where password that you will find will not be in clear text and ready to use (most of the time). They will be “hashed”. You may have heard terms like “hash”,...
Notes | Brute Force
Brute Force According to Wikipedia, “Brute Force attack consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly”. It may not be effective in...
Notes | Linux Fondamentals
Linux Fondamentals First of all, why learn Linux? Well, when it comes to computing, Linux is a very useful operating system. It has many useful tools and offers high performance on different netwo...