Tagged articles
2 articles
Page 1 of 1
MaGe Linux Operations
MaGe Linux Operations
Aug 19, 2022 · Information Security

Bypassing PHP disable_functions and Building Encrypted Reverse Shells: A Hands‑On Guide

This article walks through practical techniques for bypassing PHP's disable_functions, hiding attacker IPs, creating encrypted bash reverse shells, maintaining persistence with cron and screen, probing outbound ports, setting up internal network proxies, and cleaning forensic traces, all aimed at penetration testing and red‑team operations.

PHPcron persistencedisable_functions
0 likes · 13 min read
Bypassing PHP disable_functions and Building Encrypted Reverse Shells: A Hands‑On Guide
ITPUB
ITPUB
Jun 17, 2019 · Information Security

How a Hidden gpg‑agentd Malware Hijacked a CentOS Server and Spread via Redis

A detailed forensic walk‑through shows how a compromised CentOS 6 server was infected by a disguised gpg‑agentd binary, how the attacker used cron jobs to pull malicious scripts, leveraged Redis write‑file vulnerabilities and masscan to scan the Internet, and provides concrete hardening recommendations.

Linux securitycron persistencegpg-agentd
0 likes · 12 min read
How a Hidden gpg‑agentd Malware Hijacked a CentOS Server and Spread via Redis