Black & White Path
Black & White Path
Feb 25, 2026 · Information Security

100 Essential Commands for Internal Network Penetration Testing

This guide compiles 100 high‑frequency native commands for Windows and Linux that cover internal network reconnaissance, host discovery, lateral movement, privilege escalation, domain enumeration, file searching, log cleaning and persistence, providing a practical reference for security professionals conducting penetration tests.

Command LineLinuxNetwork Reconnaissance
0 likes · 13 min read
100 Essential Commands for Internal Network Penetration Testing
MaGe Linux Operations
MaGe Linux Operations
Oct 12, 2023 · Information Security

How to Detect and Bypass CDN to Reveal a Website’s Real IP

This guide explains why CDNs hide a site's true IP, how to determine if a website uses a CDN, and outlines practical techniques—including DNS queries, online tools, sub‑domain analysis, email reverse lookup, and scanning scripts—to bypass the CDN and discover the real server address.

CDNIP discoveryInformation Security
0 likes · 8 min read
How to Detect and Bypass CDN to Reveal a Website’s Real IP
Open Source Linux
Open Source Linux
Dec 28, 2022 · Information Security

Discover Real IPs with Fav‑up: A Shodan‑Powered Favicon Recon Tool

Fav‑up is a Python‑based reconnaissance utility that uses Shodan and website favicons to locate the true IP addresses of target services, offering command‑line options, module integration, and output formats for efficient network asset discovery.

CLI toolIP enumerationNetwork Reconnaissance
0 likes · 4 min read
Discover Real IPs with Fav‑up: A Shodan‑Powered Favicon Recon Tool
Liangxu Linux
Liangxu Linux
Oct 6, 2020 · Information Security

How I Uncovered a Phishing Mooncake Email Using Wireshark, Shodan, and OSINT

During the Mid‑Autumn Festival I received a seemingly harmless mooncake email, suspected it was a phishing test, and then used a virtual machine, network‑capture tools, Shodan, and open‑source intelligence to trace the malicious link back to its source and exposed the underlying infrastructure.

Information SecurityNetwork ReconnaissanceOSINT
0 likes · 4 min read
How I Uncovered a Phishing Mooncake Email Using Wireshark, Shodan, and OSINT