Tagged articles
7 articles
Page 1 of 1
Java Tech Enthusiast
Java Tech Enthusiast
Nov 9, 2024 · Information Security

How Companies Monitor Employee WeChat Chats and Ways to Protect Your Privacy

Companies can monitor employee WeChat chats on corporate‑issued, rooted computers through network sniffing, OS‑level screen capture, and file‑watching tools, allowing them to view personal messages, infer app usage, and thus personal privacy on work devices is vulnerable, so users should avoid personal WeChat on such devices or use separate accounts and enterprise archiving features.

Mobile Securityemployee monitoringinformation security
0 likes · 5 min read
How Companies Monitor Employee WeChat Chats and Ways to Protect Your Privacy
MaGe Linux Operations
MaGe Linux Operations
May 10, 2019 · Information Security

How to Deploy a One‑Line PHP Backdoor and Escalate Linux Privileges

This guide demonstrates how to create a one‑line PHP backdoor, gain an interactive shell, perform Linux privilege escalation via kernel exploits, compile and use tools like arpsniffer and linsniffer, and employ various post‑exploitation techniques such as modifying system files and establishing persistent root access.

Kernel ExploitLinux privilege escalationnetwork sniffing
0 likes · 11 min read
How to Deploy a One‑Line PHP Backdoor and Escalate Linux Privileges
MaGe Linux Operations
MaGe Linux Operations
Feb 27, 2019 · Information Security

Deploy a One‑Line PHP Backdoor and Escalate Linux Privileges

This guide walks through creating a simple PHP backdoor, using Python pty for interactive shells, compiling and exploiting local binaries, sniffing network traffic with arpsniffer and linsniffer, and applying various Linux privilege‑escalation techniques to obtain root access.

information securitynetwork sniffingprivilege escalation
0 likes · 10 min read
Deploy a One‑Line PHP Backdoor and Escalate Linux Privileges
MaGe Linux Operations
MaGe Linux Operations
Dec 26, 2017 · Information Security

Deploy a One‑Line PHP Backdoor and Escalate Linux Privileges

This guide shows how to plant a PHP backdoor, obtain an interactive shell, enumerate system information, compile and use network sniffers, modify source to capture credentials, and exploit Linux kernel and configuration weaknesses to achieve root access.

Exploitlinuxnetwork sniffing
0 likes · 10 min read
Deploy a One‑Line PHP Backdoor and Escalate Linux Privileges