Tagged articles
8 articles
Page 1 of 1
Linux Kernel Journey
Linux Kernel Journey
Oct 31, 2024 · Information Security

A New Perspective on eBPF Security: Auditing Complex Attack Techniques

This article demonstrates how to use eBPF to audit fileless command‑execution attacks and reverse‑shell techniques by tracing memfd_create, Kprobe/LSM hooks, dup2 redirections, and related kernel functions, providing concrete code examples and analysis of the detection logic.

KprobeLSMLinux security
0 likes · 18 min read
A New Perspective on eBPF Security: Auditing Complex Attack Techniques
MaGe Linux Operations
MaGe Linux Operations
Aug 19, 2022 · Information Security

Bypassing PHP disable_functions and Building Encrypted Reverse Shells: A Hands‑On Guide

This article walks through practical techniques for bypassing PHP's disable_functions, hiding attacker IPs, creating encrypted bash reverse shells, maintaining persistence with cron and screen, probing outbound ports, setting up internal network proxies, and cleaning forensic traces, all aimed at penetration testing and red‑team operations.

PHPcron persistencedisable_functions
0 likes · 13 min read
Bypassing PHP disable_functions and Building Encrypted Reverse Shells: A Hands‑On Guide
Open Source Linux
Open Source Linux
Apr 14, 2021 · Information Security

Step‑by‑Step Web Penetration Test: From Recon to Root Access

This tutorial walks you through a complete web penetration test on the fictional site hack‑test.com, covering DNS enumeration, server fingerprinting, vulnerability scanning with Nikto and w3af, exploiting SQL injection via sqlmap, uploading a PHP webshell, gaining a reverse shell, and finally escalating to root privileges on a Linux server.

Information GatheringSQL injectionWeb Security
0 likes · 10 min read
Step‑by‑Step Web Penetration Test: From Recon to Root Access
Efficient Ops
Efficient Ops
Aug 17, 2020 · Information Security

How to Analyze and Reproduce an Nginx Backdoor: Step‑by‑Step Guide

This article walks through the discovery, reverse‑engineering, and full reproduction of a malicious Nginx backdoor, detailing its cookie‑based trigger, shell‑reversal mechanism, code analysis, compilation steps, and detection methods for security researchers.

backdoorreverse engineeringreverse shell
0 likes · 9 min read
How to Analyze and Reproduce an Nginx Backdoor: Step‑by‑Step Guide
MaGe Linux Operations
MaGe Linux Operations
Apr 4, 2019 · Information Security

How Tiny Docker Misconfigurations Can Compromise CI Build Environments

This article examines how small configuration errors in Docker‑based CI pipelines, especially when using services like AWS CodeBuild and Docker‑in‑Docker, can expose severe security risks, demonstrates real‑world attack steps, and provides practical mitigation strategies to harden the build process.

CodeBuildContainer MisconfigurationDind
0 likes · 12 min read
How Tiny Docker Misconfigurations Can Compromise CI Build Environments
ITPUB
ITPUB
Aug 30, 2018 · Information Security

Mastering Reverse Shells: 30+ Techniques Across Linux, Windows, and Network Protocols

This article provides a comprehensive collection of reverse‑shell techniques—including Perl, Bash, Python, PowerShell, Java, and protocol‑specific methods like ICMP, UDP, and DNS—complete with command‑line examples, code snippets, and practical tips for both Linux and Windows environments.

Network Protocolspenetration testingreverse shell
0 likes · 15 min read
Mastering Reverse Shells: 30+ Techniques Across Linux, Windows, and Network Protocols
ITPUB
ITPUB
Mar 9, 2016 · Information Security

Create a Persistent Windows Reverse Shell with Python (Registry Run Key)

This article demonstrates how to use Python to copy a malicious executable to the %TEMP% directory, modify the Windows registry Run key for persistence, and establish a Base64‑encoded reverse shell that connects back to a hard‑coded attacker IP, illustrating common Windows malware techniques.

PersistenceRegistryWindows
0 likes · 6 min read
Create a Persistent Windows Reverse Shell with Python (Registry Run Key)