-
Data Forwarding Techniques in Penetration Testing
Wednesday, April 4, 2018
Approach In penetration testing, you almost always need a proxy server, so let’s start by assuming we have a server with a public IP as the attacker machine. …
Cybersecurityforwardingtunnelport mappingpost-exploitationforward proxyreverse proxy
-
Linux Post-Exploitation Notes: PAM Backdoor
Sunday, March 25, 2018
Preface Linux-PAM (Pluggable Authentication Modules) is a pluggable authentication framework. PAM uses configuration files under /etc/pam.d/ to manage how programs perform authentication. …