Bug_Bounty_Hunt3r$

a bug bounty hunter living in Sweden.

Bug_Bounty_Hunt3r$

a bug bounty hunter living in Sweden.

最近の記事

what is XOR

XOR, or "exclusive or," is a logical operation that outputs true only when the inputs differ from one another. In other words, if one input is true and the other is false, the XOR operation will return true. However, if both inputs are the

    • what is Polkit?

      Polkit is a component of the Linux authorization system that allows fine-grained control over user permissions and privileges, particularly in conjunction with systemd. It is used to determine if a user has the necessary permissions to perf

      • リバースシェルとは

        リバースシェルとは、攻撃者のマシンから直接リモートシェルへ接続するのではなく、リモートマシンが攻撃者のマシンに対して接続を初めて行うタイプのシェルです。この方法は、特にファイアウォールがシステムへのインバウンド接続を制限している場合に用いられます。 リバースシェルの一般的な動作は以下の通りです: 攻撃者のリスナー設定:攻撃者は自分のマシンにリスナーを設定し、来るべき接続を待ちます。 被害者マシンの接続:被害者のマシン(侵入されたシステム)にコードを実行させて、攻撃者のマ

        • what is Wfuzz?

          Wfuzz is a web application security assessment tool. It's used by penetration testers and ethical hackers for various purposes, including discovering resources (URIs), identifying and exploiting injection vulnerabilities, and brute-forcing

          what is hydr

          Hydra, also known as THC-Hydra, is a very fast network logon cracker that is used to attack different network protocols and services. It's a tool designed for security testers and system administrators to test the strength of passwords with

          what is CeWL

          CeWL(Custom Word List Generator) is a tool developed by Robin Wood (aka "DigiNinja") that is designed for use in penetration testing and ethical hacking. It is a Ruby app that spiders a given URL to a specified depth, optionally following e

          what is firmware?

          Firmware is a specific type of software that provides low-level control for a device's specific hardware. Unlike regular software applications that you might use on a computer or smartphone, firmware is designed to be more integral to the f

          what is setuid

          The setuid (set user ID) is a special permission in Unix-like operating systems that allows a user to execute a program with the privileges of the program's owner instead of their own. In simple terms: When a program has the setuid permiss

          equal

          sort passwords.old passwords.new | uniq -ucat passwords.new | grep w0Yfolrc5bwjS4qw5mq1nnQi6mF03biicat passwords.new | grep kfBf3eYk5BPBRzwjqutbbfE887SVc5Yd diff pass passwords.old passwords.new

          what is openssl s_client

          openssl s_client is a command-line tool provided by OpenSSL, which is an open-source implementation of the ***SSL and ****TLS protocols. This tool is primarily used for debugging and testing purposes, and it allows you to connect to a serv

          what is openssl s_client

          what is grep?

          grep is a powerful command-line utility in Unix and Unix-like operating systems, used for searching plain-text data sets for lines that match a regular expression. Its name comes from the ed command g/re/p (globally search a regular expre

          ./*

          Using ./* with the file command in Linux is a way to apply the command to all files and directories in the current directory. The . represents the current directory, and * is a wildcard that matches all files and directories within it. When

          what is OSI Model?

          The OSI (Open Systems Interconnection) model is a conceptual framework used to understand and describe the process of communication in a network. It's designed to be a universal standard for how different networking systems can communicate.

          What is SIEM

          SIEM stands for Security Information and Event Management system. It is a tool that collects data from various endpoints/network devices across the network, stores them at a centralized place, and performs correlation on them. This room wil

          what is packet?

          A packet in the context of computer networking and internet communication is a small segment of data sent over a network. When data is transmitted over a network, it is broken down into smaller, manageable units known as packets. Here's a m

          what is TCP/IP

          ### Transmission Control Protocol 1. **Functionality**: - **Reliable Delivery**: Ensures the accurate delivery of data from sender to receiver. - **Sequencing and Acknowledgment**: Orders data packets and acknowledges received packets