Bug_Bounty_Hunt3r$

a bug bounty hunter living in Sweden.

Bug_Bounty_Hunt3r$

a bug bounty hunter living in Sweden.

記事一覧

what is XOR

XOR, or "exclusive or," is a logical operation that outputs true only when the inputs differ from one another. In other words, if one input is true and the othe…

Bug_Bounty_Hunt3r$
2か月前

what is Polkit?

Polkit is a component of the Linux authorization system that allows fine-grained control over user permissions and privileges, particularly in conjunction with …

Bug_Bounty_Hunt3r$
3か月前

リバースシェルとは

リバースシェルとは、攻撃者のマシンから直接リモートシェルへ接続するのではなく、リモートマシンが攻撃者のマシンに対して接続を初めて行うタイプのシェルです。この方法…

Bug_Bounty_Hunt3r$
5か月前

what is Wfuzz?

Wfuzz is a web application security assessment tool. It's used by penetration testers and ethical hackers for various purposes, including discovering resources …

Bug_Bounty_Hunt3r$
6か月前
1

what is hydr

Hydra, also known as THC-Hydra, is a very fast network logon cracker that is used to attack different network protocols and services. It's a tool designed for s…

Bug_Bounty_Hunt3r$
6か月前

what is CeWL

CeWL(Custom Word List Generator) is a tool developed by Robin Wood (aka "DigiNinja") that is designed for use in penetration testing and ethical hacking. It is …

Bug_Bounty_Hunt3r$
6か月前

what is firmware?

Firmware is a specific type of software that provides low-level control for a device's specific hardware. Unlike regular software applications that you might us…

Bug_Bounty_Hunt3r$
7か月前

what is setuid

The setuid (set user ID) is a special permission in Unix-like operating systems that allows a user to execute a program with the privileges of the program's own…

Bug_Bounty_Hunt3r$
7か月前

equal

sort passwords.old passwords.new | uniq -ucat passwords.new | grep w0Yfolrc5bwjS4qw5mq1nnQi6mF03biicat passwords.new | grep kfBf3eYk5BPBRzwjqutbbfE887SVc5Yd di…

Bug_Bounty_Hunt3r$
7か月前

what is openssl s_client

openssl s_client is a command-line tool provided by OpenSSL, which is an open-source implementation of the ***SSL and ****TLS protocols. This tool is primarily…

Bug_Bounty_Hunt3r$
7か月前

what is grep?

grep is a powerful command-line utility in Unix and Unix-like operating systems, used for searching plain-text data sets for lines that match a regular expres…

Bug_Bounty_Hunt3r$
7か月前

./*

Using ./* with the file command in Linux is a way to apply the command to all files and directories in the current directory. The . represents the current direc…

Bug_Bounty_Hunt3r$
7か月前

what is OSI Model?

The OSI (Open Systems Interconnection) model is a conceptual framework used to understand and describe the process of communication in a network. It's designed …

Bug_Bounty_Hunt3r$
7か月前

What is SIEM

SIEM stands for Security Information and Event Management system. It is a tool that collects data from various endpoints/network devices across the network, sto…

Bug_Bounty_Hunt3r$
7か月前

what is packet?

A packet in the context of computer networking and internet communication is a small segment of data sent over a network. When data is transmitted over a networ…

Bug_Bounty_Hunt3r$
7か月前

what is TCP/IP

### Transmission Control Protocol 1. **Functionality**: - **Reliable Delivery**: Ensures the accurate delivery of data from sender to receiver. - **Sequen…

Bug_Bounty_Hunt3r$
7か月前

what is XOR

XOR, or "exclusive or," is a logical operation that outputs true only when the inputs differ from one another. In other words, if one input is true and the other is false, the XOR operation will retur

もっとみる

what is Polkit?

Polkit is a component of the Linux authorization system that allows fine-grained control over user permissions and privileges, particularly in conjunction with systemd. It is used to determine if a us

もっとみる

リバースシェルとは

リバースシェルとは、攻撃者のマシンから直接リモートシェルへ接続するのではなく、リモートマシンが攻撃者のマシンに対して接続を初めて行うタイプのシェルです。この方法は、特にファイアウォールがシステムへのインバウンド接続を制限している場合に用いられます。

リバースシェルの一般的な動作は以下の通りです:

攻撃者のリスナー設定:攻撃者は自分のマシンにリスナーを設定し、来るべき接続を待ちます。

被害者マ

もっとみる

what is Wfuzz?

Wfuzz is a web application security assessment tool. It's used by penetration testers and ethical hackers for various purposes, including discovering resources (URIs), identifying and exploiting injec

もっとみる

what is hydr

Hydra, also known as THC-Hydra, is a very fast network logon cracker that is used to attack different network protocols and services. It's a tool designed for security testers and system administrator

もっとみる

what is CeWL

CeWL(Custom Word List Generator) is a tool developed by Robin Wood (aka "DigiNinja") that is designed for use in penetration testing and ethical hacking. It is a Ruby app that spiders a given URL to a

もっとみる

what is firmware?

Firmware is a specific type of software that provides low-level control for a device's specific hardware. Unlike regular software applications that you might use on a computer or smartphone, firmware

もっとみる

what is setuid

The setuid (set user ID) is a special permission in Unix-like operating systems that allows a user to execute a program with the privileges of the program's owner instead of their own. In simple terms

もっとみる

equal

sort passwords.old passwords.new | uniq -ucat passwords.new | grep w0Yfolrc5bwjS4qw5mq1nnQi6mF03biicat passwords.new | grep kfBf3eYk5BPBRzwjqutbbfE887SVc5Yd

diff pass passwords.old passwords.new

what is openssl s_client


openssl s_client is a command-line tool provided by OpenSSL, which is an open-source implementation of the ***SSL and ****TLS protocols. This tool is primarily used for debugging and testing purposes

もっとみる

what is grep?



grep is a powerful command-line utility in Unix and Unix-like operating systems, used for searching plain-text data sets for lines that match a regular expression. Its name comes from the ed command

もっとみる

./*

Using ./* with the file command in Linux is a way to apply the command to all files and directories in the current directory. The . represents the current directory, and * is a wildcard that matches a

もっとみる

what is OSI Model?

The OSI (Open Systems Interconnection) model is a conceptual framework used to understand and describe the process of communication in a network. It's designed to be a universal standard for how diffe

もっとみる

What is SIEM

SIEM stands for Security Information and Event Management system. It is a tool that collects data from various endpoints/network devices across the network, stores them at a centralized place, and per

もっとみる

what is packet?

A packet in the context of computer networking and internet communication is a small segment of data sent over a network. When data is transmitted over a network, it is broken down into smaller, manag

もっとみる

what is TCP/IP

### Transmission Control Protocol
1. **Functionality**:
- **Reliable Delivery**: Ensures the accurate delivery of data from sender to receiver.
- **Sequencing and Acknowledgment**: Orders data p

もっとみる