unix8 Unix Wildcards Gone Wild Back To The Future: Unix Wildcards Gone Wild============================================ - Leon Juranic - Creation Date: 04/20/2013 - Release Date: 06/25/2014 Table Of Content: ===[ 1. Introduction ===[ 2. Unix Wildcards For Dummies ===[ 3. Wildcard Wilderness ===[ 4. Something more useful... 4.1 Chown file reference trick (file owner hijacking) 4.2 Chmod file reference trick 4.3 Tar arbitrary c.. 2014. 8. 28. Monitoring Windows Systems from Linux For many people, the idea of using Linux as a low-cost network management platform can be highly seductive. As the argument goes, even the most rudimentary Linux distributions include the components that are needed to build a modest management console, with Net-SNMP extracting management information from devices on the network, RRDtool storing and graphing the collected data, and one of the many.. 2013. 8. 21. Unix and Linux support in ConfigMgr 2012 SP1 Supported Distributions At the time of writing, Configuration Manager 2012 Service Pack 1 offers client support for the following UNIX and Linux distributions;Red Hat Enterprise LinuxVersion 4, 5, 6 (x86 and x64)SolarisVersion 9 (SPARC)Version 10 (x86 and SPARC)SUSE Linux Enterprise ServerVersion 9 (x86)Version 10 SP1 (x86 and x64)Version 11 (x86 and x64)In the near future the number of distribu.. 2013. 8. 20. POST EXPLOITATION COMMAND LISTS I've had a private list of commands that I run on Windows or Linux when I pop a shell, as I'm sure most pentesters do. It isn't so much a thing of hoarding as much it is just jumbled notes that are 'not worth posting' Well, I made two (now 3) public google docs (anyone can edit) *don't be a dick clause Linux/Unix/BSD Post Exploitation: https://docs.google.com/document/d/1ObQB6hmVvRPCgPTRZM5NMH03.. 2011. 9. 9. List open ports and listening services It's almost impossible to provide a comprehensive list of services to turn off to minimize the security threat, but having a tool for listing active services and open ports is a good start to a more secure network. As mentioned in the article, "10 security tips for all general-purpose OSes", you should turn off any services you don't actually need so that they will not become avenues of attack f.. 2010. 1. 21. 이전 1 2 다음