Preparation and tools Use VMWare Workstation 15 Pro to run 2 OS: – Kali 19.04 (server machine): IP 192.168.5.136– Ubuntu 12.04.5 (remote machine): IP 192.168.5.142 *Make sure that the two machines can ping each other successfully over the ICMP protocol. Start 2.1. Remote Access with Telnet Protocol — Step 1: On the Kali machine,Continue reading “[Setup] Setup Safety For A Remote Database Management Connection”
Category Archives: Information Security
[Setup] Setup IPSec Connection using OPENSWAN
Preparation and tools Use VMWare Workstation 15 Pro to run 2 OS: – Ubuntu 12.04.5 (local): IP 192.168.5.142 (@localserver)– Ubuntu 12.04.5 Ver2 (máy đầu xa): IP 192.168.5.143 (@remoteclient) *Make sure that the two machines can ping each other successfully over the ICMP protocol. Start — Step 1: Download and Install OPENSWAN on both machines, useContinue reading “[Setup] Setup IPSec Connection using OPENSWAN”
[Attack] Using Reverse TCP to get shell
1. Purpose. What is Reverse shell/Reverse TCP? A reverse shell is a type of shell in which the target machine communicates back to the attacking machine. The attacking machine has a listener port on which it receives the connection, which by using, code or command execution is achieved. Its purpose is to hijack cmd onContinue reading “[Attack] Using Reverse TCP to get shell”