The aim of this article is to showcase a PHP backdoor that is small enough to pass unnoticed while still allowing the execution of complex operations. Maintaining access to a compromised system is one important step during penetration testing. In most cases this is achieved using backdoors. These can either live as standalone pieces of software or as part of legitimate code. And always, no matter how the backdoor is designed, being hard to discover is an important aspect.
I am Levi Posts
The Raspberry Pi can be a cheap, low power, always on seedbox. Compared to more pricey alternatives, like a NAS with torrenting support, the Pi plays the seedbox job pretty well.
Hidden SSID wireless networks, a security myth that makes you feel safer. Too bad it is just something that provides no extra security at all. My aim is to show you how easy it is to discover the SSID of an access point even if it is hidden.
The Raspberry Pi 3 Model B, compared to older models, comes with a built in WiFi support. However, connecting it to a PEAP-MSCHAP v2 wireless network does not seem to be a straightforward task. While the dhcpdui that ships with Raspbian is able to connect to WPA-PSK networks it is unable to do so for PEAP-MSCHAP v2. This tutorial focuses on configuring your Raspberry Pi in a way that enables PEAP-MSCHAP wireless network connections.
Step by step guide on how to send the IP address of your Raspberry Pi to your Gmail account when the board starts. This way it is easier to find and access over a local area network from other devices.
If you are reading this tutorial over a wireless connection, or at least you have a wireless network in your house, take a breath and ask yourself, how safe do you feel? Did you use a strong password when you set up your wireless network? Does the password you use…
During the IT Camp 2013 “MVC – Common pitfalls and how to resolve them”, Andrei Ignat, the speaker gave us some homework. His question was something like this: “How can you auto-correct misspelled actions inside the controller and redirect the user to the right action”. For example if the user…