digitalcourage.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Diese Instanz wird betrieben von Digitalcourage e.V. für die Allgemeinheit. Damit wir das nachhaltig tun können, erheben wir einen jährlichen Vorausbeitrag von 1€/Monat per SEPA-Lastschrifteinzug.

Server stats:

812
active users

#pentesting

3 posts2 participants0 posts today
maschmi<p>Learning about <a href="https://mastodon.social/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a> had a nice side effect: Keeping logs of what I do and have done is now basically second nature. This also helps in my dayjob and creates documentation basically as I go.</p><p>Did you know you can log your terminal with <a href="https://mastodon.social/tags/tmux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tmux</span></a> <a href="https://github.com/tmux-plugins/tmux-logging" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/tmux-plugins/tmux-l</span><span class="invisible">ogging</span></a>? Or by using `script` and `scriptreplay` <a href="https://www.geeksforgeeks.org/linux-unix/script-command-in-linux-with-examples/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">geeksforgeeks.org/linux-unix/s</span><span class="invisible">cript-command-in-linux-with-examples/</span></a></p><p>When using script, do not wonder about the color-code-chars in the log :)</p><p><a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://mastodon.social/tags/terminal" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>terminal</span></a></p>
Mike Sheward<p>Mini Pen Test Diaries story, happened in the last couple of years. The debrief meeting went like this:</p><p>“In your report you said you we’re able to crack the domain admin account instantly because the password was stored using the LM hash?”</p><p>“That’s right, yes.”</p><p>“But we’ve had LM hashing disabled for like 15 years, that can’t be possible?!”</p><p>“When was the last time that password was changed?”</p><p>“Well it’s been the same since I got here, 20 years ago.”</p><p>“And what hashing mechanism do you think was used back then?”</p><p>“Oh no."</p><p>For more, less mini stories like this, check out <a href="https://infosecdiaries.com" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">infosecdiaries.com</span><span class="invisible"></span></a>.</p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/pentest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentest</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redteam</span></a></p>
nickbearded<p>🌍 BashCore is spreading: 10 downloads this week from every corner of the globe! 🚀 </p><p>*** Both CLI &amp; GUI builds on Debian 13 Trixie have been available in non-stable form, but this week I’m replacing them with fresh stable builds, released just 3 days ago (Aug 9). ***</p><p>Minimalism goes global, now with LTS power! 👊</p><p><a href="https://mastodon.social/tags/BashCore" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BashCore</span></a> <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.social/tags/Trixie" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Trixie</span></a> <a href="https://mastodon.social/tags/MinimalOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MinimalOS</span></a> <a href="https://mastodon.social/tags/Pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pentesting</span></a></p>
nickbearded<p>It all works 😳 the last hurdle with Metasploit is gone.</p><p>BashCoreT build is complete, ISO ready to roll 🤟</p><p>First distro in the world on Debian 13 “Trixie” stable, just two days after release.</p><p><a href="https://mastodon.social/tags/BashCoreT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BashCoreT</span></a> <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.social/tags/Pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pentesting</span></a> <a href="https://mastodon.social/tags/Debian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Debian</span></a> <a href="https://mastodon.social/tags/Trixie" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Trixie</span></a> <a href="https://mastodon.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a></p>
nickbearded<p>If I’ve solved all the issues, everything should now be working as intended.<br>That means tonight or tomorrow I’ll drop the atomic bomb ---&gt; BashCoreT, the first distro in the world built on Debian 13 “Trixie” stable, just two days after its official release. It features Linux Kernel 6.12 💪</p><p>Precision, speed, and a little madness. 💻💥</p><p><a href="https://mastodon.social/tags/BashCoreT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BashCoreT</span></a> <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.social/tags/Pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pentesting</span></a> <a href="https://mastodon.social/tags/Debian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Debian</span></a> <a href="https://mastodon.social/tags/Trixie" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Trixie</span></a></p>
nickbearded<p>Metasploit on BashCoreT: LoadError - cannot load such file: parallel.</p><p>Translation: “Nice build you have there… shame if something happened to it.” 😅</p><p>Time to tear it down and start over...</p><p><a href="https://mastodon.social/tags/BashCoreT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BashCoreT</span></a> <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.social/tags/Pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pentesting</span></a> <a href="https://mastodon.social/tags/Metasploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Metasploit</span></a> <a href="https://mastodon.social/tags/DevLife" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DevLife</span></a></p>
nickbearded<p>Benchmarking hashcat -b on BashCoreT from BashCoreX via SSH, both running inside VirtualBox, just because we can 😎</p><p>Yes, the numbers are irrelevant (VM overhead galore), but the stability test matters 💪</p><p>📸 htop says: “I’m fine.” 👊</p><p><a href="https://mastodon.social/tags/BashCoreT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BashCoreT</span></a> <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.social/tags/Pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pentesting</span></a> <a href="https://mastodon.social/tags/Hashcat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hashcat</span></a> <a href="https://mastodon.social/tags/SSH" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SSH</span></a> <a href="https://mastodon.social/tags/VirtualBox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VirtualBox</span></a> <a href="https://mastodon.social/tags/BecauseWeCan" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BecauseWeCan</span></a></p>
Simon Roses Femerling<p>I loved when I see web shells challenges (Red or Blue) in CTF games. Reminds me of my web shells research I did years ago, paper: <a href="https://vulnex.com/data/VULNEX_VB2017_ShellInTheWeb.pdf" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">vulnex.com/data/VULNEX_VB2017_</span><span class="invisible">ShellInTheWeb.pdf</span></a> <a href="https://infosec.exchange/tags/WebShell" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WebShell</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/APT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APT</span></a> <a href="https://infosec.exchange/tags/AppSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AppSec</span></a></p>
Pen Test Partners<p>You’re security testing AWS infrastructure. You’ve done the work and need to exfiltrate the evidence files. But there's no internet access and no inbound ports... 🤔<br> <br>Here’s how to use AWS Services Systems Manager (SSM) to create a port forwarding session, access what you need, and securely exfiltrate data with a simple Python web server.<br> <br>📌 Read the blog post here: <a href="https://www.pentestpartners.com/security-blog/how-to-transfer-files-in-aws-using-ssm/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">pentestpartners.com/security-b</span><span class="invisible">log/how-to-transfer-files-in-aws-using-ssm/</span></a><br> <br><a href="https://infosec.exchange/tags/AWS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AWS</span></a> <a href="https://infosec.exchange/tags/CloudSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CloudSecurity</span></a> <a href="https://infosec.exchange/tags/PenTesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PenTesting</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/SSM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SSM</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Python</span></a> <a href="https://infosec.exchange/tags/RedTeam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RedTeam</span></a></p>
SPARK42AI Agents in Penetration Testing
Konstantin :C_H:<p>Two criticals. Two known exploited. One a zero-day.<br>July saw a spike in high-severity vulnerabilities.</p><p>Here are CVE Crowd's Top 3 from the 624 CVEs discussed across the Fediverse last month.<br>For each CVE, I've included a standout post from the community.<br>Enjoy exploring! 👇</p><p><a href="https://infosec.exchange/tags/Pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pentesting</span></a> <a href="https://infosec.exchange/tags/AppSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AppSec</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/BugBounty" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BugBounty</span></a> <a href="https://infosec.exchange/tags/Hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hacking</span></a> <a href="https://infosec.exchange/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a> <a href="https://infosec.exchange/tags/CveCrowd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CveCrowd</span></a></p>
Lenin alevski 🕵️💻<p>New Open-Source Tool Spotlight 🚨🚨🚨</p><p>Pivotnacci is a toolkit for network pivoting in pentesting. It automates SOCKS proxies, SSH tunnels, and port forwards, making lateral movement more efficient during red team operations. Great for complex multi-hop environments. <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/PenTesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PenTesting</span></a></p><p>🔗 Project link on <a href="https://infosec.exchange/tags/GitHub" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GitHub</span></a> 👉 <a href="https://github.com/blackarrowsec/pivotnacci" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/blackarrowsec/pivot</span><span class="invisible">nacci</span></a></p><p><a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Software" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Software</span></a> <a href="https://infosec.exchange/tags/Technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Technology</span></a> <a href="https://infosec.exchange/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://infosec.exchange/tags/CTF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CTF</span></a> <a href="https://infosec.exchange/tags/Cybersecuritycareer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecuritycareer</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/purpleteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>purpleteam</span></a> <a href="https://infosec.exchange/tags/tips" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tips</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloudsecurity</span></a></p><p>— ✨<br>🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️</p>
HiSolutions<p>🛡️ Red-Teaming: Mehr als nur ein Penetrationstest!<br>🔍 Sie wollen wissen, wie gut Ihre Sicherheitsmaßnahmen wirklich sind? Dann ist ein echtes Red-Team-Assessment genau das Richtige!</p><p>📄 In unserem neuen Website-Artikel erklären wir die Unterschiede zu einem klassischen Pentest oder Schwachstellenscan, zeigen typische Missverständnisse auf und geben einen praxisnahen Leitfaden zur Auswahl der richtigen Methodik:<br>👉 <a href="https://www.hisolutions.com/detail/redteam" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">hisolutions.com/detail/redteam</span><span class="invisible"></span></a></p><p>💼 Sie wollen direkt loslegen? Unser Beratungsbudget für Red- und Purple-Teaming bietet maximale Flexibilität und volle Kostenkontrolle – ideal für gezielte Tests und Tabletop-Übungen:<br>👉 <a href="https://www.hisolutions.com/detail/redteam-beratungsbudget" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">hisolutions.com/detail/redteam</span><span class="invisible">-beratungsbudget</span></a></p><p>🔗 Gemeinsam analysieren wir Ihre IT-Umgebung, simulieren realistische Angriffe und helfen Ihre Resilienz zu steigern, bevor es echte Angreifende tun.</p><p><a href="https://infosec.exchange/tags/RedTeaming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RedTeaming</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/PurpleTeaming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PurpleTeaming</span></a> <a href="https://infosec.exchange/tags/Pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pentesting</span></a></p>
DIGITAL PRIVACY<p>Is anyone successfully running <a href="https://fosstodon.org/tags/GrapheneOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GrapheneOS</span></a> (latest version/android 16) and <a href="https://fosstodon.org/tags/frida" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>frida</span></a> (v16.7.19)?</p><p>Currently setting up the Pixel 8a for testing purposes.</p><p>No issues with frida (v16.7.19) on Xiaomi Poco X3 (latest lineageos/android15).</p><p>Found this <a href="https://github.com/frida/frida/issues/2743" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/frida/frida/issues/</span><span class="invisible">2743</span></a> . Doesn't seem to be solved though.</p><p><a href="https://fosstodon.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://fosstodon.org/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a></p>
testssl.sh :verified:<p>testssl.sh 3.3dev got a bit snappier, most notably for Macs:</p><p><a href="https://infosec.exchange/tags/TLS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TLS</span></a> <a href="https://infosec.exchange/tags/SSL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SSL</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a></p>
DEF CON<p>All signs point to <a href="https://defcon.social/tags/DEFCONTraining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DEFCONTraining</span></a> Las Vegas 2025…</p><p>Think you have what it takes? If you recognize qrspba, unpxre, or onqtryvsr then follow the trail to Z2VudmF2YXQucXJzcGJhLmJldAo= to learn more. There’s still time to sign up!</p><p><a href="https://defcon.social/tags/defcon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>defcon</span></a> <a href="https://defcon.social/tags/defcon33" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>defcon33</span></a> <a href="https://defcon.social/tags/cybertraining" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybertraining</span></a> <a href="https://defcon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://defcon.social/tags/cyberdefense" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberdefense</span></a> <a href="https://defcon.social/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a> <a href="https://defcon.social/tags/IoT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IoT</span></a> <a href="https://defcon.social/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://defcon.social/tags/training" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>training</span></a></p>
dan_nanni<p>A reverse shell is a stealthy connection that lets an attacker remotely control a target system by having it initiate the connection, often bypassing firewalls to run commands and exploit weaknesses</p><p>Here is how a reverse shell works 😎👇 <a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://mastodon.social/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a></p><p>Find high-res pdf books with all my <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> related infographics at <a href="https://study-notes.org" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">study-notes.org</span><span class="invisible"></span></a></p>
Pen Test Partners<p>Most Android apps don’t expose much through services. But system apps? That’s where things get interesting...</p><p>This blog post by David Lodge explains how Android services work and looks into the security risks of AIDL (Android Interface Definition Language) services.</p><p>They’re often used by OEMs to expose system-level functionality, sometimes without proper permission checks. That makes them a worthwhile attack surface if you’re testing vendor builds or reviewing apps with elevated privileges.</p><p>📌Learn more here: <a href="https://www.pentestpartners.com/security-blog/android-services-101/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">pentestpartners.com/security-b</span><span class="invisible">log/android-services-101/</span></a></p><p><a href="https://infosec.exchange/tags/AndroidSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AndroidSecurity</span></a> <a href="https://infosec.exchange/tags/MobileSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MobileSecurity</span></a> <a href="https://infosec.exchange/tags/AIDL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AIDL</span></a> <a href="https://infosec.exchange/tags/PenTesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PenTesting</span></a> <a href="https://infosec.exchange/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a></p>
mkj<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@aria" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>aria</span></a></span> I haven't looked at it in detail but I'm pretty sure you want to check out <a href="https://www.humblebundle.com/books/pentesting-hacking-toolkit-packt-books" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">humblebundle.com/books/pentest</span><span class="invisible">ing-hacking-toolkit-packt-books</span></a></p><p><a href="https://social.mkj.earth/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://social.mkj.earth/tags/EthicalHacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EthicalHacking</span></a> <a href="https://social.mkj.earth/tags/PenTesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PenTesting</span></a> <a href="https://social.mkj.earth/tags/BlueTeam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlueTeam</span></a></p>
Nightfighter 🛡️<p>Hiding in the Shadows: Covert <a href="https://social.tchncs.de/tags/Tunnels" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tunnels</span></a> via <a href="https://social.tchncs.de/tags/QEMU" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>QEMU</span></a> Virtualization</p><p><a href="https://social.tchncs.de/tags/blueteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blueteam</span></a> <a href="https://social.tchncs.de/tags/redteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redteam</span></a> <a href="https://social.tchncs.de/tags/pentesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pentesting</span></a> <a href="https://social.tchncs.de/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://social.tchncs.de/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> </p><p><a href="https://trustedsec.com/blog/hiding-in-the-shadows-covert-tunnels-via-qemu-virtualization" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">trustedsec.com/blog/hiding-in-</span><span class="invisible">the-shadows-covert-tunnels-via-qemu-virtualization</span></a></p>