VK9 Security

  • Home
  • Red Team
    • Anonymity
      • Anonymity
    • Information Gathering
      • Active Gathering
      • Passive Gathering
    • Exploitation
      • Android Exploitation
      • Linux Exploitation
      • Windows Exploitation
      • Network
      • Application
        • Web Exploitation
    • Post-Exploitation
      • Linux Post-Exploitation
      • WIndows Post-Exploitation
      • Cleaning Tracks
    • Red Team Operations
    • Reporting
    • Tools
  • Blue-Team
    • Incident Response
    • OS
      • Linux OS
        • Linux Management
        • Linux Commands
        • Linux Misc
      • Windows OS
        • Windows Commands
        • Windows Misc
        • Windows Management
    • Device Configuration
  • Labs
    • Labs

Linux Commands

Linux Commands

Transfer files using Netcat

This time we will transfer a file using netcat, we will see examples from machine vk9-sec to lab-kali Bind connection 1. CLIENT: First, we will create a random file echo “Vry4n has been here.” > sample.txt cat sample.txt 2. SERVER: we will open a port in the remote machine waiting Read more…

By Vry4n_, 6 days6 days ago
Linux Commands

Using xxd Linux command

xxd creates a hex dump of a given file or standard input. It can also convert a hex dump back to its original binary form. Usage Displaying available options xxd –help man xxd 1. Converting a file to hex cat vk9-file.txt file vk9-file.txt 2. run xxd xxd vk9-file.txt 3. Skipping Read more…

By Vry4n_, 11 months11 months ago
Linux Commands

Using Find Linux command

find searches the directory tree rooted at each given starting-point by evaluating the given expression from left to right. In this article we will explore the most useful commands. Useful commands 1. Basic search of a file named vk9-security.txt, starting at / position find / -name vk9-security.txt 2. The same Read more…

By Vry4n_, 11 months11 months ago
  • Blog
  • Blue-Team
  • Labs
  • Main
  • Red Team
VK9 Security | By Vry4n