Nick Chua
Penetration Tester and Software Engineer
- Singapore
You May Also Enjoy
File Transfer - Post Exploitation
2 minute read
File transfer is an essential step after we have successfully exploited our target. To transfer files from our target machine to our own system or to upload ...
Penetration Testing Methodology
15 minute read
In this post I am going to share some penetration testing process which I use when conducting a general pentest or tackling Boot2Root machines. Introduction ...
Getting Root via /etc/passwd file
1 minute read
The /etc/passwd file is a file we should check whenever we gain access into a system. A simple misconfiguration with the file permission can enable us to ...
Upgrading your reverse shell
1 minute read
After we have gotten our reverse shell, it will have limitations such as no auto-completions and messy file listings. Here is how we can make our shell be...
Comments