SSH tunnelling is the swiss-army knife a hacker (as well as netcat), you can always do some really cool hacky routing things with ssh tunnelling, my favourite is ssh -D.
You might see more on that later
SSH tunnelling is the swiss-army knife a hacker (as well as netcat), you can always do some really cool hacky routing things with ssh tunnelling, my favourite is ssh -D.
You might see more on that later
I was doing ssh -L and -R untill i found this : https://github.com/sysdream/ligolo
But clearly ssh has the advantage of zero setup
it was really helpfull
Just wonderful! Thank you for taking the time to teach and share.
Great writeups man. Carry on
ZSH is very cool. FISH is also awesome.
I love & use ZSH & FISH both. I use both of them. But FISH doesn’t follow shell philosophy. A little bit complicated
I use them according to my needs and speed of my works
I think making own alias is the best life saver. Because it not only makes you faster but also helps you to learn good commands to make your life easy
Greetings, BL4CKH47H4CK3R
Brilliant article! Many thanks for sharing!
Thanks for sharing. It’s so useful…
info looks good and juicy : ) thank you for sharing
I became more clear about some points. Thank you so much
Great write up thanks!
Thanks for the information, very helpful.
THANX
Very Usefull!!
halo ,are you still alive
Don’t ask to ask
Awesome summary thanks !
Another great writeup! Enjoyed reading it and something I will reference in the future when needing tools!
Awesome thank you …
Thanks for the article! I’m just teaching myself cyber sec atm but I’ve been using zsh for years, nice to see it as an industry standard.
One small (minor, pedantic) question…you said you tend to abuse bash for loops when you have a bunch of ips to scan…isn’t that exactly what they’re for? Where’s the abuse?
Not being annoying on purpose just the way you phrased it made he think maybe you know a better way but don’t use it…if not why? Just curious.
You’re the first person I’ve heard of who uses fsh and zsh…usually it’s one or the other. Out of curiosity, could you provide use cases where you’d use one and not the other, and why?