codemonkeyism
  • Home
  • About Me
  • Hack the Box
Subscribe
Tagged

Security

A collection of 3 posts

Post Exploitation File Transfers
hacking

Post Exploitation File Transfers

Once the shiny glow of getting that first reverse shell on your target has faded, you will likely need to transfer further files to the machine in order to elevate your privileges. This post details various methods to get your files where they need to go.

  • Dean Williams
Dean Williams Apr 7, 2018 • 3 min read
The Road to OSCP
oscp

The Road to OSCP

I tried harder and achieved the OSCP certification. I have always wanted to *really* know how a pentester weaves their magic over a system, and the PWK course is the way to get that knowledge

  • Dean Williams
Dean Williams Oct 18, 2016 • 6 min read
Securing a new Ubuntu install
Security

Securing a new Ubuntu install

Some first steps to take to secure your new Ubuntu VM

  • Dean Williams
Dean Williams Feb 6, 2015 • 8 min read
codemonkeyism © 2022
Powered by Ghost