codemonkeyism
  • Home
  • About Me
  • Mastodon
  • Twitter
  • LinkedIn

Security

A collection of 3 posts
Post Exploitation File Transfers
hacking

Post Exploitation File Transfers

Once the shiny glow of getting that first reverse shell on your target has faded, you will likely need to transfer further files to the machine in order to elevate your privileges. This post details various methods to get your files where they need to go.
07 Apr 2018 3 min read
The Road to OSCP
oscp

The Road to OSCP

I tried harder and achieved the OSCP certification. I have always wanted to *really* know how a pentester weaves their magic over a system, and the PWK course is the way to get that knowledge
18 Oct 2016 6 min read
Securing a new Ubuntu install
Security

Securing a new Ubuntu install

Some first steps to take to secure your new Ubuntu VM
06 Feb 2015 8 min read
Page 1 of 1
codemonkeyism © 2025
Powered by Ghost