Blogging Fusion Blog Directory the #1 blog directory and oldest directory online.

Hackers Vanguard

Home Hackers Vanguard

Hackers Vanguard

Rated: 2.69 / 5 | 1,946 listing views Hackers Vanguard Blogging Fusion Blog Directory

United-States/Illinois

 

General Audience

  • Sleventyeleven
  • December 30, 2015 04:44:32 PM
SHARE THIS PAGE ON:

A Little About Us

Information security blog covering Web Application Security, Linux Administration, Cyber Defense Compeitions, and more.

Listing Details

Listing Statistics

Add ReviewMe Button

Review Hackers Vanguard at Blogging Fusion Blog Directory

Add SEO Score Button

My Blogging Fusion Score

Google Adsense™ Share Program

Alexa Web Ranking: N/A

Alexa Ranking - Hackers Vanguard

Example Ad for Hackers Vanguard

This what your Hackers Vanguard Blog Ad will look like to visitors! Of course you will want to use keywords and ad targeting to get the most out of your ad campaign! So purchase an ad space today before there all gone!

https://www.bloggingfusion.com

.

notice: Total Ad Spaces Available: (2) ad spaces remaining of (2)

Advertise Here?

  • Blog specific ad placement
  • Customize the title link
  • Place a detailed description
  • It appears here within the content
  • Approved within 24 hours!
  • 100% Satisfaction
  • Or 3 months absolutely free;
  • No questions asked!

Subscribe to Hackers Vanguard

Establish Persistence with a Custom Kernel Module

First and foremost I have to admit that establishing persistence with a custom kernel module, isn’t the most idea way. Creating kernel modules isn’t that easy. Kernel modules are compiled against a single kernel version, there are significant limitations on what can be done in kernel space, and errors can cause the system to freeze […] The post Establish Persistence with a Custom Kernel Module appeared first on Hackers...


Leverage SSH Agents to Move Across the Network

Accessing a production system in a Linux environment these days often requires a lot of ssh tunneling in order to get access to restricted systems. This is because it doesn’t make sense to publicly expose SSH to the internet or even your general-use, internal network. Instead there might be a bastion or jump box with […] The post Leverage SSH Agents to Move Across the Network appeared first on Hackers...


Abusing screen and .screenrc to Escalate and Maintain Access

When it comes to playing the part of the hacker/red team in competitions like CCDC. I’m always looking for unique ways to gain and maintain access to systems. Lately I’ve toying with the idea of leveraging features in common administration tools instead of exploits or misconfigurations. My favorite of which is abusing screen and .screenrc […] The post Abusing screen and .screenrc to Escalate and Maintain Access appeared first on Hackers...


Recovering Proxmox VMs from Encrypted Raid Array

Initial Thoughts: Blog Reboot It has been a few years since this Blog has been active, or frankly seen the light of day, beyond some web caches I enabled awhile back. The biggest reason for the blog phasing out, was the first server I ever built (back in 2010) having a failing mother board shortly […] The post Recovering Proxmox VMs from Encrypted Raid Array appeared first on Hackers...


Mac OSX Password Cracking

Mac OSX Password Cracking TL;DR: There are several ways to enumerate information from a Mac shell and to collect encrypted credentials for OSX password cracking. Problem and Rationale During a recent assessment the client had close to 10,000 Mac OSX systems throughout their global presence. All of these Macs were authenticating to Active Directory and […] The post Mac OSX Password Cracking appeared first on Hackers...


Decoding Weak CAPTCHA’s

Decoding Weak CAPTCHA’s TLDR; Weak CAPTCHA services utilized on the internet can be programmatically solved with a fairly high success rate. Problem A lot of firms, including mine, have begun to recommended CAPTCHA’s be used on all web forms which feed into existing business processes (registration pages, contact pages, etc). This recommendation can be a […] The post Decoding Weak CAPTCHA’s appeared first on Hackers...


Link to Category: Technology Security Blogs

Or if you prefer use one of our linkware images? Click here

Social Bookmarks


Available Upgrade

If you are the owner of Hackers Vanguard, or someone who enjoys this blog why not upgrade it to a Featured Listing or Permanent Listing?


Blogging Fusion is a trusted resource online for bloggers around the world!