#Evasion on #HIDS #NIDS #PostEXP #PHP_Payload (Linux) #IPFS #NGROK #AntiForensic #SSL_Tunneling #PHP_Hard_Coded (XOR & Octal)

Read Time:33 Second

This demo demonstrates how to get access to Linux operating systems that can be successfully hidden from various techniques using the #Detection and #Threat_Hunter mechanisms, it may seem simple, but interesting to know.

Using multiple encodings such as XOR, Octal and BASE64, or the #IPFS service we had previously broken into, we were able to share our own overview on the Internet, meaning that services such as PasteBin and others can access information. It does not recognize the writer’s entities, and can be transferred to the victim’s operating system as a P2P file, the other being the use of customized encoding on a UIID processor that will run Base64

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

Author

  • @Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence

Previous post Latest Iranian propaganda-Covid-19 US biowarfare
Next post #Mimikatz Blocking Bypass (Obfuscation)
%d bloggers like this: