100%
01.06.2024
Rubén Llorente ... : [devuan]
10 donkey:
11 user: root
12 host: donkey.operationalsecurity.es
13 tags: [devuan]
14 zebra:
15 user: root
16 host: zebra.operationalsecurity.es
17 tags: [devuan]
18
19
99%
25.09.2023
Rubén Llorente ... is easy enough (superuser privileges are required):
arp -s 192.168.90.55 00:0c:29:c1:91:b1
The last field of the command is the MAC address, which is the unique identifier of the network device to which
22%
12.09.2013
END LOOP;
10 RETURN clock_timestamp()-now()
11 END;
12 $CODE$ LANGUAGE plpgsql;
Figure 1: The burncpu() process at the top of the Top chart
22%
28.11.2021
can use to test security vulnerabilities, enumerate networks, execute attacks, and evade detection" [1], has been written up in a number of books. Linux Magazine
reported more than 12 years ago [2