Hello,
i hope this is an ok place to post this....Im expanding my skills and am in sort of new territory concerning malicious use of ssh root access.
Can you guys point me direction of writeups, tutorials etc about using said access in interesting ways? i realize thats sorta vague , i mean i know its basically as if your sitting in root user desk at his terminal but im a stranger at corporate structure of thier linux/unix servers but im stuck beyond listing directories and shit
also a tad buzzed so imma stop typing now and hope someone reads it and knows just the documents i need to read!! lol
if not, i still appreciate your time reading my post
i hope this is an ok place to post this....Im expanding my skills and am in sort of new territory concerning malicious use of ssh root access.
Can you guys point me direction of writeups, tutorials etc about using said access in interesting ways? i realize thats sorta vague , i mean i know its basically as if your sitting in root user desk at his terminal but im a stranger at corporate structure of thier linux/unix servers but im stuck beyond listing directories and shit
also a tad buzzed so imma stop typing now and hope someone reads it and knows just the documents i need to read!! lol
if not, i still appreciate your time reading my post