<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Mon, 06 Apr 2026 21:43:05 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/@tychebe/rss" rel="self" type="application/rss+xml"/><item><title><![CDATA[1]]></title><description><![CDATA[1]]></description><link>http://direct.ecency.com/security/@tychebe/difference-among-ruid-euid-suid</link><guid isPermaLink="true">http://direct.ecency.com/security/@tychebe/difference-among-ruid-euid-suid</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[tychebe]]></dc:creator><pubDate>Thu, 27 Oct 2016 14:39:51 GMT</pubDate></item><item><title><![CDATA[wefa]]></title><description><![CDATA[fae213]]></description><link>http://direct.ecency.com/security/@tychebe/nebula-level03-solution</link><guid isPermaLink="true">http://direct.ecency.com/security/@tychebe/nebula-level03-solution</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[tychebe]]></dc:creator><pubDate>Sat, 22 Oct 2016 17:05:18 GMT</pubDate></item><item><title><![CDATA[a]]></title><description><![CDATA[z]]></description><link>http://direct.ecency.com/security/@tychebe/the-program-where-setuid-setgid-is-available</link><guid isPermaLink="true">http://direct.ecency.com/security/@tychebe/the-program-where-setuid-setgid-is-available</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[tychebe]]></dc:creator><pubDate>Sun, 16 Oct 2016 14:06:51 GMT</pubDate></item><item><title><![CDATA[12421412542sergsrehtserg]]></title><description><![CDATA[21312gaesrg]]></description><link>http://direct.ecency.com/security/@tychebe/the-relation-between-setuid-and-setresuid-when-a-shell-is-executed</link><guid isPermaLink="true">http://direct.ecency.com/security/@tychebe/the-relation-between-setuid-and-setresuid-when-a-shell-is-executed</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[tychebe]]></dc:creator><pubDate>Sun, 16 Oct 2016 07:35:36 GMT</pubDate></item><item><title><![CDATA[2354u654245u6543]]></title><description><![CDATA[121]]></description><link>http://direct.ecency.com/security/@tychebe/nebula-level03-hint</link><guid isPermaLink="true">http://direct.ecency.com/security/@tychebe/nebula-level03-hint</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[tychebe]]></dc:creator><pubDate>Sat, 15 Oct 2016 12:43:30 GMT</pubDate></item><item><title><![CDATA[setresuid() function]]></title><description><![CDATA[□ SET Real uid, Effective uid, Saved set-User-ID □ Function that modifies a process's "real UID", "effective UID" and "saved set-user-ID" □ Unprivileged process configures]]></description><link>http://direct.ecency.com/security/@tychebe/setresuid-function</link><guid isPermaLink="true">http://direct.ecency.com/security/@tychebe/setresuid-function</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[tychebe]]></dc:creator><pubDate>Sun, 25 Sep 2016 07:54:18 GMT</pubDate></item><item><title><![CDATA[errno variable]]></title><description><![CDATA[□ Global variable that stores the cause of a error when a function is executed □ Return value can only check whether an error occurred □ If there is no error, 0 is stored. If there is a error, error code]]></description><link>http://direct.ecency.com/security/@tychebe/errno-variable</link><guid isPermaLink="true">http://direct.ecency.com/security/@tychebe/errno-variable</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[tychebe]]></dc:creator><pubDate>Sun, 25 Sep 2016 05:14:36 GMT</pubDate></item><item><title><![CDATA[Nebula level02 solution]]></title><description><![CDATA[□ Aim : Execute getflag command with flag02 account and check the message  "You have successfully executed getflag on a target account" □ Vulnerability : Refer the previous post(Nebula level02 hint)]]></description><link>http://direct.ecency.com/security/@tychebe/nebula-level02-solution</link><guid isPermaLink="true">http://direct.ecency.com/security/@tychebe/nebula-level02-solution</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[tychebe]]></dc:creator><pubDate>Sat, 24 Sep 2016 11:14:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/3RTd4iuWD6NT2z8SZyeYbUVph4e3kyfrHsTA5cyx26ZgnrL7poR5ZBoQKHJeFkHwKHtY2TVmnyR7XD5FiUH1yGwQBT6GBXWaUsD5Hx5Y82g931g5ap3PJxFCn8QAHnf3v3yZvDZcRHo74Puc3h98CzKeMJuFBNionaoThinXYTohev?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[asprintf function]]></title><description><![CDATA[□ allocated string printf □ It is function of GNU extensions(No C or POSIX) □ int asprintf(char **strp, const char *fmt, ...) □ It prints the contents of fmt to the strp. As much as the fmt+null's size,]]></description><link>http://direct.ecency.com/security/@tychebe/asprintf-function</link><guid isPermaLink="true">http://direct.ecency.com/security/@tychebe/asprintf-function</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[tychebe]]></dc:creator><pubDate>Sat, 24 Sep 2016 07:59:36 GMT</pubDate></item><item><title><![CDATA[Nebula Level02 hint]]></title><description><![CDATA[[Hint#1] Sticky bit is configured in the flag02 file. [Hint#2] If you execute the flag02 file, You can see the upper result that includes value of USER environment variable. [Hint#3] The flag02 file finally]]></description><link>http://direct.ecency.com/security/@tychebe/nebula-level02-hint</link><guid isPermaLink="true">http://direct.ecency.com/security/@tychebe/nebula-level02-hint</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[tychebe]]></dc:creator><pubDate>Thu, 22 Sep 2016 15:20:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/3RTd4iuWD6NT2z8SZyeYbUVph4e3kyfrHsTA5c8QryNYFCWR6HWiehLKd9A6Y35j8ii93Ctqzx44eU5nGUKj9wjboTZfvB8zTbHZBqpCoUEJ89VAMq6pvZ1ayPs5KVbkM16qBE84Y6fA2zaYBMUEWRogGeuDJ1JoEx1iGYtmM9L66S?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Difference between su and su -]]></title><description><![CDATA[□ "su" constitutes authority and minimum environment variables, such as the root account □ "su -" constitutes almost same environment as login shell of the root account □ "su"]]></description><link>http://direct.ecency.com/security/@tychebe/difference-between-su-and-su</link><guid isPermaLink="true">http://direct.ecency.com/security/@tychebe/difference-between-su-and-su</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[tychebe]]></dc:creator><pubDate>Wed, 21 Sep 2016 14:08:00 GMT</pubDate></item><item><title><![CDATA[difference between sudo and su]]></title><description><![CDATA[□ su(substitute user) ○ This linux command allows a user to log in as another user Without log out ○ "su" without parameter is same as "su root"(=Login as root) ○ Account password to]]></description><link>http://direct.ecency.com/security/@tychebe/difference-between-sudo-and-su</link><guid isPermaLink="true">http://direct.ecency.com/security/@tychebe/difference-between-sudo-and-su</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[tychebe]]></dc:creator><pubDate>Wed, 21 Sep 2016 08:41:48 GMT</pubDate></item><item><title><![CDATA[Method of changing group password policy(group ↔ gshadow)]]></title><description><![CDATA[□ If the group password policy is changed to gshadow, each group's password of group file is changed to x □ grpconv : It is linux command to change password policy(group → gshadow)(The /etc/gshadow file]]></description><link>http://direct.ecency.com/security/@tychebe/method-of-changing-group-password-policy-group-gshadow</link><guid isPermaLink="true">http://direct.ecency.com/security/@tychebe/method-of-changing-group-password-policy-group-gshadow</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[tychebe]]></dc:creator><pubDate>Mon, 19 Sep 2016 11:33:42 GMT</pubDate><enclosure url="https://images.ecency.com/p/2dk2RRM2dZ8fDZitvAu5ZBMx3tVDfwCAx4e7XSvFrRotKZc5nKsL8p3Mdxt3J73QBhBhkhwDLQFF8MzRaY9rXDEu1bz8nW38wMGzazXpvWcV31bxJge2UW7mHzUTQQB49UM73mSZHpJxkjQngmEG7tQtxpXXQ8AGhUmMmGjoJN?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Method of changing password policy(passwd ↔ shadow)]]></title><description><![CDATA[□ When linux is installed, like the picture above, there is a case that the password is stored in the passwd file □ If the password policy is changed to shadow, each account's password of password file]]></description><link>http://direct.ecency.com/security/@tychebe/method-of-changing-password-policy-passwd-shadow</link><guid isPermaLink="true">http://direct.ecency.com/security/@tychebe/method-of-changing-password-policy-passwd-shadow</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[tychebe]]></dc:creator><pubDate>Sun, 18 Sep 2016 13:21:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/AmRc67RgYaWLqnJNj9ERaxVWLLY4A674kLg8ogWJJw28KsyfHEQW4vGAQ5yoqmjvYTUbCFug6i6gMFvQsP5wuNnypBMostpSZkyugXDhAtCtELT2qz1WGUYsa7N2mFymEUZ9pKYxC1YMiNfT9FPnioo5jL9ZgcjY?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Cyber operation#1 (To construct a sniffer system)]]></title><description><![CDATA[□ General situation ○ You are a information security team leader of a corporation ○ Following orders of CISO, you establish plans, organize TFs and build up systems ○ The security team has 4 information]]></description><link>http://direct.ecency.com/security/@tychebe/cyber-operation-1-to-construct-a-sniffer-system</link><guid isPermaLink="true">http://direct.ecency.com/security/@tychebe/cyber-operation-1-to-construct-a-sniffer-system</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[tychebe]]></dc:creator><pubDate>Mon, 12 Sep 2016 15:07:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/2H74Fic92U9ishAEu9zzqcqx2bUdX9MR9UXRHogd5G1WLsSoeSB3cMTaahv2VE1rL9gTx6pZFFkagpp4kpxdNeokKAVGz5zG3wCZLHsZYGpQik3LQxS8Ts96viyq4RsGKRT9kdNWQK84Niut1SYhdeUQSRX5tUZDa2nQQrbCAE6Am7GZCjzWhwh13i84MpmW8cv5SWUATjRoyipVAmjrbZXh4ii6m1DjSHtGQceCFvhp1i3Fgknb2ko7qyfC?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Method of killing all processes of the current shell]]></title><description><![CDATA[□ ps | awk '{print $1}' | xargs kill -9   ○ ps : It prints the running processes   ○ | awk '{print $1}' : It prints the first column of the result of ps(=pid)   ○ | xargs]]></description><link>http://direct.ecency.com/security/@tychebe/method-of-killing-all-processes-of-the-current-shell</link><guid isPermaLink="true">http://direct.ecency.com/security/@tychebe/method-of-killing-all-processes-of-the-current-shell</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[tychebe]]></dc:creator><pubDate>Thu, 01 Sep 2016 16:03:39 GMT</pubDate></item><item><title><![CDATA[Control panel(.msc) run command list]]></title><description><![CDATA[□ gpedit.msc : To execute group policy □ printmanagement.msc : To execute print management □ rsop.msc : To execute result set of policy □ secpol.msc : To execute local security policy □ fsmgmt.msc : To]]></description><link>http://direct.ecency.com/security/@tychebe/control-panel-msc-run-command-list</link><guid isPermaLink="true">http://direct.ecency.com/security/@tychebe/control-panel-msc-run-command-list</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[tychebe]]></dc:creator><pubDate>Wed, 31 Aug 2016 15:02:39 GMT</pubDate></item><item><title><![CDATA[Control panel run command list]]></title><description><![CDATA[□ control : To execute Control panel(=C:\Windows\System32\control.exe) □ appwiz.cpl :  To execute programs and features □ control admintools : To execute administrative tools □ control folders : To]]></description><link>http://direct.ecency.com/security/@tychebe/control-panel-run-command-list</link><guid isPermaLink="true">http://direct.ecency.com/security/@tychebe/control-panel-run-command-list</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[tychebe]]></dc:creator><pubDate>Tue, 30 Aug 2016 16:16:12 GMT</pubDate></item><item><title><![CDATA[Windows run command list]]></title><description><![CDATA[calc : To execute calculation charmap : To execute Character map cleanmgr : To execute disk cleanup manager cmd : To execute command prompt control : To execute control panel dxdiag : To execute directX]]></description><link>http://direct.ecency.com/security/@tychebe/windows-run-command-list</link><guid isPermaLink="true">http://direct.ecency.com/security/@tychebe/windows-run-command-list</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[tychebe]]></dc:creator><pubDate>Sun, 28 Aug 2016 03:48:03 GMT</pubDate></item><item><title><![CDATA[Windows Explorer shortcuts list]]></title><description><![CDATA[ □ Alt + ← : To go back □ Alt + → : To go forward □ Alt + ↑ : To go to the parent directory □ Alt + Enter : To check selected file(or directory)'s properties □ Alt + D : To select address bar □ Alt]]></description><link>http://direct.ecency.com/security/@tychebe/windows-explorer-shortcuts-list</link><guid isPermaLink="true">http://direct.ecency.com/security/@tychebe/windows-explorer-shortcuts-list</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[tychebe]]></dc:creator><pubDate>Sat, 27 Aug 2016 12:37:27 GMT</pubDate></item></channel></rss>