Suche
Unten sind die Ergebnisse Ihrer Suche gelistet.
Volltextergebnisse:
- Buffer overflow in the 64-bit stack - Part 3
- ction does not point to the actual function when called, but to ''write@plt''. The GOT entry for the fun... w have to find out at which point ''write()'' is called. <code gdb> 0x4011e8 <vuln+119>: mov edi,
- FatCat Attack PoC
- /frizb/Windows-Privilege-Escalation)) | AlwaysInstallElevated ((https://book.hacktricks.xyz/windows-hard... ning/windows-local-privilege-escalation#alwaysinstallelevated)) | | @#58D3F7:**Actions on Objectives** |
- Obfuscation: Disguise shellcode as UUIDs
- through, return the generated byte array to the caller <code cpp> std::vector<uint8_t> convertToBytes(... ess somewhat, the function ''%%memcpy%%'' is not called directly, but linked to our own function via a p
- Obfuscation: polymorphic in-memory decoder
- hellcode into RSI from the stack </code> In the called part of the programme, we save the pointer from
- Privilege escalation: Windows admin thanks to Linux
- ==== Now it's time to start the tool we just installed. <code bash> sudo chntpw -i SAM </code> \\ \\ =
- Shellcode Injection Part 1
- during compilation ==== Here we can use the so-called template metaprogramming. Here, source code file
- Shellcode Injection Part 4
- ions. To do this, I use a small custom programme called [[https://github.com/psycore8/shencode|ShenCode]