Suche
Unten sind die Ergebnisse Ihrer Suche gelistet.
Volltextergebnisse:
- n8n Installation mit Docker Compose @linux
- === 1.1 alte Versionen deinstallieren ==== <code bash> sudo apt-get remove docker docker-engine docker.... 1.2.1 Update apt und HTTPS aktivieren === <code bash> sudo apt-get update sudo apt-get install \ ... === 1.2.2 Docker GPG Key hinzufügen === <code bash> sudo mkdir -m 0755 -p /etc/apt/keyrings curl -fs... cker.gpg </code> === 1.2.3 Repo Setup === <code bash> echo \ "deb [arch=$(dpkg --print-architecture)
- n8n installation with Docker Compose @en:linux
- ==== ==== 1.1 Uninstall old versions ==== <code bash> sudo apt-get remove docker docker-engine docker.... == 1.2.1 Update apt and activate HTTPS === <code bash> sudo apt-get update sudo apt-get install \ ... /code> === 1.2.2 Add Docker GPG Key === <code bash> sudo mkdir -m 0755 -p /etc/apt/keyrings curl -fs... cker.gpg </code> === 1.2.3 Repo setup === <code bash> echo \ "deb [arch=$(dpkg --print-architecture)
- n8n installation with Docker Compose @en:linux:n8n
- ==== ==== 1.1 Uninstall old versions ==== <code bash> sudo apt-get remove docker docker-engine docker.... == 1.2.1 Update apt and activate HTTPS === <code bash> sudo apt-get update sudo apt-get install \ ... /code> === 1.2.2 Add Docker GPG Key === <code bash> sudo mkdir -m 0755 -p /etc/apt/keyrings curl -fs... cker.gpg </code> === 1.2.3 Repo setup === <code bash> echo \ "deb [arch=$(dpkg --print-architecture)
- Hilfreiche NMAP Scanner Kommandos @it-security
- ommand Set ===== ==== Discover Hosts ==== <code bash> export IPRANGE='172.16.0.0/16' nmap -e tun0 -sn ... $IPRANGE </code> ==== Parse Results ==== <code bash> grep Up pingscan.gnmap | awk '{print$2}' > 172_1... s.txt </code> ==== Discover Services ==== <code bash> nmap -v -sSV -A -O -iL 172_16_ping_ips.txt </code> ==== Discover more Hosts ==== <code bash> nmap -PE -PS80,443,3389 -PP -PU40125,161 -PA21 -
- SCP und SFTP auf DiskStation (110j) @archiv:linux
- j** ===== Paketmanager installieren ===== <code bash> cat /proc/cpuinfo </code> Ausgabe: <code text>... ehle eingeben (Für Marvell Kirkwood CPUs): <code bash> cd /volume1/public wget http://ipkg.nslu2-linux.... al/sbin:/usr/local/bin export PATH </code> <code bash> reboot </code> ===== Pakete verwalten ===== <code bash>ipkg update</code> <code bash>ipkg install zlib</
- Helpful NMAP scanner commands @en:it-security
- ommand Set ===== ==== Discover Hosts ==== <code bash> export IPRANGE='172.16.0.0/16' nmap -e tun0 -sn ... $IPRANGE </code> ==== Parse Results ==== <code bash> grep Up pingscan.gnmap | awk '{print$2}' > 172_1... s.txt </code> ==== Discover Services ==== <code bash> nmap -v -sSV -A -O -iL 172_16_ping_ips.txt </code> ==== Discover more Hosts ==== <code bash> nmap -PE -PS80,443,3389 -PP -PU40125,161 -PA21 -
- Buffer Overflow im 64-Bit Stack - Teil 3 @it-security:blog
- docs.pwntools.com/en/stable/install.html)) <code bash> python3 -m pip install --upgrade pip python3 -m ... t es eine modifizierte Version auf Github. <code bash> /dir/to/socat TCP-LISTEN:2323,reuseaddr,fork EXE... Wir prüfen, wo der Pfad zur ''libc'' ist: <code bash> ldd bof-part3 linux-vdso.so.1 (0x00007ff... den wir das Offset für ''write()'' heraus: <code bash> readelf -s /lib/x86_64-linux-gnu/libc.so.6 | gre
- Buffer overflow in the 64-bit stack - Part 3 @en:it-security:blog
- docs.pwntools.com/en/stable/install.html)) <code bash> python3 -m pip install --upgrade pip python3 -m ... ion on Github in the Dependencies section. <code bash> /dir/to/socat TCP-LISTEN:2323,reuseaddr,fork EXE... e check where the path to the ''libc'' is: <code bash> ldd bof-part3 linux-vdso.so.1 (0x00007ff... find the offset for ''write()'' function: <code bash> readelf -s /lib/x86_64-linux-gnu/libc.so.6 | gre
- Archive unter Linux @linux
- === Archivformat: [[wpde>tar]] Entpacken: <code bash>tar xfv [ARCHIVNAME].tar</code> Packen: <code bash>tar cfv [ARCHIVNAME].tar [VERZEICHNIS1] [VERZEICHNIS2] [DATEI1] [DATEI2]</code> Auflisten: <code bash>tar tfv [ARCHIVNAME].tar</code> ===== Endung: "g... ===== Archivformat: [[wpde>gzip]] Packen: <code bash>tar cfvz [ARCHIV].tar.gz [VERZEICHNIS1] [DATEI1]<
- Archives under Linux @en:linux
- ===== Archive format: [[wp>tar]] Unpack: <code bash>tar xfv [ARCHIVNAME].tar</code> Packing: <code bash>tar cfv [ARCHIVNAME].tar [VERZEICHNIS1] [VERZEICHNIS2] [DATEI1] [DATEI2]</code> List: <code bash>tar tfv [ARCHIVNAME].tar</code> ===== Ending: "g... " ===== Archive format: [[wp>gzip]] Pack: <code bash>tar cfvz [ARCHIV].tar.gz [VERZEICHNIS1] [DATEI1]<
- Debian Distribution Upgrade - Squeeze to Wheezy @en:linux:debian
- . display the current Debian version ===== <code bash> cat /etc/debian_version 6.0.7 </code> ===== 3. update packages ===== <code bash> apt-get update apt-get upgrade apt-get dist-upg... de> ===== 5. run the minimal update ===== <code bash> apt-get update apt-get upgrade </code> ===== 6... nel update ===== List the current kernel: <code bash> dpkg -l | grep linux-image </code> Sample outp
- Update UnrealIRCD @linux
- .0) ===== GPG Schlüssel importieren ===== <code bash> wget -O- https://raw.githubusercontent.com/unrea... .x ersetzt (z.B. unrealircd-6.1.0.tar.gz). <code bash> wget https://www.unrealircd.org/downloads/unreal... .gz </code> ===== Integrität prüfen ===== <code bash> wget https://www.unrealircd.org/downloads/unreal... acken ===== Nun entpacken wir das Archiv. <code bash> tar xfvz unrealx.x.x.tar.gz </code> ===== Alten
- Update UnrealIRCD @en:linux
- ion 6.1.0) ===== Importing GPG keys ===== <code bash> wget -O- https://raw.githubusercontent.com/unrea... d of x.x.x (e.g. unrealircd-6.1.0.tar.gz). <code bash> wget https://www.unrealircd.org/downloads/unreal... ar.gz </code> ===== Check integrity ===== <code bash> wget https://www.unrealircd.org/downloads/unreal... archive ===== Now we unpack the archive. <code bash> tar xfvz unrealx.x.x.tar.gz </code> ===== Stop
- Buffer Overflow im 64-Bit Stack - Teil 1 @it-security:blog
- ithub.com/longld/peda/blob/master/README)) <code bash> git clone https://github.com/longld/peda.git ~/p... peicherbereiche nicht randomisiert werden. <code bash> echo 0 | sudo tee /proc/sys/kernel/randomize_va_... urn 0; } </code> \\ \\ === Kompilieren === <code bash> gcc -fno-stack-protector -z execstack bof.c -o b... enerieren einen 200 Zeichen langen String: <code bash> gdb -q vulnerable pattern_create 200 in.bin r <
- Buffer overflow in the 64-bit stack - part 1 @en:it-security:blog
- ithub.com/longld/peda/blob/master/README)) <code bash> git clone https://github.com/longld/peda.git ~/p... d so that memory areas are not randomised. <code bash> echo 0 | sudo tee /proc/sys/kernel/randomize_va_... return 0; } </code> \\ \\ === Compile === <code bash> gcc -fno-stack-protector -z execstack bof.c -o b... ugger and generate a 200-character string: <code bash> gdb -q vulnerable pattern_create 200 in.bin r <