Suche
Unten sind die Ergebnisse Ihrer Suche gelistet.
Passende Seitennamen:
- dpkg returned an error code (1), Fehlerbehebung
- Backdoor development with Code Caves
- Obfuscation: polymorpher In-Memory Decoder
- Obfuscation: Shellcode als UUIDs tarnen
- obfuscation_shellcode_als_uuids_tarnen_-_teil_1
- Shellcode Injection Teil 1
- Shellcode Injection Teil 2
- Shellcode Injection Teil 3
- Shellcode Injection Teil 4
- Obfuscation: polymorphic in-memory decoder
- Obfuscation: Disguise shellcode as UUIDs
- obfuscation_shellcode_als_uuids_tarnen_-_teil_1
- Shellcode Injection Part 1
- Shellcode Injection Part 2
- Shellcode Injection Part 3
- Shellcode Injection Part 4
Volltextergebnisse:
- Obfuscation: polymorphic in-memory decoder @en:it-security:blog
- sh}} ====== Obfuscation: polymorphic in-memory decoder ====== {{it-security:blog:2024-250_xor_in-memory_decoder.webp?400|}} Red-teaming and penetration tests o... abilities. [[en:it-security:blog:obfuscation_shellcode_als_uuids_tarnen|In the last part]] we looked at disguising shellcode as a UUID in the source code. This also worked we
- Obfuscation: polymorpher In-Memory Decoder @it-security:blog
- ch}} ====== Obfuscation: polymorpher In-Memory Decoder ====== {{:it-security:blog:2024-250_xor_in-memory_decoder.webp?400|}} Red-Teaming und Penetration Tests e... en zu können. [[it-security:blog:obfuscation_shellcode_als_uuids_tarnen|Im letzten Teil]] haben wir uns mit der Tarnung von Shellcode als UUID im Quellcode befasst. Dies hat auch gut
- Shellcode Injection Teil 4 @it-security:blog
- y Windows Kali pentest blog deutsch}} ====== Shellcode Injection Teil 4 ====== {{:it-security:blog:sc4-... uns nur nebenher mit der Verschleierung von Shellcodes. An diesem Punkt wollte ich einen Custom-Shellcode entwickeln, um mehr über die Funktionsweise zu lern... ''calc.exe'' auf einem Windows Rechner * 64-Bit Code * Vermeiden von Null-Bytes ===== Vorbereitunge
- Shellcode Injection Part 4 @en:it-security:blog
- y Windows Kali pentest blog english}} ====== Shellcode Injection Part 4 ====== {{it-security:blog:sc4-h... |}} In this article, we will only deal with shellcode obfuscation in passing. At this point, I wanted to develop a custom shellcode to learn more about how it works. The following ... of ''calc.exe'' on a Windows computer * 64-bit code * Avoid null bytes ===== Preparations ===== =
- Obfuscation: ByteSwapping @en:it-security:blog
- {{tag>IT-Security Windows Kali shellcode blog english}} ====== Obfuscation: ByteSwapping ====== {{it-s... In the last post, I decrypted an encrypted shellcode in the working memory and had it executed. As enc... m into the encryption to make decrypting the shellcode a little more difficult. \\ \\ ===== Preliminary ... %%''|''%%F9%%''|''%%12%%''|''%%D1%%''| ===== The code ===== ==== Step 1: Python Encoder ==== The corr
- Obfuscation: ByteSwapping @it-security:blog
- {{tag>IT-Security Windows Kali shellcode blog deutsch}} ====== Obfuscation: ByteSwapping ====== {{:it-... zten Beitrag, habe ich einen verschlüsselten Shellcode im Arbeitsspeicher entschlüsselt und ausführen la... hlüsselung bringen, um das Entschlüsseln des Shellcodes etwas zu erschweren. \\ \\ ===== Vorüberlegungen... %%''|''%%F9%%''|''%%12%%''|''%%D1%%''| ===== Der Code ===== ==== Schritt 1: Python Encoder ==== Die e
- Shellcode Injection Teil 1 @it-security:blog
- y windows kali pentest blog deutsch}} ====== Shellcode Injection Teil 1 ====== {{:it-security:shellcode-part1.jpg?400|}} In dieser Beitragsreihe beschäftigen wir uns mit Shellcode, wie man diesen in Prozesse einschleust und einig... . Im ersten Teil schauen wir uns an, wie man Shellcode aus einem lokalen Prozess heraus ausführt. Zusätz
- Shellcode Injection Part 1 @en:it-security:blog
- y windows kali pentest blog english}} ====== Shellcode Injection Part 1 ====== In this series of articles, we look at shellcode, how to inject it into processes and some techniq... In the first part, we look at how to inject shellcode from a local process. ausführt. In addition, we d... required files in the [[en:it-security:blog:shellcode_injection-1#Repository|repository]] \\ \\ ===== G
- Backdoor development with Code Caves @it-security:blog
- {{tag>IT-Security Windows backdoor shellcode blog deutsch english}} ====== Backdoor development with Code Caves ====== {{:it-security:blog:bd-putty-header... }} In this lab, we will inject a Metasploit shellcode into the Putty program, which will be executed at... xe%%'' that is unused in the resources (so-called code caves). ===== 1.0 Introduction ===== The follow
- Shellcode Injection Teil 3 @it-security:blog
- y Windows Kali pentest blog deutsch}} ====== Shellcode Injection Teil 3 ====== {{:it-security:blog:shellcode-part-3.png?400|}} In der Regel werden Shellcode Injections dazu benutzt, eine Reverse Shell zu initiie... h kann es unter manchen Umständen nötig sein, den Code für die Shell erst im zweiten Schritt zu laden.
- Shellcode Injection Part 3 @en:it-security:blog
- y Windows Kali pentest blog english}} ====== Shellcode Injection Part 3 ====== {{it-security:blog:shellcode-part-3.png?400|}} Shellcode injections are generally used to initiate a reverse shell. However, in some circumstances it may be necessary to load the code for the shell in the second step. In this blog p
- Shellcode Injection Part 2 @en:it-security:blog
- y windows kali pentest blog english}} ====== Shellcode Injection Part 2 ====== {{it-security:blog:shellcode-part2.jpg?600|}} In part 1 of the shellcode injection series, we started a reverse shell from a local process. In part 2, we inject the shellcode directly into a process. This form of injection i
- Buffer Overflow im 64-Bit Stack - Teil 1 @it-security:blog
- langen.((https://www.ired.team/offensive-security/code-injection-process-injection/binary-exploitation/6... s://github.com/longld/peda/blob/master/README)) <code bash> git clone https://github.com/longld/peda.gi... peda echo "source ~/peda/peda.py" >> ~/.gdbinit </code> \\ \\ ==== ASLR deaktivieren ==== ASLR muss dea... mit Speicherbereiche nicht randomisiert werden. <code bash> echo 0 | sudo tee /proc/sys/kernel/randomiz
- Shellcode Injection Teil 2 @it-security:blog
- y windows kali pentest blog deutsch}} ====== Shellcode Injection Teil 2 ====== {{:it-security:blog:shellcode-part2.jpg?400|}} In Teil 1 der Shellcode Injection Reihe haben wir eine Reverse Shell aus einem lokale... eraus gestartet. in Teil 2 schleusen wir den Shellcode direkt in einen Prozess ein. Diese Form der Injec
- Buffer overflow in the 64-bit stack - part 1 @en:it-security:blog
- ileges.((https://www.ired.team/offensive-security/code-injection-process-injection/binary-exploitation/6... s://github.com/longld/peda/blob/master/README)) <code bash> git clone https://github.com/longld/peda.gi... peda echo "source ~/peda/peda.py" >> ~/.gdbinit </code> \\ \\ ==== Deactivate ASLR ==== ASLR must be de... ivated so that memory areas are not randomised. <code bash> echo 0 | sudo tee /proc/sys/kernel/randomiz