Suche
Unten sind die Ergebnisse Ihrer Suche gelistet.
Passende Seitennamen:
Volltextergebnisse:
- Formatting Syntax @en:wiki
- s behaviour can be enabled in the [[doku>config]] file. Hint: If DokuWiki is a link, then it's enabled. ... ?php /** * Customization of the english language file * Copy only the strings that needs to be modifie... ats. To mitigate the problem, you can upload your file in different formats for maximum browser compatib... filename as the video and be either a jpg or png file. In the example above a ''video.jpg'' file would
- Shellcode Injection Part 1 @en:it-security:blog
- should be in C format | | > shell.c | Save to the file shell.c | <code bash> msfvenom -p windows/shell_... tes. We take this from the ''msfvenom'' output. <file cpp local-process-injection.cpp> #include <stdio.... ad, size); ((void(*)())code)(); return(0); } </file> \\ \\ ==== Analyse shellcode ==== After compili... s> python3 jigsaw.py shell.raw </code> and get a file with C++ code. <code c++> unsigned char jigsaw[5
- Move swap file under XP @en:archiv:windows:performance
- ====== Move swap file under XP ====== {{template>vorlagen:tutorialdetails|tutname=Auslagerungsdatei ver... b/307886/de}} ===== Introduction ===== The swap file is the area on the hard disk that is used by Wind... "virtual memory". By default, Windows stores this file on the partition where the Windows system files a... free memory on the boot partition by moving this file to another partition. ===== How to proceed ====
- Linux Commands Cheatsheet @en:linux
- ete user | | whoami | Output current user | ==== File and directory management ==== ^ Command ^ Commen... u -h * %%|%% sort -hr > /home/user/filelist.txt | File list sorted by size | | echo bla > 1.txt | Create file 1.txt with content bla | | echo blabla >> 1.txt | Append blabla to file 1.txt | | ls | List directory contents | | ls -la
- Buffer overflow in the 64-bit stack - Part 3 @en:it-security:blog
- h>psycore8/nosoc-bof/tree/main/part-3|Github]]. <file c bof-part3.c> /* Code https://blog.techorganic.c... setbuf(stdout, 0); vuln(); return 0; } </file> \\ \\ ===== Debug ===== {{page>en:vorlagen:att... s write a first exploit to ''write()'' to leak. <file python buf3-stage1.py> #!/usr/bin/env python fro... eaked write address: {}".format(hex(got_leak))) </file> We run the whole thing and get the following ou
- Linux backup with tar @en:linux:backup
- /do not follow links to other partitions * -f : file/it is a file, in this case a file is created The path to the archive can be absolute (/path/... ) or relative (./pa... ode> ===== md5sum ===== Before you download the file from a web server, for example, you should calcul
- Backing up the sshd @en:linux
- Generating public/private ed25519 key pair. Enter file in which to save the key (/home/user/.ssh/id_ed25... important, **because only the combination of key file and password** enable server access. <code bash>... ode bash>$ wipe id_ed25519 Okay to WIPE 1 regular file ? (Yes/No) yes Operation finished. 1 file wiped and 0 special files ignored in 0 directories, 0 symlink
- Shellcode Injection Part 3 @en:it-security:blog
- ow how we can use a shellcode injection to load a file via HTTP and then execute it. \\ \\ ===== Code =... assembly === The code executes a downloaded VBS file. However, we want to start a Python script that c... reate the shellcode as ''%%x86 Windows%%'' binary file. We do this with ''%%nasm%%'': <code bash> nasm ... jdump -D ./shellcode.o |grep '[0-9a-f]:'|grep -v 'file'|cut -f2 -d:|cut -f1-6 -d' '|tr -s ' '|tr '\t' '
- Linux backup with rsync @en:linux:backup
- ===== Info ===== A hard link is a reference to a file. A file can therefore have several names, i.e. it can be addressed under several names. This means that... and the disc space is not further restricted. The file would only be deleted when the last link to the file is deleted. It is therefore also possible to delet
- MySQL Operating system error number 13 @en:linux:mysql
- 50 InnoDB: Operating system error number 13 in a file operation. Feb 23 19:30:50 v21080422 mysqld[22881... Feb 23 19:30:50 v21080422 mysqld[22881]: InnoDB: File name ./ibdata1 Feb 23 19:30:50 v21080422 mysqld[22881]: InnoDB: File operation call: 'open'. Feb 23 19:30:50 v21080422... . ==== Commands for user/group assignment ==== <file bash setuser-mysql.txt> chown -R mysql /var/run/m
- ChaosDLL mIRC Script @en:software:chaosdll
- --------------------- alias cd.vlc { if (($vlc.file) || ($vlc.count)) { say $myhead ..::VLC Status::.. say 4Gespielte Datei: 09 $+ $vlc.file say 4PlayCount: 09 $+ $vlc.count ;say $... äuft das Programm? } alias cd.vlcd { if (($vlc.file) || ($vlc.count)) { say $myhead ..::VLC Status::.. say 4Gespielte Datei: 09 $+ $vlc.file say 4Im Verzeichnis: 09 $+ $vlc.filedir
- Set up iptables @en:linux
- bash> iptables -L </code> ===== Save rules to a file ===== <code bash> apt-get update apt-get install... test.rules ^O ^X </code> The iptables.test.rules file can now be edited. ===== Define rules ===== [[... c/network/if-pre-up.d/iptables ^O ^X </code> The file /etc/network/if-pre-up.d/iptables is executed at ... re < /etc/iptables.up.rules </code> Now make the file executable and that's it: <code bash> chmod +x /
- Buffer overflow in the 64-bit stack - Part 2 @en:it-security:blog
- per and display the gadgets <code bash> ropper --file bof-part2 ... 0x000000000040116a: pop rdi; ret; .... ll need 2 offsets for the exploit. So we load our file into the debugger and start it: <code bash> gdb-... === Now we run our Python exploit and create the file in.txt. <code bash>python2 buffer.py</code> \\ \\ ==== Set authorisations ==== Our file still needs the appropriate root permissions. <c
- Obfuscation: Disguise shellcode as UUIDs @en:it-security:blog
- something like this: <code cpp> [*] try to open file [+] reading 240906.001 successful! [*] try to gen... the victim system. After the copying process, the file is not recognised. We scan it once manually with ... ooks good. ==== Execute ==== We now execute the file and wait for the result. Unfortunately, nothing ... ==== The UUID obfuscation works and protects the file when accessing the hard drive. After execution, m
- Set up iptables @en:linux:firewall
- bash> iptables -L </code> ===== Save rules to a file ===== <code bash> apt-get update apt-get install... test.rules ^O ^X </code> The iptables.test.rules file can now be edited. ===== Define rules ===== [[l... c/network/if-pre-up.d/iptables ^O ^X </code> The file /etc/network/if-pre-up.d/iptables is executed at ... re < /etc/iptables.up.rules </code> Now make the file executable and that's it: <code bash> chmod +x /