Suche
Unten sind die Ergebnisse Ihrer Suche gelistet.
Passende Seitennamen:
Volltextergebnisse:
- Shellcode Injection Part 1 @en:it-security:blog
- cesses and some techniques for obfuscating binary files. In the first part, we look at how to inject she... es it as a threat. You can find all the required files in the [[en:it-security:blog:shellcode_injection... should be in C format | | > shell.c | Save to the file shell.c | <code bash> msfvenom -p windows/shell_... tes. We take this from the ''msfvenom'' output. <file cpp local-process-injection.cpp> #include <stdio.
- Buffer overflow in the 64-bit stack - Part 3 @en:it-security:blog
- h>psycore8/nosoc-bof/tree/main/part-3|Github]]. <file c bof-part3.c> /* Code https://blog.techorganic.c... setbuf(stdout, 0); vuln(); return 0; } </file> \\ \\ ===== Debug ===== {{page>en:vorlagen:att... s write a first exploit to ''write()'' to leak. <file python buf3-stage1.py> #!/usr/bin/env python fro... # POP Argumente buf += p64(constants.STDOUT_FILENO) # stdout buf += p64(bin.got[b'write'])
- Buffer overflow in the 64-bit stack - part 1 @en:it-security:blog
- The Shellcode((http://shell-storm.org/shellcode/files/shellcode-77.html)) is stored in an environment ... ==== First we set root rights to the vulnerable file and start it((https://blog.techorganic.com/2015/0... bof-dism-5.png?600|root Shell!}}] \\ \\ ^ Project files | {{ it-security:nosoc-repo-bof64.zip |}}<label
- Buffer overflow in the 64-bit stack - Part 2 @en:it-security:blog
- per and display the gadgets <code bash> ropper --file bof-part2 ... 0x000000000040116a: pop rdi; ret; .... ll need 2 offsets for the exploit. So we load our file into the debugger and start it: <code bash> gdb-... === Now we run our Python exploit and create the file in.txt. <code bash>python2 buffer.py</code> \\ \\ ==== Set authorisations ==== Our file still needs the appropriate root permissions. <c
- Privilege escalation: Windows admin thanks to Linux @en:it-security:blog
- ]] After the download you have to port the image file to a bootable USB stick or DVD. To ensure that th
- The importance of awareness in IT security @en:it-security:blog
- romised. The trigger was a double-click on an ISO file that was sent as an attachment in an email. Windo... k methods === In this particular example, an ISO file was included. This is only symbolic for the time
- Execute repair of Windows 10 @en:windows
- or installed programmes, but only repairs system files. However, this method is quite time-consuming. ... * Switch to the Sources folder * Search for the file setupprep.exe * Execute the file * Follow the instructions and run the setup
- Disable User Account Control (UAC) completely @en:windows
- Alternative ==== Save and execute the following file by double-clicking on it. Confirm the query(s) and restart. <file reg EnableLUA.reg> Windows Registry Editor Versio... ion\Policies\System] "EnableLUA"=dword:00000000 </file> ===== Deactivating via PowerShell ===== <code
- Start Registry Editor @en:windows
- advisable to create a data backup: - Click on "File" - "Export" - Specify a target file ===== Screenshot ===== {{windows:regedit.jpg|}} ===== Furthe
- Wallabag installation under Debian @en:linux
- ewriteEngine On RewriteCond %{REQUEST_FILENAME} !-f RewriteRule ^(.*)$ app.php [... /IfModule> <IfModule mod_headers.c> <FilesMatch "\\.css$"> Header set Cache-Control "max-age=2592000, public" </FilesMatch> <FilesMatch "\\.(gif|ico|jpe?g|png|svg|webp)$"> Header set Cache-Control "ma
- Backing up the sshd @en:linux
- 096 Generating public/private rsa key pair. Enter file in which to save the key (/home/user/.ssh/id_rsa)... <code bash>$ wipe id_rsa Okay to WIPE 1 regular file ? (Yes/No) yes Operation finished. 1 file wiped and 0 special files ignored in 0 directories, 0 symlinks removed but not followed, 0 errors occur
- Postfix Virtual Mailbox Limit @en:linux
- nfiguration. ===== Troubleshooting ===== In the file <code text> /etc/postfix/main.cf </code> file, the following entry must be added: <code text> virtua
- n8n installation with Docker Compose @en:linux
- R_SERVER> </code> ===== 4. create Docker Compose file ===== <code>/somedirectory/docker-compose.yml</c... node/.n8n </code> </hidden> ===== 5. create .env file ===== <code>/somedirectory/n8n/.env</code> <cod
- Kali Linuxc: apt error - File has unexpected size @en:linux
- linux kali apt}} ====== Kali Linuxc: apt error - File has unexpected size ====== ===== problem ===== ... /kali kali-rolling/main amd64 gzip amd64 1.8-1+b1 File has unexpected size (225568 != 115516). Mirror sy
- Update UnrealIRCD @en:linux
- wnload source ===== First we download the source files. The current version is replaced instead of x.x.... op / rename old IRCD ===== To protect the config files, the directory with the obsolete IRCD should be ... ld the default permissions for your configuration files be? (Set this to 0 to disable) It is strongly re... t you use 0600 to prevent unwanted reading of the file [0600] -> If you want, you can manually enter th