Suche
Unten sind die Ergebnisse Ihrer Suche gelistet.
Passende Seitennamen:
Volltextergebnisse:
- Obfuscation: polymorphic in-memory decoder @en:it-security:blog
- ecoder ===== I have taken the XOR decoder from [[https://www.doyler.net/security-not-included/shellcode-... n the decoder. I use my ShellCode tool for this [[https://github.com/psycore8/shencode|ShenCode]]: <code... I have integrated the XOR stub as a template in [[https://github.com/psycore8/shencode|ShenCode]] as a te
- Obfuscation: Disguise shellcode as UUIDs @en:it-security:blog
- codes into a string array, which is filled with [[https://de.wikipedia.org/wiki/Universally_Unique_Identi... ===== The encoder is part of my shellcode tool [[https://github.com/psycore8/shencode|ShenCode]], which
- Privilege escalation: Windows admin thanks to Linux @en:it-security:blog
- ribution. I have decided in favour of Lubuntu: [[https://lubuntu.me/downloads/]] After the download you
- Buffer overflow in the 64-bit stack - Part 2 @en:it-security:blog
- is by passing the command to be executed to the [[https://de.wikipedia.org/wiki/C-Standard-Bibliothek|lib... tutorial is fundamentally based on the work of [[https://blog.techorganic.com|superkojiman]] ((https://blog.techorganic.com/2015/04/21/64-bit-linux-stack-smash... can be found in the link collection at the end. ((https://book.hacktricks.xyz/reversing-and-exploiting/li
- Buffer overflow in the 64-bit stack - Part 3 @en:it-security:blog
- is restarted. Superkojiman describes in detail [[https://blog.techorganic.com|in his Blog]] how to circu... t in the GOT. We can now utilise this principle.((https://ir0nstone.gitbook.io/notes/types/stack/aslr/plt... ster/binaries/linux/x86_64/socat]] * pwntools ((https://docs.pwntools.com/en/stable/install.html)) <co... in/part-3|Github]]. <file c bof-part3.c> /* Code https://blog.techorganic.com/2016/03/18/64-bit-linux-st
- Shellcode Injection Part 4 @en:it-security:blog
- e which I was happy to use as a reference. habe.((https://help.x64dbg.com/en/latest/commands/index.html )... Helpful tools ==== * Microsoft Visual Studio((https://visualstudio.microsoft.com/de/downloads/)) * x64dbg((https://x64dbg.com/)) * PEView((http://wjradburn.com/software/)) * ShenCode((https://github.com/psycore8/shencode)) ==== Helpful we
- 64-Bit Stack CheatSheet @en:it-security
- ==== The x64 register is structured as follows ((https://learn.microsoft.com/de-de/windows-hardware/drivers/debugger/x64-architecture)) ((https://www.complang.tuwien.ac.at/ubvl/amd64/amd64h.htm... s. More on this can be found in the Cheat-Sheet((https://cs.brown.edu/courses/cs033/docs/guides/x64_chea
- Linux Commands Cheatsheet @en:linux
- ge system time ===== Set the time under Linux. ((https://wiki.ubuntuusers.de/Systemzeit/)) ==== show ti
- Host Discovery with Metasploit database @en:it-security
- -sP 192.168.2.0/24 [*] Nmap: Starting Nmap 7.93 ( https://nmap.org ) at 2022-12-29 21:57 Mitteleurop�isch
- $whoami @en:user
- avelling, Music, Developing, Boxing * **TV**: [[https://www.themoviedb.org/list/7062465|Serienliste @th... liste|Series hit list]] ===== $social ===== | {{https://bsky.app/static/favicon-32x32.png}} bluesky.com | [[https://bsky.app/profile/psycore8.bsky.social|psycore8]] | | {{https://github.githubassets.com/favicons/favicon.png|}}
- Shellcode Injection Part 2 @en:it-security:blog
- rt 1. You can download the source code from the [[https://github.com/psycore8/nosoc-shellcode|Github repo... 33). For this we use a python script, which is [[https://www.bordergate.co.uk/function-name-hashing/|in ... \\ \\ ==== Jigsaw ==== In part 1 I have Jigsaw ((https://github.com/RedSiege/Jigsaw )) to disguise the s... ==== Obfy ==== Jigsaw in connection with Obfy ((https://github.com/fritzone/obfy )) was an immediate su
- Shellcode Injection Part 1 @en:it-security:blog
- the shellcode. We do this with the tool jigsaw ((https://github.com/RedSiege/Jigsaw)) tool and the Obfy ... e binary file look different with each process. ((https://0xpat.github.io/Malware_development_part_6/))((https://www.fo-sec.com/articles/10-defender-bypass-methods#3)) To do this, we download [[https://github.com/fritzone/obfy|Obfy]] to include the
- The importance of awareness in IT security @en:it-security:blog
- r to be able to react quickly to dangers. ---- [[https://pixabay.com/de/users/geralt-9301/?utm_source=li
- Buffer overflow in the 64-bit stack - part 1 @en:it-security:blog
- low on the 64-bit stack to gain root privileges.((https://www.ired.team/offensive-security/code-injection... n buffer overflows, stack etc. can be found here((https://medium.com/@buff3r/basic-buffer-overflow-on-64-... e debugger GDB with helpful commands to exploit.((https://github.com/longld/peda/blob/master/README)) <code bash> git clone https://github.com/longld/peda.git ~/peda echo "source
- Shellcode Injection Part 3 @en:it-security:blog
- </code> You can find the complete code in the [[https://github.com/psycore8/nosoc-shellcode/tree/main/n... l documented assembler code can be found in the [[https://github.com/stephenbradshaw/shellcode/blob/maste... \\ ===== Repository ===== <code bash> git clone https://github.com/psycore8/nosoc-shellcode </code> ~~