Suche
Unten sind die Ergebnisse Ihrer Suche gelistet.
Volltextergebnisse:
- Group Managed Service Accounts
- the DC: <code powershell> New-ADServiceAccount -Name <ACCOUNTNAME> -DNSHostName <ACCOUNTNAME>.<DOMAIN>.<TLD> -PrincipalsAllowedToRetrieveManagedPassword <COMPUTERNAME>$ </code> ====
- Shellcode Injection Part 4 @en:it-security:blog
- , rax ; Adress_Table mov [rbp - 18h], rax ; Name_Ptr_Table mov [rbp - 20h], rax ; Ordinal_Table... ddress_Table RVA_Export_Table + 0x20 Bytes -> RVA_Name_Pointer_Table RVA_Export_Table + 0x24 Bytes -> RV... dress_Table -> Var mov ecx, [rax + 0x20] ; RVA_Name_Ptr_Table add rcx, rbx ; Name_Ptr_Table = kernel32.base + RVA_Name_Ptr_Table mov [rbp - 18h
- Host Discovery with Metasploit database
- de ruby> msf6 > db_connect user:pass@127.0.0.1/db_name </code> ==== Check connection ==== <code ruby> msf6 > db_status [*] Connected to db_name. Connection type: postgresql. Connection name: local_db_service. </code> ===== Metasploit: Create work... s Hosts ===== address mac name os_name os_flavor os_sp pur
- Helpful NMAP scanner commands
- d Grepable format, respectively, to the given filename. -iL <inputfilename>: Input from list of hosts/networks </code> ==== Scan host services ==== <code ba
- SMB Hardening
- rshell>Get-WindowsOptionalFeature -Online -FeatureName SMB1Protocol</code> SMBv1 can also be deactivate... ll>Disable-WindowsOptionalFeature -Online -FeatureName SMB1Protocol</code> === Server === The same co
- Buffer overflow in the 64-bit stack - part 1 @en:it-security:blog
- "Usage: %s <environment variable> <target program name>\n", argv[0]); exit(0); } ptr = getenv(argv[1... v[0]) - strlen(argv[2]))*2; /* adjust for program name */ printf("%s will be at %p\n", argv[1], ptr); }
- IT Security Cheat Sheets
- === IT Security Cheat Sheets ====== ^ Category ^ Name ^ Link ^ | @#D0FA58:**Methodology** | ^::: | Hack
- Secure passwords
- x, god etc. * No personal data such as sister's name or year of birth ==== 3.2 Number of characters
- Obfuscation: polymorphic in-memory decoder @en:it-security:blog
- , as only the corresponding registers had to be renamed. The decoder starts with this instruction: <cod
- Shellcode Injection Part 2 @en:it-security:blog
- which is [[https://www.bordergate.co.uk/function-name-hashing/|in this interesting blog post]] is expla
- Shellcode Injection Part 3 @en:it-security:blog
- s> ;Zeile 143 / +7 marks the beginning of the filename (WindowsAgent.py) lea edx, [esi + 7] ;Zeile 184