NoSociety.de

#nosoc

  • Page Tools
    Show pageOld revisionsBacklinks
  • Site Tools
    Recent ChangesMedia ManagerSitemap
  • User Tools
    Log In

Search

You can find the results of your search below.

Ends with
  • Exact match
  • Starts with
  • Ends with
  • Contains
@en:it-security
  • Any namespace
  • en:it-security:blog (4)
Any time
  • Any time
  • Past week
  • Past month
  • Past year
Sort by hits
  • Sort by hits
  • Sort by last modified

Fulltext results:

Group Managed Service Accounts
18 Hits, Last modified: 17 months ago
the DC: <code powershell> New-ADServiceAccount -Name <ACCOUNTNAME> -DNSHostName <ACCOUNTNAME>.<DOMAIN>.<TLD> -PrincipalsAllowedToRetrieveManagedPassword <COMPUTERNAME>$ </code> ====
Shellcode Injection Part 4 @en:it-security:blog
8 Hits, Last modified: 10 months ago
, rax ; Adress_Table mov [rbp - 18h], rax ; Name_Ptr_Table mov [rbp - 20h], rax ; Ordinal_Table... ddress_Table RVA_Export_Table + 0x20 Bytes -> RVA_Name_Pointer_Table RVA_Export_Table + 0x24 Bytes -> RV... dress_Table -> Var mov ecx, [rax + 0x20] ; RVA_Name_Ptr_Table add rcx, rbx ; Name_Ptr_Table = kernel32.base + RVA_Name_Ptr_Table mov [rbp - 18h
Host Discovery with Metasploit database
5 Hits, Last modified: 10 months ago
de ruby> msf6 > db_connect user:pass@127.0.0.1/db_name </code> ==== Check connection ==== <code ruby> msf6 > db_status [*] Connected to db_name. Connection type: postgresql. Connection name: local_db_service. </code> ===== Metasploit: Create work... s Hosts ===== address mac name os_name os_flavor os_sp pur
Helpful NMAP scanner commands
2 Hits, Last modified: 17 months ago
d Grepable format, respectively, to the given filename. -iL <inputfilename>: Input from list of hosts/networks </code> ==== Scan host services ==== <code ba
SMB Hardening
2 Hits, Last modified: 17 months ago
rshell>Get-WindowsOptionalFeature -Online -FeatureName SMB1Protocol</code> SMBv1 can also be deactivate... ll>Disable-WindowsOptionalFeature -Online -FeatureName SMB1Protocol</code> === Server === The same co
Buffer overflow in the 64-bit stack - part 1 @en:it-security:blog
2 Hits, Last modified: 11 months ago
"Usage: %s <environment variable> <target program name>\n", argv[0]); exit(0); } ptr = getenv(argv[1... v[0]) - strlen(argv[2]))*2; /* adjust for program name */ printf("%s will be at %p\n", argv[1], ptr); }
IT Security Cheat Sheets
1 Hits, Last modified: 17 months ago
=== IT Security Cheat Sheets ====== ^ Category ^ Name ^ Link ^ | @#D0FA58:**Methodology** | ^::: | Hack
Secure passwords
1 Hits, Last modified: 17 months ago
x, god etc. * No personal data such as sister's name or year of birth ==== 3.2 Number of characters
Shellcode Injection Part 2 @en:it-security:blog
1 Hits, Last modified: 11 months ago
which is [[https://www.bordergate.co.uk/function-name-hashing/|in this interesting blog post]] is expla
Shellcode Injection Part 3 @en:it-security:blog
1 Hits, Last modified: 12 months ago
s> ;Zeile 143 / +7 marks the beginning of the filename (WindowsAgent.py) lea edx, [esi + 7] ;Zeile 184