NoSociety.de

#nosoc

  • Page Tools
    Show pageOld revisionsBacklinks
  • Site Tools
    Recent ChangesMedia ManagerSitemap
  • User Tools
    Log In

Search

You can find the results of your search below.

Starts with
  • Exact match
  • Starts with
  • Ends with
  • Contains
@en:it-security
  • Any namespace
  • en:it-security:blog (3)
Any time
  • Any time
  • Past week
  • Past month
  • Past year
Sort by hits
  • Sort by hits
  • Sort by last modified

Fulltext results:

Shellcode Injection Part 4 @en:it-security:blog
8 Hits, Last modified: 10 months ago
, rax ; Adress_Table mov [rbp - 18h], rax ; Name_Ptr_Table mov [rbp - 20h], rax ; Ordinal_Table... ddress_Table RVA_Export_Table + 0x20 Bytes -> RVA_Name_Pointer_Table RVA_Export_Table + 0x24 Bytes -> RV... dress_Table -> Var mov ecx, [rax + 0x20] ; RVA_Name_Ptr_Table add rcx, rbx ; Name_Ptr_Table = kernel32.base + RVA_Name_Ptr_Table mov [rbp - 18h
Host Discovery with Metasploit database
5 Hits, Last modified: 10 months ago
de ruby> msf6 > db_connect user:pass@127.0.0.1/db_name </code> ==== Check connection ==== <code ruby> msf6 > db_status [*] Connected to db_name. Connection type: postgresql. Connection name: local_db_service. </code> ===== Metasploit: Create work... s Hosts ===== address mac name os_name os_flavor os_sp pur
Group Managed Service Accounts
3 Hits, Last modified: 17 months ago
the DC: <code powershell> New-ADServiceAccount -Name <ACCOUNTNAME> -DNSHostName <ACCOUNTNAME>.<DOMAIN>... ***************** PS C:\Users\PSY> Set-Service -name "Service" -Credential $creds </code> ===== Delet... ).MemberOf $ADGroup | Get-ADGroup | Select-Object Name </code> ==== Delete group membership ==== <code
Buffer overflow in the 64-bit stack - part 1 @en:it-security:blog
2 Hits, Last modified: 11 months ago
"Usage: %s <environment variable> <target program name>\n", argv[0]); exit(0); } ptr = getenv(argv[1... v[0]) - strlen(argv[2]))*2; /* adjust for program name */ printf("%s will be at %p\n", argv[1], ptr); }
IT Security Cheat Sheets
1 Hits, Last modified: 17 months ago
=== IT Security Cheat Sheets ====== ^ Category ^ Name ^ Link ^ | @#D0FA58:**Methodology** | ^::: | Hack
Secure passwords
1 Hits, Last modified: 17 months ago
x, god etc. * No personal data such as sister's name or year of birth ==== 3.2 Number of characters
Shellcode Injection Part 2 @en:it-security:blog
1 Hits, Last modified: 11 months ago
which is [[https://www.bordergate.co.uk/function-name-hashing/|in this interesting blog post]] is expla