name

Search

You can find the results of your search below.

Group Managed Service Accounts
18 Hits, Last modified:
the DC: <code powershell> New-ADServiceAccount -Name <ACCOUNTNAME> -DNSHostName <ACCOUNTNAME>.<DOMAIN>.<TLD> -PrincipalsAllowedToRetrieveManagedPassword <COMPUTERNAME>$ </code> ====
Host Discovery with Metasploit database
5 Hits, Last modified:
de ruby> msf6 > db_connect user:pass@127.0.0.1/db_name </code> ==== Check connection ==== <code ruby> msf6 > db_status [*] Connected to db_name. Connection type: postgresql. Connection name: local_db_service. </code> ===== Metasploit: Create work... s Hosts ===== address mac name os_name os_flavor os_sp pur
Helpful NMAP scanner commands
2 Hits, Last modified:
d Grepable format, respectively, to the given filename. -iL <inputfilename>: Input from list of hosts/networks </code> ==== Scan host services ==== <code ba
SMB Hardening
2 Hits, Last modified:
rshell>Get-WindowsOptionalFeature -Online -FeatureName SMB1Protocol</code> SMBv1 can also be deactivate... ll>Disable-WindowsOptionalFeature -Online -FeatureName SMB1Protocol</code> === Server === The same co
Buffer overflow in the 64-bit stack - part 1 @en:it-security:blog
2 Hits, Last modified:
"Usage: %s <environment variable> <target program name>\n", argv[0]); exit(0); } ptr = getenv(argv[1... v[0]) - strlen(argv[2]))*2; /* adjust for program name */ printf("%s will be at %p\n", argv[1], ptr); }
IT Security Cheat Sheets
1 Hits, Last modified:
=== IT Security Cheat Sheets ====== ^ Category ^ Name ^ Link ^ | @#D0FA58:**Methodology** | ^::: | Hack
Secure passwords
1 Hits, Last modified:
x, god etc. * No personal data such as sister's name or year of birth ==== 3.2 Number of characters