Suche
Unten sind die Ergebnisse Ihrer Suche gelistet.
Passende Seitennamen:
Volltextergebnisse:
- Obfuscation: polymorphic in-memory decoder @en:it-security:blog
- ecoder starts with this instruction: <code asm> _start: jmp short call_decoder ; Begin of JMP-C... goal here: <code asm [enable_line_numbers="true",start_line_numbers_at="26"]> xor rax, rax mov al, 60h m... change to: <code asm [enable_line_numbers="true",start_line_numbers_at="26"]> xor rax, rax mov rax, gs:[... e 0 bytes. <code asm [enable_line_numbers="true",start_line_numbers_at="30"]> mov rax, [rax] ; 48 8b
- Obfuscation: polymorpher In-Memory Decoder @it-security:blog
- ecoder startet mit dieser Anweisung: <code asm> _start: jmp short call_decoder ; Begin of JMP-C... ans Ziel: <code asm [enable_line_numbers="true",start_line_numbers_at="26"]> xor rax, rax mov al, 60h m... ändern in: <code asm [enable_line_numbers="true",start_line_numbers_at="26"]> xor rax, rax mov rax, gs:[... vermeiden. <code asm [enable_line_numbers="true",start_line_numbers_at="30"]> mov rax, [rax] ; 48 8b
- Obfuscation: Disguise shellcode as UUIDs @en:it-security:blog
- tionality ===== ==== Metasploit handler ==== We start a Metasploit handler on the attack system to rece
- Privilege escalation: Windows admin thanks to Linux @en:it-security:blog
- the boot sequence to the appropriate medium Now start Lubuntu and configure the following: * Change ... > \\ \\ ===== Manipulation of the SAM ===== ==== Start chntpw ==== Now it's time to start the tool we just installed. <code bash> sudo chntpw -i SAM </code> ... shut down. \\ \\ ===== Restart computer ===== To start the computer now, the following things must be se
- Buffer overflow in the 64-bit stack - Part 2 @en:it-security:blog
- d 2 gadgets to create the exploit. To do this, we start ropper and display the gadgets <code bash> roppe... xploit. So we load our file into the debugger and start it: <code bash> gdb-peda$ start ... gdb-peda$ p system $1 = {int (const char *)} 0x7ffff7e17920 <__libc... -part2 </code> \\ \\ ==== root Shell ==== Now we start our programme and pass our buffer as an argument.
- Buffer overflow in the 64-bit stack - Part 3 @en:it-security:blog
- Debug ===== {{page>en:vorlagen:attention}} ==== Start socat Listener ==== The supplied socat has mecha... process 105836 Mapped address spaces: Start Addr End Addr Size Offset Pe... urther pwntools optimisations and automated socat start can be found in the [[gh>psycore8/nosoc-bof/tree/... .com/a/48571747)) \\ \\ ==== root shell ==== We start socat and bof-part3 as root <code bash> su root
- Buffer Overflow im 64-Bit Stack - Teil 3 @it-security:blog
- process 105836 Mapped address spaces: Start Addr End Addr Size Offset Pe... pwntools Optimierungen und automatisiertem socat Start ist im [[gh>psycore8/nosoc-bof/tree/main/part-3|G
- Shellcode Injection Teil 2 @it-security:blog
- soll die PID des Zielprozesses als Parameter beim Start übergeben bekommen. Die PID geben wir als Paramet... ateRemoteThread(processHandle, NULL, 0, (LPTHREAD_START_ROUTINE)remoteBuffer, NULL, 0, NULL); </code> \\
- Shellcode Injection Part 4 @en:it-security:blog
- . The following requirements should be met: * Start of ''calc.exe'' on a Windows computer * 64-bit
- Shellcode Injection Teil 4 @it-security:blog
- Anforderungen sollten hierbei erfüllt sein: * Start von ''calc.exe'' auf einem Windows Rechner * 64... ==== kernel32.dll Basis Adresse ==== Mit jedem Start eines Prozesses in Windows, werden Module in dies
- Linux Befehle Cheatsheet @linux
- oft.net/shiv/HS/u-web-my4.tgz | gets file | ==== Start und Stop ==== ^ Befehl ^ Kommentar ^ | shutdown
- Host Discovery with Metasploit database @en:it-security
- ry(scanner/portscan/tcp) > hosts -R </code> ==== Start port scan ==== <code ruby> msf6 auxiliary(scann
- Shellcode Injection Part 2 @en:it-security:blog
- ateRemoteThread(processHandle, NULL, 0, (LPTHREAD_START_ROUTINE)remoteBuffer, NULL, 0, NULL); </code> \\
- Shellcode Injection Part 1 @en:it-security:blog
- ger}}] \\ \\ ==== Prepare Metasploit ==== Now we start a handler in Metasploit that accepts the reverse ... </code> \\ \\ ==== Execute shellcode ==== We now start ''Inject.exe''and look at the output in Metasploi... in our project and set the macro instructions to start and end the code obfuscation. <code c++ [enable_
- Buffer overflow in the 64-bit stack - part 1 @en:it-security:blog
- first we have to find out how we can do this. We start our programme in the debugger and generate a 200-... rst we set root rights to the vulnerable file and start it((https://blog.techorganic.com/2015/04/10/64-bi