Suche
Unten sind die Ergebnisse Ihrer Suche gelistet.
Passende Seitennamen:
Volltextergebnisse:
- Obfuscation: polymorphic in-memory decoder @en:it-security:blog
- ecoder starts with this instruction: <code asm> _start: jmp short call_decoder ; Begin of JMP-C... goal here: <code asm [enable_line_numbers="true",start_line_numbers_at="26"]> xor rax, rax mov al, 60h m... change to: <code asm [enable_line_numbers="true",start_line_numbers_at="26"]> xor rax, rax mov rax, gs:[... e 0 bytes. <code asm [enable_line_numbers="true",start_line_numbers_at="30"]> mov rax, [rax] ; 48 8b
- Windows XP Mode for Windows 7 Home @en:archiv:windows:vista
- ou will find the item "Windows Virtual PC" under "Start --> All Programs --> Windows Virtual PC". Clickin... ration. The installation of Windows XP should now start in the virtual PC. If you don't know how to insta... system! ===== 3 Configuring Windows XP. ===== Start the virtual computer and log into the system. Fir... lick Create ===== 6 The final touch. ===== Now start the virtual computer and log into the system. Onc
- Update UnrealIRCD @en:linux
- Let's change to the directory of the new IRCD and start with the configuration. <code bash> cd Unrealx.x... u enable AddressSanitizer, UnrealIRCd may fail to start. So when in doubt, answer 'No'. Do you want to en... t.conf network/yournetwork.network </code> ===== Start Unreal ===== Now we can start the IRCD. <code bash> ./unrealircd start </code>
- n8n installation with Docker Compose @en:linux
- bash> mkdir /somedirectory/n8n </code> ===== 7. start and stop ===== ==== 7.1 Start ==== <code bash> sudo docker compose up -d </code> === 7.1.1 Start with output === <code bash> sudo docker compose ... stored separately) sudo docker compose rm # Then start it again, in ingteractive mode to check for error
- FatCat Attack PoC @en:it-security:blog
- e ===== - Deactivate AV - Create payload - Start handler - BadUSB attack - Use RemoteShell to ... d attack ===== ==== Metasploit payload ==== * Start Metasploit * Open cmd <code dos>cmd</code> ... e payload}}] \\ ==== Metasploit Handler ==== * Start Multi Handler Server <code ruby> use exploit/mul... ecurity:blog:001-fc-handler.png?400|Configure and start Metasploit Handler}}] \\ ==== Access to the targe
- n8n installation with Docker Compose @en:linux:n8n
- bash> mkdir /somedirectory/n8n </code> ===== 7. start and stop ===== ==== 7.1 Start ==== <code bash> sudo docker compose up -d </code> === 7.1.1 Start with output === <code bash> sudo docker compose ... stored separately) sudo docker compose rm # Then start it again, in ingteractive mode to check for error
- Autostart after Linux reboot @en:linux
- en the server restarts, certain programmes should start directly. A simple cronjob is sufficient for this... mmand @reboot cd /home/user/programdir; ./program start </code> As a practical example, the automatic start of an IRCD with services: <code bash> # m h dom m... mand @reboot cd /home/psycore/Unreal3.2; ./unreal start @reboot cd /home/psycore/services; ./services </c
- Buffer overflow in the 64-bit stack - Part 2 @en:it-security:blog
- d 2 gadgets to create the exploit. To do this, we start ropper and display the gadgets <code bash> roppe... xploit. So we load our file into the debugger and start it: <code bash> gdb-peda$ start ... gdb-peda$ p system $1 = {int (const char *)} 0x7ffff7e17920 <__libc... -part2 </code> \\ \\ ==== root Shell ==== Now we start our programme and pass our buffer as an argument.
- Buffer overflow in the 64-bit stack - Part 3 @en:it-security:blog
- Debug ===== {{page>en:vorlagen:attention}} ==== Start socat Listener ==== The supplied socat has mecha... process 105836 Mapped address spaces: Start Addr End Addr Size Offset Pe... urther pwntools optimisations and automated socat start can be found in the [[gh>psycore8/nosoc-bof/tree/... .com/a/48571747)) \\ \\ ==== root shell ==== We start socat and bof-part3 as root <code bash> su root
- Privilege escalation: Windows admin thanks to Linux @en:it-security:blog
- the boot sequence to the appropriate medium Now start Lubuntu and configure the following: * Change ... > \\ \\ ===== Manipulation of the SAM ===== ==== Start chntpw ==== Now it's time to start the tool we just installed. <code bash> sudo chntpw -i SAM </code> ... shut down. \\ \\ ===== Restart computer ===== To start the computer now, the following things must be se
- nmap SMBv1 Scan via Script @en:it-security
- king if SMBv1 is supported") status, smbstate = start(host) if(status == false) then return false... SMBv1 and close connection status, smbstate = start(host) if(status == false) then return false... blocking the responses" end end </code> ===== Start scan ===== <code bash> nmap -p139,445 --script s
- NTLDR missing Error message @en:windows
- cumstances it can happen that Windows cancels the start process with the error message: <code text> NTLD... g steps can be taken to rectify this error ===== Start the recovery console ===== You need a bootable C... e drive and restart the PC. Everything should now start as usual. In most cases, this works absolutely re
- Start Microsoft configuration tool @en:windows
- ish windows windows_10 windows_11 basics}} ====== Start Microsoft configuration tool ====== - Press the start button - Execute - Enter "msconfig" (without inverted commas) - Press Enter The system configuration should now start. {{windows:msconfig.jpg|}}
- Start Registry Editor @en:windows
- uld only be made by experienced people** | ====== Start Registry Editor ====== - Click on the start button - Execute - Enter "regedit" (without inverted commas) - Enter The registry editor will now start. Before making any changes, it is advisable to cr
- Shellcode Injection Part 1 @en:it-security:blog
- ger}}] \\ \\ ==== Prepare Metasploit ==== Now we start a handler in Metasploit that accepts the reverse ... </code> \\ \\ ==== Execute shellcode ==== We now start ''Inject.exe''and look at the output in Metasploi... in our project and set the macro instructions to start and end the code obfuscation. <code c++ [enable_