NoSociety.de

#nosoc

  • Page Tools
    Show pageOld revisionsBacklinks
  • Site Tools
    Recent ChangesMedia ManagerSitemap
  • User Tools
    Log In

Search

You can find the results of your search below.

Exact match
  • Exact match
  • Starts with
  • Ends with
  • Contains
@it-security:blog
  • Any namespace
Any time
  • Any time
  • Past week
  • Past month
  • Past year
Sort by hits
  • Sort by hits
  • Sort by last modified

Fulltext results:

Obfuscation: polymorpher In-Memory Decoder
6 Hits, Last modified: 13 months ago
ecoder startet mit dieser Anweisung: <code asm> _start: jmp short call_decoder ; Begin of JMP-C... ans Ziel: <code asm [enable_line_numbers="true",start_line_numbers_at="26"]> xor rax, rax mov al, 60h m... ändern in: <code asm [enable_line_numbers="true",start_line_numbers_at="26"]> xor rax, rax mov rax, gs:[... vermeiden. <code asm [enable_line_numbers="true",start_line_numbers_at="30"]> mov rax, [rax] ; 48 8b
Backdoor development with Code Caves
3 Hits, Last modified: 9 months ago
e Size: 4027 byte. [*] Start Address: 0x80005654 [*] En... in </code> ===== 4.0 Code Hijacking ===== Let's start the disassembler! We should initiate a [[Backdoor... rse TCP handler on 0.0.0.0:6699 </code> ==== 5.2 Start the backdoor ==== - Run the backdoor - Enter
Buffer Overflow im 64-Bit Stack - Teil 3
2 Hits, Last modified: 8 months ago
process 105836 Mapped address spaces: Start Addr End Addr Size Offset Pe... pwntools Optimierungen und automatisiertem socat Start ist im [[gh>psycore8/nosoc-bof/tree/main/part-3|G
Obfuscation: ByteSwapping
2 Hits, Last modified: 11 months ago
tialisierung und JMP-CALL-POP === <code stylus> _start: xor rax, rax xor rbx, rbx xor rcx, r... hon shencode.py extract -i poly2.o -o poly2.raw --start-offset 100 --end-offset 404 </code> * Dann ext
Shellcode Injection Teil 2
2 Hits, Last modified: 14 months ago
soll die PID des Zielprozesses als Parameter beim Start übergeben bekommen. Die PID geben wir als Paramet... ateRemoteThread(processHandle, NULL, 0, (LPTHREAD_START_ROUTINE)remoteBuffer, NULL, 0, NULL); </code> \\
Shellcode Injection Teil 4
2 Hits, Last modified: 14 months ago
Anforderungen sollten hierbei erfüllt sein: * Start von ''calc.exe'' auf einem Windows Rechner * 64... ==== kernel32.dll Basis Adresse ==== Mit jedem Start eines Prozesses in Windows, werden Module in dies
Buffer Overflow im 64-Bit Stack - Teil 2
1 Hits, Last modified: 15 months ago
den Debugger und starten: <code bash> gdb-peda$ start ... gdb-peda$ p system $1 = {int (const char *)}
FatCat Attack PoC
1 Hits, Last modified: 19 months ago
msfpayload.exe DELAY 3000 ENTER DELAY 5000 STRING Start-Process msfpayload.exe DELAY 3000 ENTER DELAY 300