Suche
Unten sind die Ergebnisse Ihrer Suche gelistet.
Volltextergebnisse:
- Buffer overflow in the 64-bit stack - Part 3 @en:it-security:blog
- we used the string ''/bin/zsh'' to the function ''System()'' function to open a root shell. To do this, ho... gramme, but can simply access the function of the system, which, for example, is stored in ''libc'' for ex... GOT, we overwrite an address with the one from ''system()''so that we can issue a system command when calling the function <code gdb> [-------------------------
- Buffer overflow in the 64-bit stack - Part 2 @en:it-security:blog
- .org/wiki/C-Standard-Bibliothek|libc-Funktion]] ''system()'' is forwarded. This tutorial is fundamentally ... AA') RSP: 0x7...fdde0 --> 0x7ffff7e17920 (<__libc_system>: test rdi,rdi) # system("/bin/sh") RIP: 0x400469 (<_init+25>: ret) </code> \\ \\ ===== Dependenci... it: <code bash> gdb-peda$ start ... gdb-peda$ p system $1 = {int (const char *)} 0x7ffff7e17920 <__libc_
- Windows XP Mode for Windows 7 Home @en:archiv:windows:vista
- r programmes must not be installed in the virtual system! ===== 3 Configuring Windows XP. ===== Start the virtual computer and log into the system. First go to the Security Centre, which can be fo... nd click OK. This will make the red shield in the system try disappear. Next, we scroll all the way down a... ot fix and restart the virtual computer. When the system has restarted, you will immediately notice that t
- NTLDR missing Error message @en:windows
- ===== You need a bootable CD/DVD of your Windows system. Insert this and check that the boot sequence in ... oot Record ===== Let's assume that the operating system is located on C:. Now you must first repair the M... ond command to repair the partition sector of the system partition. ===== Copy system files ===== Now you need to copy the required system files to the partitio
- Reset the registry at an earlier point in time @en:windows
- g at this point is that we get access to the file system. ===== Rename and save the old registry ===== Now go to the folder C:\Windows\system32\config and rename the following files: - SAM - SECURITY - software - default - system These should now be backed up to another partition or similar. ===== Copying from the system restore ===== Now go to the folder "C:\System Vo
- User account control under Windows Vista @en:windows:security
- is an important security feature. It protects the system from unauthorised access through external attacks... oftware\Microsoft\Windows\CurrentVersion\Policies\System </code> Here we create a new value of the REG_DW... oftware\Microsoft\Windows\CurrentVersion\Policies\System </code> Here we create a new value of the REG_DW... oftware\Microsoft\Windows\CurrentVersion\Policies\System </code> Here we create a new value of the REG_DW
- FatCat Attack PoC @en:it-security:blog
- tom-payloads)) | |::: | Enumeration | **Enumerate System Info** JAWS((https://github.com/411Hall/JAWS)), S... etasploit Handler}}] \\ ==== Access to the target system ==== * With the pinball machine, the following script is executed on the target system <code dos> WINDOWS r DELAY 2000 STRING powershel... ablished - Metasploit does it ==== <code dos> getsystem hashdump ls getwd cd c: cd Glob_Share ls backgrou
- Password Manager @en:software:passwort_manager
- error under Vista Aero * Bugfix of the counter system ==== V3.0.0.13 ==== * Layout optimised * Na... mic encryption * Wrong password bug * Licence system * Dismount container after a defined time in mi... displayed as an entry * Improved copy and paste system * Context menu in the container list: * - Cop... ed * Email to author function * Minimise to system tray possible * Password verification when add
- Move swap file under XP @en:archiv:windows:performance
- ores this file on the partition where the Windows system files are located. You can improve the performanc... Click on Performance and Maintenance and then on System. - On the Advanced tab, under System performance, click Settings. - On the Advanced tab, under Virt... e C: has an initial size of less than 126 MB, the system may not be able to save debug information when a
- Buffer Overflows - Intro @en:it-security
- ult in an attacker taking control of the affected system, executing malicious code, spying on confidential data or completely disrupting the system's service. In critical environments, such as in t... of computer systems. It is vital that developers, system administrators and security professionals are awa
- Group Managed Service Accounts @en:it-security
- UTERNAME>$ </code> ==== test ==== On the target system: <code powershell> Test-ADServiceAccount <ACCOUN... le reports ''True'' === For errors on the target system === The RSAT tools may need to be activated. Sta... in AD, or as a local administrator on the target system. ===== Services ===== Services can now be provi
- Linux Commands Cheatsheet @en:linux
- -get upgrade | upgrade installed packages | ==== System Management ==== ^ Command ^ Comment ^ | cat /pro... | mount -o remount -rw / | release read-only file system | | ps | process list | | ps -aux | detailed proc... shutdown -s -f | Forced shutdown | ===== change system time ===== Set the time under Linux. ((https://w
- Windows restore points @en:windows
- ====== Windows restore points ====== ===== Open System Restore ===== Go to the settings and search for ... You will be taken to the relevant section of the system properties where you can create and activate rest... t ==== To return to a previous point, click on ''System Restore'' and then click on ''next''. Then select
- Disable User Account Control (UAC) completely @en:windows
- oftware\Microsoft\Windows\CurrentVersion\Policies\System - Set the EnableLUA (DWord) entry to 0 - Rest... OFTWARE\Microsoft\Windows\CurrentVersion\Policies\System] "EnableLUA"=dword:00000000 </file> ===== Deacti... ftware\Microsoft\Windows\CurrentVersion\poilicies\system -Name EnableLUA -PropertyType DWord -Value 0 -For
- OSI layer cyber attacks @en:it-security
- fc1: Firewall filtering, [[wp>Intrusion_Detection_System|IDS]], [[wp>Intrusion_Prevention_System|IPS]], prevent IP address spoofing via the router | | @lightsalmo