NoSociety.de

#nosoc

  • Page Tools
    Show pageOld revisionsBacklinks
  • Site Tools
    Recent ChangesMedia ManagerSitemap
  • User Tools
    Log In

Search

You can find the results of your search below.

Ends with
  • Exact match
  • Starts with
  • Ends with
  • Contains
@en:it-security
  • Any namespace
  • en:it-security:blog (7)
Any time
  • Any time
  • Past week
  • Past month
  • Past year
Sort by hits
  • Sort by hits
  • Sort by last modified

Fulltext results:

Buffer overflow in the 64-bit stack - Part 3 @en:it-security:blog
28 Hits, Last modified: 12 months ago
we used the string ''/bin/zsh'' to the function ''System()'' function to open a root shell. To do this, ho... gramme, but can simply access the function of the system, which, for example, is stored in ''libc'' for ex... GOT, we overwrite an address with the one from ''system()''so that we can issue a system command when calling the function <code gdb> [-------------------------
Buffer overflow in the 64-bit stack - Part 2 @en:it-security:blog
8 Hits, Last modified: 12 months ago
.org/wiki/C-Standard-Bibliothek|libc-Funktion]] ''system()'' is forwarded. This tutorial is fundamentally ... AA') RSP: 0x7...fdde0 --> 0x7ffff7e17920 (<__libc_system>: test rdi,rdi) # system("/bin/sh") RIP: 0x400469 (<_init+25>: ret) </code> \\ \\ ===== Dependenci... it: <code bash> gdb-peda$ start ... gdb-peda$ p system $1 = {int (const char *)} 0x7ffff7e17920 <__libc_
FatCat Attack PoC @en:it-security:blog
4 Hits, Last modified: 19 months ago
tom-payloads)) | |::: | Enumeration | **Enumerate System Info** JAWS((https://github.com/411Hall/JAWS)), S... etasploit Handler}}] \\ ==== Access to the target system ==== * With the pinball machine, the following script is executed on the target system <code dos> WINDOWS r DELAY 2000 STRING powershel... ablished - Metasploit does it ==== <code dos> getsystem hashdump ls getwd cd c: cd Glob_Share ls backgrou
Buffer Overflows - Intro
3 Hits, Last modified: 14 months ago
ult in an attacker taking control of the affected system, executing malicious code, spying on confidential data or completely disrupting the system's service. In critical environments, such as in t... of computer systems. It is vital that developers, system administrators and security professionals are awa
Group Managed Service Accounts
3 Hits, Last modified: 20 months ago
UTERNAME>$ </code> ==== test ==== On the target system: <code powershell> Test-ADServiceAccount <ACCOUN... le reports ''True'' === For errors on the target system === The RSAT tools may need to be activated. Sta... in AD, or as a local administrator on the target system. ===== Services ===== Services can now be provi
OSI layer cyber attacks
2 Hits, Last modified: 20 months ago
fc1: Firewall filtering, [[wp>Intrusion_Detection_System|IDS]], [[wp>Intrusion_Prevention_System|IPS]], prevent IP address spoofing via the router | | @lightsalmo
Obfuscation: Disguise shellcode as UUIDs @en:it-security:blog
2 Hits, Last modified: 12 days ago
==== We start a Metasploit handler on the attack system to receive the reverse shell: <code ruby> msf6 >... 64-bit programme. We then copy this to the victim system. After the copying process, the file is not recog
Privilege escalation: Windows admin thanks to Linux @en:it-security:blog
2 Hits, Last modified: 12 months ago
de>Security_Accounts_Manager]] using a live Linux system. \\ \\ ===== Initial situation ===== On a Windows system, the users ''users'' and ''sysadmin'' are created... the SAM directory. <code bash> cd ~/win/Windows/System32/config </code> \\ \\ ===== Manipulation of the
SMB Hardening
1 Hits, Last modified: 20 months ago
Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameter
Obfuscation: ByteSwapping @en:it-security:blog
1 Hits, Last modified: 10 months ago
e conditions for the end of the loop are met, the system jumps directly to the decrypted shellcode and exe
Shellcode Injection Part 2 @en:it-security:blog
1 Hits, Last modified: 14 months ago
Metasploit uses ROR13 (Rotate Right 13) to hash system addresses. We turn ROR13 into ROL33 (Rotate Left