NoSociety.de

#nosoc

  • Page Tools
    Show pageOld revisionsBacklinks
  • Site Tools
    Recent ChangesMedia ManagerSitemap
  • User Tools
    Log In

Search

You can find the results of your search below.

Starts with
  • Exact match
  • Starts with
  • Ends with
  • Contains
Any namespace
  • Any namespace
  • en (44)
  • it-security (12)
  • windows (10)
  • linux (7)
  • archiv (3)
  • wiki (2)
  • software (1)
  • user (1)
  • vorlagen (1)
Any time
  • Any time
  • Past week
  • Past month
  • Past year
Sort by hits
  • Sort by hits
  • Sort by last modified

Fulltext results:

Buffer Overflow im 64-Bit Stack - Teil 3 @it-security:blog
29 Hits, Last modified: 12 months ago
ben wir den String ''/bin/zsh'' an die Funktion ''System()'' gesendet, um eine root Shell zu öffen. Hierzu... n:64_bit_stack_nav}} ==== Theorie ==== In Linux Systemen verwendet man üblicherweise dynamische Programm... iben müssen, sondern einfach auf die Funktion des Systems zugreifen können, welche z.B. in ''libc'' liegt.... GOT überschreiben wir eine Adresse mit der von ''system()'', so dass wir beim Aufruf der Funktion einen S
Buffer overflow in the 64-bit stack - Part 3 @en:it-security:blog
29 Hits, Last modified: 17 months ago
we used the string ''/bin/zsh'' to the function ''System()'' function to open a root shell. To do this, ho... urity:blog:bof-part3-header.jpg?500 |}} In Linux systems, dynamic programme libraries are usually used. T... gramme, but can simply access the function of the system, which, for example, is stored in ''libc'' for ex... GOT, we overwrite an address with the one from ''system()''so that we can issue a system command when cal
Buffer Overflows - Intro @en:it-security
8 Hits, Last modified: 19 months ago
nd dangerous security vulnerabilities in computer systems. This vulnerability allows an attacker to overwr... overflows work, discuss their impact on computer systems and discuss various preventative measures. \\ \\... ult in an attacker taking control of the affected system, executing malicious code, spying on confidential data or completely disrupting the system's service. In critical environments, such as in t
Reset the registry at an earlier point in time @en:windows
8 Hits, Last modified: 17 months ago
g at this point is that we get access to the file system. ===== Rename and save the old registry ===== Now go to the folder C:\Windows\system32\config and rename the following files: - SAM - SECURITY - software - default - system These should now be backed up to another partition or similar. ===== Copying from the system restore ===== Now go to the folder "C:\System Vo
Buffer Overflow im 64-Bit Stack - Teil 2 @it-security:blog
8 Hits, Last modified: 19 months ago
.org/wiki/C-Standard-Bibliothek|libc-Funktion]] ''system()'' weitergeleitet wird. Grundlegend basiert dies... AA') RSP: 0x7...fdde0 --> 0x7ffff7e17920 (<__libc_system>: test rdi,rdi) # system("/bin/sh") RIP: 0x400469 (<_init+25>: ret) </code> \\ \\ ===== Abhängigke... ten: <code bash> gdb-peda$ start ... gdb-peda$ p system $1 = {int (const char *)} 0x7ffff7e17920 <__libc_
Buffer overflow in the 64-bit stack - Part 2 @en:it-security:blog
8 Hits, Last modified: 17 months ago
.org/wiki/C-Standard-Bibliothek|libc-Funktion]] ''system()'' is forwarded. This tutorial is fundamentally ... AA') RSP: 0x7...fdde0 --> 0x7ffff7e17920 (<__libc_system>: test rdi,rdi) # system("/bin/sh") RIP: 0x400469 (<_init+25>: ret) </code> \\ \\ ===== Dependenci... it: <code bash> gdb-peda$ start ... gdb-peda$ p system $1 = {int (const char *)} 0x7ffff7e17920 <__libc_
Registry zu einem früherem Zeitpunkt zurücksetzen @windows
7 Hits, Last modified: 17 months ago
hern ===== Nun geht man in den Ordner C:\Windows\system32\config und benennt folgende Dateien um: - SAM - SECURITY - software - default - system Diese sollten nun auf eine andere Partition oder... leichen gesichert werden. ===== Kopieren aus der Systemwiederherstellung ===== Nun geht man in den Ordner "C:\System Volume Information". Hier liegen mehrere Ordner m
Windows XP Mode for Windows 7 Home @en:archiv:windows:vista
7 Hits, Last modified: 2 years ago
r programmes must not be installed in the virtual system! ===== 3 Configuring Windows XP. ===== Start the virtual computer and log into the system. First go to the Security Centre, which can be fo... nd click OK. This will make the red shield in the system try disappear. Next, we scroll all the way down a... ot fix and restart the virtual computer. When the system has restarted, you will immediately notice that t
NTLDR missing Error message @en:windows
6 Hits, Last modified: 2 years ago
===== You need a bootable CD/DVD of your Windows system. Insert this and check that the boot sequence in ... oot Record ===== Let's assume that the operating system is located on C:. Now you must first repair the M... ond command to repair the partition sector of the system partition. ===== Copy system files ===== Now you need to copy the required system files to the partitio
User account control under Windows Vista @en:windows:security
5 Hits, Last modified: 2 years ago
is an important security feature. It protects the system from unauthorised access through external attacks... oftware\Microsoft\Windows\CurrentVersion\Policies\System </code> Here we create a new value of the REG_DW... oftware\Microsoft\Windows\CurrentVersion\Policies\System </code> Here we create a new value of the REG_DW... oftware\Microsoft\Windows\CurrentVersion\Policies\System </code> Here we create a new value of the REG_DW
Buffer Overflows - Intro @it-security
4 Hits, Last modified: 19 months ago
s ein Angreifer die Kontrolle über das betroffene System übernimmt, Schadcode ausführt, vertrauliche Daten ausspioniert oder den Dienst des Systems vollständig beeinträchtigt. In kritischen Umgebu... st von entscheidender Bedeutung, dass Entwickler, Systemadministratoren und Sicherheitsexperten sich der R... on Buffer Overflows minimieren und die Sicherheit ihrer Systeme gewährleisten. {{page>vorlagen:chatgpt}}
Update UnrealIRCD @linux
4 Hits, Last modified: 2 years ago
s the DEFAULT geoip engine. It should work on all systems and receives automatic updates. li... need to install the libmaxminddb library on your system first none: Don't build with any geoip li... sults in a limit of up to 16384, depending on the system. When you boot UnrealIRCd later you will always s... swer 'Yes' if you are OK with this. Also, on some systems (notably FreeBSD), when you enable AddressSaniti
Linux Commands Cheatsheet @en:linux
4 Hits, Last modified: 18 months ago
-get upgrade | upgrade installed packages | ==== System Management ==== ^ Command ^ Comment ^ | cat /pro... | mount -o remount -rw / | release read-only file system | | ps | process list | | ps -aux | detailed proc... shutdown -s -f | Forced shutdown | ===== change system time ===== Set the time under Linux. ((https://wiki.ubuntuusers.de/Systemzeit/)) ==== show time ==== <code bash> timedate
Update UnrealIRCD @en:linux
4 Hits, Last modified: 2 years ago
s the DEFAULT geoip engine. It should work on all systems and receives automatic updates. li... need to install the libmaxminddb library on your system first none: Don't build with any geoip li... sults in a limit of up to 16384, depending on the system. When you boot UnrealIRCd later you will always s... swer 'Yes' if you are OK with this. Also, on some systems (notably FreeBSD), when you enable AddressSaniti
Password Manager @en:software:passwort_manager
4 Hits, Last modified: 2 years ago
error under Vista Aero * Bugfix of the counter system ==== V3.0.0.13 ==== * Layout optimised * Na... mic encryption * Wrong password bug * Licence system * Dismount container after a defined time in mi... displayed as an entry * Improved copy and paste system * Context menu in the container list: * - Cop... ed * Email to author function * Minimise to system tray possible * Password verification when add
Move swap file under XP @en:archiv:windows:performance
4 Hits, Last modified: 2 years ago
Windows - Konsole und Befehle @windows
3 Hits, Last modified: 22 months ago
Windows Wiederherstellungspunkte @windows
3 Hits, Last modified: 22 months ago
Benutzerkontensteuerung (UAC) komplett deaktivieren @windows
3 Hits, Last modified: 2 years ago
Group Managed Service Accounts @en:it-security
3 Hits, Last modified: 2 years ago
Windows restore points @en:windows
3 Hits, Last modified: 22 months ago
Disable User Account Control (UAC) completely @en:windows
3 Hits, Last modified: 2 years ago
Privilegien-Eskalation: Windows-Admin dank Linux @it-security:blog
3 Hits, Last modified: 22 months ago
Passwort Manager @software:passwort_manager
3 Hits, Last modified: 18 years ago
Die Geschichte in Bildern @archiv:software:razor5
3 Hits, Last modified: 14 years ago
FatCat Attack PoC @en:it-security:blog
3 Hits, Last modified: 2 years ago
Privilege escalation: Windows admin thanks to Linux @en:it-security:blog
3 Hits, Last modified: 17 months ago
Metasploit Cheatsheet @it-security
2 Hits, Last modified: 16 months ago
OSI Layer Cyber-Attacken @it-security
2 Hits, Last modified: 2 years ago
Linux Befehle Cheatsheet @linux
2 Hits, Last modified: 18 months ago
MySQL Backup unter Linux @linux
2 Hits, Last modified: 2 years ago
MySQL Operating system error number 13 @linux
2 Hits, Last modified: 2 years ago
Formatting Syntax @wiki
2 Hits, Last modified: 2 years ago
Windows Bluescreen Analyse @windows
2 Hits, Last modified: 2 years ago
Eigene Namen im LAN anlegen @windows
2 Hits, Last modified: 2 years ago
OSI layer cyber attacks @en:it-security
2 Hits, Last modified: 2 years ago
Formatting Syntax @en:wiki
2 Hits, Last modified: 2 years ago
Windows Bluescreen Analysis @en:windows
2 Hits, Last modified: 2 years ago
Deactivate automatic data carrier check @en:windows
2 Hits, Last modified: 2 years ago
FatCat Attack PoC @it-security:blog
2 Hits, Last modified: 22 months ago
Obfuscation: Shellcode als UUIDs tarnen @it-security:blog
2 Hits, Last modified: 17 months ago
Obfuscation: Disguise shellcode as UUIDs @en:it-security:blog
2 Hits, Last modified: 5 months ago
MySQL Backup under Linux @en:linux:mysql
2 Hits, Last modified: 2 years ago
MySQL Operating system error number 13 @en:linux:mysql
2 Hits, Last modified: 2 years ago
DefCon-1 @archiv
1 Hits, Last modified: 2 years ago
IRC - Internet Relay Chat @en
1 Hits, Last modified: 2 years ago
Tutorials @en
1 Hits, Last modified: 2 years ago
Hilfreiche NMAP Scanner Kommandos @it-security
1 Hits, Last modified: 18 months ago
SMB Hardening @it-security
1 Hits, Last modified: 2 years ago
iptables einrichten @linux
1 Hits, Last modified: 2 years ago
n8n Installation mit Docker Compose @linux
1 Hits, Last modified: 24 months ago
Emuliertes Debian unter VMWare @linux
1 Hits, Last modified: 14 years ago
GetUserInfo( psycore8 ) @user
1 Hits, Last modified: 11 months ago
section-warn @vorlagen
1 Hits, Last modified: 24 months ago
DokuWiki @wiki
1 Hits, Last modified: 4 years ago
Numlock beim Windows Start aktivieren @windows
1 Hits, Last modified: 2 years ago
Startpartition reparieren @windows
1 Hits, Last modified: 2 years ago
Microsoft Konfigurationstool starten @windows
1 Hits, Last modified: 2 years ago
Reparatur von Windows 10 ausführen @windows
1 Hits, Last modified: 2 years ago
DefCon-1 @en:archiv
1 Hits, Last modified: 2 years ago
Helpful NMAP scanner commands @en:it-security
1 Hits, Last modified: 2 years ago
Secure passwords @en:it-security
1 Hits, Last modified: 2 years ago
SMB Hardening @en:it-security
1 Hits, Last modified: 2 years ago
Set up iptables @en:linux
1 Hits, Last modified: 2 years ago
n8n installation with Docker Compose @en:linux
1 Hits, Last modified: 2 years ago
Emulated Debian under VMWare @en:linux
1 Hits, Last modified: 2 years ago
DokuWiki @en:wiki
1 Hits, Last modified: 2 years ago
Start Microsoft configuration tool @en:windows
1 Hits, Last modified: 2 years ago
Execute repair of Windows 10 @en:windows
1 Hits, Last modified: 2 years ago
Backdoor development with Code Caves @it-security:blog
1 Hits, Last modified: 12 months ago
Shellcode Injection Teil 2 @it-security:blog
1 Hits, Last modified: 18 months ago
Delphi Snippets @archiv:coding:delphi
1 Hits, Last modified: 14 years ago
The importance of awareness in IT security @en:it-security:blog
1 Hits, Last modified: 19 months ago
Obfuscation: ByteSwapping @en:it-security:blog
1 Hits, Last modified: 15 months ago
Shellcode Injection Part 2 @en:it-security:blog
1 Hits, Last modified: 19 months ago
Set up iptables @en:linux:firewall
1 Hits, Last modified: 2 years ago
n8n installation with Docker Compose @en:linux:n8n
1 Hits, Last modified: 2 years ago
Execute repair of Windows 10 @en:windows:10
1 Hits, Last modified: 2 years ago
Windows Security - Basics @en:windows:security
1 Hits, Last modified: 2 years ago
XP takes a very long time to shut down @en:archiv:windows:performance
1 Hits, Last modified: 2 years ago
Event log cannot be opened @en:archiv:windows:vista
1 Hits, Last modified: 2 years ago