system

Search

You can find the results of your search below.

Buffer overflow in the 64-bit stack - Part 3 @en:it-security:blog
29 Hits, Last modified:
we used the string ''/bin/zsh'' to the function ''System()'' function to open a root shell. To do this, ho... urity:blog:bof-part3-header.jpg?500 |}} In Linux systems, dynamic programme libraries are usually used. T... gramme, but can simply access the function of the system, which, for example, is stored in ''libc'' for ex... GOT, we overwrite an address with the one from ''system()''so that we can issue a system command when cal
Buffer overflow in the 64-bit stack - Part 2 @en:it-security:blog
8 Hits, Last modified:
.org/wiki/C-Standard-Bibliothek|libc-Funktion]] ''system()'' is forwarded. This tutorial is fundamentally ... AA') RSP: 0x7...fdde0 --> 0x7ffff7e17920 (<__libc_system>: test rdi,rdi) # system("/bin/sh") RIP: 0x400469 (<_init+25>: ret) </code> \\ \\ ===== Dependenci... it: <code bash> gdb-peda$ start ... gdb-peda$ p system $1 = {int (const char *)} 0x7ffff7e17920 <__libc_
FatCat Attack PoC @en:it-security:blog
4 Hits, Last modified:
tom-payloads)) | |::: | Enumeration | **Enumerate System Info** JAWS((https://github.com/411Hall/JAWS)), S... etasploit Handler}}] \\ ==== Access to the target system ==== * With the pinball machine, the following script is executed on the target system <code dos> WINDOWS r DELAY 2000 STRING powershel... ablished - Metasploit does it ==== <code dos> getsystem hashdump ls getwd cd c: cd Glob_Share ls backgrou
Group Managed Service Accounts
3 Hits, Last modified:
UTERNAME>$ </code> ==== test ==== On the target system: <code powershell> Test-ADServiceAccount <ACCOUN... le reports ''True'' === For errors on the target system === The RSAT tools may need to be activated. Sta... in AD, or as a local administrator on the target system. ===== Services ===== Services can now be provi
Privilege escalation: Windows admin thanks to Linux @en:it-security:blog
3 Hits, Last modified:
de>Security_Accounts_Manager]] using a live Linux system. \\ \\ ===== Initial situation ===== On a Windows system, the users ''users'' and ''sysadmin'' are created... the SAM directory. <code bash> cd ~/win/Windows/System32/config </code> \\ \\ ===== Manipulation of the
OSI layer cyber attacks
2 Hits, Last modified:
fc1: Firewall filtering, [[wp>Intrusion_Detection_System|IDS]], [[wp>Intrusion_Prevention_System|IPS]], prevent IP address spoofing via the router | | @lightsalmo
Helpful NMAP scanner commands
1 Hits, Last modified:
<code bash> nmap-sn 192.168.0.1/24 </code> ==== Systematic scan ==== <code bash> nmap -e tun0 -PE -sn -
Secure passwords
1 Hits, Last modified:
l hardware - Card-supported password management systems - Password programmes I will go into the passw
SMB Hardening
1 Hits, Last modified:
Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameter
The importance of awareness in IT security @en:it-security:blog
1 Hits, Last modified:
y_Operations_CenterSOC]] | Guidelines, management systems | Awareness | In our case, no emphasis was plac