system

Suche

Unten sind die Ergebnisse Ihrer Suche gelistet.

Buffer overflow in the 64-bit stack - Part 3 @en:it-security:blog
28 Treffer, Zuletzt geändert:
we used the string ''/bin/zsh'' to the function ''System()'' function to open a root shell. To do this, ho... gramme, but can simply access the function of the system, which, for example, is stored in ''libc'' for ex... GOT, we overwrite an address with the one from ''system()''so that we can issue a system command when calling the function <code gdb> [-------------------------
Buffer overflow in the 64-bit stack - Part 2 @en:it-security:blog
8 Treffer, Zuletzt geändert:
.org/wiki/C-Standard-Bibliothek|libc-Funktion]] ''system()'' is forwarded. This tutorial is fundamentally ... AA') RSP: 0x7...fdde0 --> 0x7ffff7e17920 (<__libc_system>: test rdi,rdi) # system("/bin/sh") RIP: 0x400469 (<_init+25>: ret) </code> \\ \\ ===== Dependenci... it: <code bash> gdb-peda$ start ... gdb-peda$ p system $1 = {int (const char *)} 0x7ffff7e17920 <__libc_
Privilege escalation: Windows admin thanks to Linux @en:it-security:blog
2 Treffer, Zuletzt geändert:
de>Security_Accounts_Manager]] using a live Linux system. \\ \\ ===== Initial situation ===== On a Windows system, the users ''users'' and ''sysadmin'' are created... the SAM directory. <code bash> cd ~/win/Windows/System32/config </code> \\ \\ ===== Manipulation of the
FatCat Attack PoC @en:it-security:blog
3 Treffer, Zuletzt geändert:
tom-payloads)) | |::: | Enumeration | **Enumerate System Info** JAWS((https://github.com/411Hall/JAWS)), S... etasploit Handler}}] \\ ==== Access to the target system ==== * With the pinball machine, the following script is executed on the target system <code dos> WINDOWS r DELAY 2000 STRING powershel
SMB Hardening
1 Treffer, Zuletzt geändert:
Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameter
OSI layer cyber attacks
2 Treffer, Zuletzt geändert:
fc1: Firewall filtering, [[wp>Intrusion_Detection_System|IDS]], [[wp>Intrusion_Prevention_System|IPS]], prevent IP address spoofing via the router | | @lightsalmo
Group Managed Service Accounts
3 Treffer, Zuletzt geändert:
UTERNAME>$ </code> ==== test ==== On the target system: <code powershell> Test-ADServiceAccount <ACCOUN... le reports ''True'' === For errors on the target system === The RSAT tools may need to be activated. Sta... in AD, or as a local administrator on the target system. ===== Services ===== Services can now be provi