Suche
Unten sind die Ergebnisse Ihrer Suche gelistet.
Volltextergebnisse:
- Buffer overflow in the 64-bit stack - Part 3 @en:it-security:blog
- we used the string ''/bin/zsh'' to the function ''System()'' function to open a root shell. To do this, ho... gramme, but can simply access the function of the system, which, for example, is stored in ''libc'' for ex... GOT, we overwrite an address with the one from ''system()''so that we can issue a system command when calling the function <code gdb> [-------------------------
- Buffer overflow in the 64-bit stack - Part 2 @en:it-security:blog
- .org/wiki/C-Standard-Bibliothek|libc-Funktion]] ''system()'' is forwarded. This tutorial is fundamentally ... AA') RSP: 0x7...fdde0 --> 0x7ffff7e17920 (<__libc_system>: test rdi,rdi) # system("/bin/sh") RIP: 0x400469 (<_init+25>: ret) </code> \\ \\ ===== Dependenci... it: <code bash> gdb-peda$ start ... gdb-peda$ p system $1 = {int (const char *)} 0x7ffff7e17920 <__libc_
- Windows restore points @en:windows
- ====== Windows restore points ====== ===== Open System Restore ===== Go to the settings and search for ... You will be taken to the relevant section of the system properties where you can create and activate rest... t ==== To return to a previous point, click on ''System Restore'' and then click on ''next''. Then select
- Privilege escalation: Windows admin thanks to Linux @en:it-security:blog
- de>Security_Accounts_Manager]] using a live Linux system. \\ \\ ===== Initial situation ===== On a Windows system, the users ''users'' and ''sysadmin'' are created... the SAM directory. <code bash> cd ~/win/Windows/System32/config </code> \\ \\ ===== Manipulation of the