Suche
Unten sind die Ergebnisse Ihrer Suche gelistet.
Passende Seitennamen:
Volltextergebnisse:
- Buffer overflow in the 64-bit stack - Part 3 @en:it-security:blog
- we used the string ''/bin/zsh'' to the function ''System()'' function to open a root shell. To do this, ho... gramme, but can simply access the function of the system, which, for example, is stored in ''libc'' for ex... GOT, we overwrite an address with the one from ''system()''so that we can issue a system command when calling the function <code gdb> [-------------------------
- Buffer overflow in the 64-bit stack - Part 2 @en:it-security:blog
- .org/wiki/C-Standard-Bibliothek|libc-Funktion]] ''system()'' is forwarded. This tutorial is fundamentally ... AA') RSP: 0x7...fdde0 --> 0x7ffff7e17920 (<__libc_system>: test rdi,rdi) # system("/bin/sh") RIP: 0x400469 (<_init+25>: ret) </code> \\ \\ ===== Dependenci... it: <code bash> gdb-peda$ start ... gdb-peda$ p system $1 = {int (const char *)} 0x7ffff7e17920 <__libc_
- Privilege escalation: Windows admin thanks to Linux @en:it-security:blog
- de>Security_Accounts_Manager]] using a live Linux system. \\ \\ ===== Initial situation ===== On a Windows system, the users ''users'' and ''sysadmin'' are created... the SAM directory. <code bash> cd ~/win/Windows/System32/config </code> \\ \\ ===== Manipulation of the
- Windows restore points @en:windows
- ====== Windows restore points ====== ===== Open System Restore ===== Go to the settings and search for ... You will be taken to the relevant section of the system properties where you can create and activate rest... t ==== To return to a previous point, click on ''System Restore'' and then click on ''next''. Then select
- FatCat Attack PoC @en:it-security:blog
- tom-payloads)) | |::: | Enumeration | **Enumerate System Info** JAWS((https://github.com/411Hall/JAWS)), S... etasploit Handler}}] \\ ==== Access to the target system ==== * With the pinball machine, the following script is executed on the target system <code dos> WINDOWS r DELAY 2000 STRING powershel
- Execute repair of Windows 10 @en:windows
- al data or installed programmes, but only repairs system files. However, this method is quite time-consumi
- Disable User Account Control (UAC) completely @en:windows
- oftware\Microsoft\Windows\CurrentVersion\Policies\System - Set the EnableLUA (DWord) entry to 0 - Rest... OFTWARE\Microsoft\Windows\CurrentVersion\Policies\System] "EnableLUA"=dword:00000000 </file> ===== Deacti... ftware\Microsoft\Windows\CurrentVersion\poilicies\system -Name EnableLUA -PropertyType DWord -Value 0 -For
- Start Microsoft configuration tool @en:windows
- g" (without inverted commas) - Press Enter The system configuration should now start. {{windows:msconf
- Update UnrealIRCD @en:linux
- need to install the libmaxminddb library on your system first none: Don't build with any geoip li... sults in a limit of up to 16384, depending on the system. When you boot UnrealIRCd later you will always s
- Set up iptables @en:linux
- /etc/network/if-pre-up.d/iptables is executed at system startup and loads the corresponding firewall rule
- Linux Commands Cheatsheet @en:linux
- -get upgrade | upgrade installed packages | ==== System Management ==== ^ Command ^ Comment ^ | cat /pro... | mount -o remount -rw / | release read-only file system | | ps | process list | | ps -aux | detailed proc
- SMB Hardening @en:it-security
- Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameter
- OSI layer cyber attacks @en:it-security
- fc1: Firewall filtering, [[wp>Intrusion_Detection_System|IDS]], [[wp>Intrusion_Prevention_System|IPS]], prevent IP address spoofing via the router | | @lightsalmo
- Group Managed Service Accounts @en:it-security
- UTERNAME>$ </code> ==== test ==== On the target system: <code powershell> Test-ADServiceAccount <ACCOUN... le reports ''True'' === For errors on the target system === The RSAT tools may need to be activated. Sta... in AD, or as a local administrator on the target system. ===== Services ===== Services can now be provi
- IRC - Internet Relay Chat
- short, is an established, purely text-based chat system. It enables conversations with any number of part