NoSociety.de

#nosoc

  • Page Tools
    Show pageOld revisionsBacklinks
  • Site Tools
    Recent ChangesMedia ManagerSitemap
  • User Tools
    Log In

Search

You can find the results of your search below.

Exact match
  • Exact match
  • Starts with
  • Ends with
  • Contains
@en:it-security
  • Any namespace
  • en:it-security:blog (5)
Any time
  • Any time
  • Past week
  • Past month
  • Past year
Sort by hits
  • Sort by hits
  • Sort by last modified

Fulltext results:

Privilege escalation: Windows admin thanks to Linux @en:it-security:blog
19 Hits, Last modified: 10 months ago
activate an admin account - upgrading a simple user to the administrator group We will do this by ma... e users ''users'' and ''sysadmin'' are created. ''User'' has no administrator rights, is password-protec... -14_150458.png|}} \\ \\ We now want to create the user ''sysadmin'' user and reset the password. * Select sysadmin user (03ea) In the next dialogue we see
Group Managed Service Accounts
3 Hits, Last modified: 17 months ago
ces ===== Services can now be provided with this user. To do this, simply open the service console and ... rShell credential request Enter your credentials. User: DOMAIN\PSY Password for user DOMAIN\PSY: ***************** PS C:\Users\PSY> Set-Service -name "Servic
Host Discovery with Metasploit database
3 Hits, Last modified: 10 months ago
se ===== Create PostgreSQL database and set up a user with access rights for it. <code bash> root@kali:~# msfdb init Creating database user 'msf' Enter password for new role: Enter it again... ect database ===== <code ruby> msf6 > db_connect user:pass@127.0.0.1/db_name </code> ==== Check connec
Buffer overflow in the 64-bit stack - Part 2 @en:it-security:blog
2 Hits, Last modified: 10 months ago
portant that the ''no-pie'' parameter is set. The user provides an explanation [[https://disqus.com/by/b... bof-dism2-1.png|Upgrade the shell to root}}] Our user shell is upgraded to the root shell and we have a
FatCat Attack PoC @en:it-security:blog
2 Hits, Last modified: 17 months ago
tion. The following data is to be exfiltrated: ^ User ^ Password ^ Hash ^ | Host \ User | | | | Host \ Admin | | | | Domain \ Admin | | | \\ \\ ===== P
OSI layer cyber attacks
1 Hits, Last modified: 17 months ago
s, automated logout mechanisms, secure tokens for user authentication | | @lightsalmon: [[wp>SYN-Flood|
The importance of awareness in IT security @en:it-security:blog
1 Hits, Last modified: 11 months ago
duction ===== Phrases such as "it was the stupid user's fault" or "end users are just too stupid" are v
Buffer overflow in the 64-bit stack - Part 3 @en:it-security:blog
1 Hits, Last modified: 10 months ago
</code> and then the exploit as an unprivileged user <code bash> ┌──(kali㉿kali)-[~/repo] └─$ python3