Suche
Unten sind die Ergebnisse Ihrer Suche gelistet.
Volltextergebnisse:
- n8n Installation mit Docker Compose @linux
- === 1.1 alte Versionen deinstallieren ==== <code bash> sudo apt-get remove docker docker-engine docker.... 1.2.1 Update apt und HTTPS aktivieren === <code bash> sudo apt-get update sudo apt-get install \ ... === 1.2.2 Docker GPG Key hinzufügen === <code bash> sudo mkdir -m 0755 -p /etc/apt/keyrings curl -fs... cker.gpg </code> === 1.2.3 Repo Setup === <code bash> echo \ "deb [arch=$(dpkg --print-architecture)
- n8n installation with Docker Compose @en:linux
- ==== ==== 1.1 Uninstall old versions ==== <code bash> sudo apt-get remove docker docker-engine docker.... == 1.2.1 Update apt and activate HTTPS === <code bash> sudo apt-get update sudo apt-get install \ ... /code> === 1.2.2 Add Docker GPG Key === <code bash> sudo mkdir -m 0755 -p /etc/apt/keyrings curl -fs... cker.gpg </code> === 1.2.3 Repo setup === <code bash> echo \ "deb [arch=$(dpkg --print-architecture)
- n8n installation with Docker Compose @en:linux:n8n
- ==== ==== 1.1 Uninstall old versions ==== <code bash> sudo apt-get remove docker docker-engine docker.... == 1.2.1 Update apt and activate HTTPS === <code bash> sudo apt-get update sudo apt-get install \ ... /code> === 1.2.2 Add Docker GPG Key === <code bash> sudo mkdir -m 0755 -p /etc/apt/keyrings curl -fs... cker.gpg </code> === 1.2.3 Repo setup === <code bash> echo \ "deb [arch=$(dpkg --print-architecture)
- Hilfreiche NMAP Scanner Kommandos @it-security
- ommand Set ===== ==== Discover Hosts ==== <code bash> export IPRANGE='172.16.0.0/16' nmap -e tun0 -sn ... $IPRANGE </code> ==== Parse Results ==== <code bash> grep Up pingscan.gnmap | awk '{print$2}' > 172_1... s.txt </code> ==== Discover Services ==== <code bash> nmap -v -sSV -A -O -iL 172_16_ping_ips.txt </code> ==== Discover more Hosts ==== <code bash> nmap -PE -PS80,443,3389 -PP -PU40125,161 -PA21 -
- SCP und SFTP auf DiskStation (110j) @archiv:linux
- j** ===== Paketmanager installieren ===== <code bash> cat /proc/cpuinfo </code> Ausgabe: <code text>... ehle eingeben (Für Marvell Kirkwood CPUs): <code bash> cd /volume1/public wget http://ipkg.nslu2-linux.... al/sbin:/usr/local/bin export PATH </code> <code bash> reboot </code> ===== Pakete verwalten ===== <code bash>ipkg update</code> <code bash>ipkg install zlib</
- Helpful NMAP scanner commands @en:it-security
- ommand Set ===== ==== Discover Hosts ==== <code bash> export IPRANGE='172.16.0.0/16' nmap -e tun0 -sn ... $IPRANGE </code> ==== Parse Results ==== <code bash> grep Up pingscan.gnmap | awk '{print$2}' > 172_1... s.txt </code> ==== Discover Services ==== <code bash> nmap -v -sSV -A -O -iL 172_16_ping_ips.txt </code> ==== Discover more Hosts ==== <code bash> nmap -PE -PS80,443,3389 -PP -PU40125,161 -PA21 -
- Archive unter Linux @linux
- === Archivformat: [[wpde>tar]] Entpacken: <code bash>tar xfv [ARCHIVNAME].tar</code> Packen: <code bash>tar cfv [ARCHIVNAME].tar [VERZEICHNIS1] [VERZEICHNIS2] [DATEI1] [DATEI2]</code> Auflisten: <code bash>tar tfv [ARCHIVNAME].tar</code> ===== Endung: "g... ===== Archivformat: [[wpde>gzip]] Packen: <code bash>tar cfvz [ARCHIV].tar.gz [VERZEICHNIS1] [DATEI1]<
- Archives under Linux @en:linux
- ===== Archive format: [[wp>tar]] Unpack: <code bash>tar xfv [ARCHIVNAME].tar</code> Packing: <code bash>tar cfv [ARCHIVNAME].tar [VERZEICHNIS1] [VERZEICHNIS2] [DATEI1] [DATEI2]</code> List: <code bash>tar tfv [ARCHIVNAME].tar</code> ===== Ending: "g... " ===== Archive format: [[wp>gzip]] Pack: <code bash>tar cfvz [ARCHIV].tar.gz [VERZEICHNIS1] [DATEI1]<
- Debian Distribution Upgrade - Squeeze to Wheezy @en:linux:debian
- . display the current Debian version ===== <code bash> cat /etc/debian_version 6.0.7 </code> ===== 3. update packages ===== <code bash> apt-get update apt-get upgrade apt-get dist-upg... de> ===== 5. run the minimal update ===== <code bash> apt-get update apt-get upgrade </code> ===== 6... nel update ===== List the current kernel: <code bash> dpkg -l | grep linux-image </code> Sample outp
- Update UnrealIRCD @linux
- .0) ===== GPG Schlüssel importieren ===== <code bash> wget -O- https://raw.githubusercontent.com/unrea... .x ersetzt (z.B. unrealircd-6.1.0.tar.gz). <code bash> wget https://www.unrealircd.org/downloads/unreal... .gz </code> ===== Integrität prüfen ===== <code bash> wget https://www.unrealircd.org/downloads/unreal... acken ===== Nun entpacken wir das Archiv. <code bash> tar xfvz unrealx.x.x.tar.gz </code> ===== Alten
- Update UnrealIRCD @en:linux
- ion 6.1.0) ===== Importing GPG keys ===== <code bash> wget -O- https://raw.githubusercontent.com/unrea... d of x.x.x (e.g. unrealircd-6.1.0.tar.gz). <code bash> wget https://www.unrealircd.org/downloads/unreal... ar.gz </code> ===== Check integrity ===== <code bash> wget https://www.unrealircd.org/downloads/unreal... archive ===== Now we unpack the archive. <code bash> tar xfvz unrealx.x.x.tar.gz </code> ===== Stop
- Buffer Overflow im 64-Bit Stack - Teil 1 @it-security:blog
- ithub.com/longld/peda/blob/master/README)) <code bash> git clone https://github.com/longld/peda.git ~/p... peicherbereiche nicht randomisiert werden. <code bash> echo 0 | sudo tee /proc/sys/kernel/randomize_va_... urn 0; } </code> \\ \\ === Kompilieren === <code bash> gcc -fno-stack-protector -z execstack bof.c -o b... enerieren einen 200 Zeichen langen String: <code bash> gdb -q vulnerable pattern_create 200 in.bin r <
- Buffer overflow in the 64-bit stack - part 1 @en:it-security:blog
- ithub.com/longld/peda/blob/master/README)) <code bash> git clone https://github.com/longld/peda.git ~/p... d so that memory areas are not randomised. <code bash> echo 0 | sudo tee /proc/sys/kernel/randomize_va_... return 0; } </code> \\ \\ === Compile === <code bash> gcc -fno-stack-protector -z execstack bof.c -o b... ugger and generate a 200-character string: <code bash> gdb -q vulnerable pattern_create 200 in.bin r <
- MySQL Backup unter Linux @linux
- men wir folgendes zur Benutzung angezeigt: <code bash> $ mysqldump Usage: mysqldump [OPTIONS] database ... options, use mysqldump --help </code> Mit <code bash>$ mysqldump --help</code> werden alle zur Verfüg... hern benutzen wir einfach folgende Syntax: <code bash>$ mysqldump -u USER -p database USERDATABASE > us... ioniert wie die bereits oben beschriebene: <code bash>$ mysqldump -u USER -p --all-databases > full_db.
- Buffer Overflow im 64-Bit Stack - Teil 2 @it-security:blog
- ompilierte Binary]] aus dem Blog debuggen. <code bash> br *vuln+73 # setze Breakpoint r < in.txt... w_x64|Teil 1]], benötigen wir noch ropper. <code bash> sudo apt install ropper </code> \\ \\ ===== ASLR... as base address as in the examples above. <code bash> gcc -fno-stack-protector -no-pie bof-part2.c -o ... ropper und lassen uns die Gadgets anzeigen <code bash> ropper --file bof-part2 ... 0x000000000040116a: