file

Search

You can find the results of your search below.

Formatting Syntax @en:wiki
23 Hits, Last modified:
s behaviour can be enabled in the [[doku>config]] file. Hint: If DokuWiki is a link, then it's enabled. ... ?php /** * Customization of the english language file * Copy only the strings that needs to be modifie... ats. To mitigate the problem, you can upload your file in different formats for maximum browser compatib... filename as the video and be either a jpg or png file. In the example above a ''video.jpg'' file would
Shellcode Injection Part 1 @en:it-security:blog
10 Hits, Last modified:
should be in C format | | > shell.c | Save to the file shell.c | <code bash> msfvenom -p windows/shell_... tes. We take this from the ''msfvenom'' output. <file cpp local-process-injection.cpp> #include <stdio.... ad, size); ((void(*)())code)(); return(0); } </file> \\ \\ ==== Analyse shellcode ==== After compili... s> python3 jigsaw.py shell.raw </code> and get a file with C++ code. <code c++> unsigned char jigsaw[5
Move swap file under XP @en:archiv:windows:performance
10 Hits, Last modified:
====== Move swap file under XP ====== {{template>vorlagen:tutorialdetails|tutname=Auslagerungsdatei ver... b/307886/de}} ===== Introduction ===== The swap file is the area on the hard disk that is used by Wind... "virtual memory". By default, Windows stores this file on the partition where the Windows system files a... free memory on the boot partition by moving this file to another partition. ===== How to proceed ====
Linux Commands Cheatsheet @en:linux
8 Hits, Last modified:
ete user | | whoami | Output current user | ==== File and directory management ==== ^ Command ^ Commen... u -h * %%|%% sort -hr > /home/user/filelist.txt | File list sorted by size | | echo bla > 1.txt | Create file 1.txt with content bla | | echo blabla >> 1.txt | Append blabla to file 1.txt | | ls | List directory contents | | ls -la
Buffer overflow in the 64-bit stack - Part 3 @en:it-security:blog
8 Hits, Last modified:
h>psycore8/nosoc-bof/tree/main/part-3|Github]]. <file c bof-part3.c> /* Code https://blog.techorganic.c... setbuf(stdout, 0); vuln(); return 0; } </file> \\ \\ ===== Debug ===== {{page>en:vorlagen:att... s write a first exploit to ''write()'' to leak. <file python buf3-stage1.py> #!/usr/bin/env python fro... eaked write address: {}".format(hex(got_leak))) </file> We run the whole thing and get the following ou
Linux backup with tar @en:linux:backup
8 Hits, Last modified:
/do not follow links to other partitions * -f : file/it is a file, in this case a file is created The path to the archive can be absolute (/path/... ) or relative (./pa... ode> ===== md5sum ===== Before you download the file from a web server, for example, you should calcul
Backing up the sshd @en:linux
6 Hits, Last modified:
096 Generating public/private rsa key pair. Enter file in which to save the key (/home/user/.ssh/id_rsa)... <code bash>$ wipe id_rsa Okay to WIPE 1 regular file ? (Yes/No) yes Operation finished. 1 file wiped and 0 special files ignored in 0 directories, 0 symlink... Connection / SSH / Auth** and under **private key file for authentication** and enter the path to our pp
Linux backup with rsync @en:linux:backup
5 Hits, Last modified:
===== Info ===== A hard link is a reference to a file. A file can therefore have several names, i.e. it can be addressed under several names. This means that... and the disc space is not further restricted. The file would only be deleted when the last link to the file is deleted. It is therefore also possible to delet
MySQL Operating system error number 13 @en:linux:mysql
5 Hits, Last modified:
50 InnoDB: Operating system error number 13 in a file operation. Feb 23 19:30:50 v21080422 mysqld[22881... Feb 23 19:30:50 v21080422 mysqld[22881]: InnoDB: File name ./ibdata1 Feb 23 19:30:50 v21080422 mysqld[22881]: InnoDB: File operation call: 'open'. Feb 23 19:30:50 v21080422... . ==== Commands for user/group assignment ==== <file bash setuser-mysql.txt> chown -R mysql /var/run/m
ChaosDLL mIRC Script @en:software:chaosdll
5 Hits, Last modified:
--------------------- alias cd.vlc { if (($vlc.file) || ($vlc.count)) { say $myhead ..::VLC Status::.. say 4Gespielte Datei: 09 $+ $vlc.file say 4PlayCount: 09 $+ $vlc.count ;say $... äuft das Programm? } alias cd.vlcd { if (($vlc.file) || ($vlc.count)) { say $myhead ..::VLC Status::.. say 4Gespielte Datei: 09 $+ $vlc.file say 4Im Verzeichnis: 09 $+ $vlc.filedir
Set up iptables @en:linux
4 Hits, Last modified:
bash> iptables -L </code> ===== Save rules to a file ===== <code bash> apt-get update apt-get install... test.rules ^O ^X </code> The iptables.test.rules file can now be edited. ===== Define rules ===== [[... c/network/if-pre-up.d/iptables ^O ^X </code> The file /etc/network/if-pre-up.d/iptables is executed at ... re < /etc/iptables.up.rules </code> Now make the file executable and that's it: <code bash> chmod +x /
Buffer overflow in the 64-bit stack - Part 2 @en:it-security:blog
4 Hits, Last modified:
per and display the gadgets <code bash> ropper --file bof-part2 ... 0x000000000040116a: pop rdi; ret; .... ll need 2 offsets for the exploit. So we load our file into the debugger and start it: <code bash> gdb-... === Now we run our Python exploit and create the file in.txt. <code bash>python2 buffer.py</code> \\ \\ ==== Set authorisations ==== Our file still needs the appropriate root permissions. <c
Set up iptables @en:linux:firewall
4 Hits, Last modified:
bash> iptables -L </code> ===== Save rules to a file ===== <code bash> apt-get update apt-get install... test.rules ^O ^X </code> The iptables.test.rules file can now be edited. ===== Define rules ===== [[l... c/network/if-pre-up.d/iptables ^O ^X </code> The file /etc/network/if-pre-up.d/iptables is executed at ... re < /etc/iptables.up.rules </code> Now make the file executable and that's it: <code bash> chmod +x /
Windows XP Mode for Windows 7 Home @en:archiv:windows:vista
4 Hits, Last modified:
under point 1. In this directory you will find a file with the extension .VHD. If not, set the Explorer so that the file extension is also displayed with the file extensions. Copy or move this VHD file to a safe place, in my case I have it under "C:\Windows\XP Mode\
Windows Bluescreen Analysis @en:windows
3 Hits, Last modified:
tallation, we open the debugger and first go to **File / Symbol File Paths** Here we enter the following: <code text> SRV*c:\symbols*http://msdl.microsoft.c... or messages. Now we can open the crash dump via **File / Open Crash dump** to load the error report. Thi
Windows Security - Basics @en:windows:security
3 Hits, Last modified:
IRC Operator commands @en:irc
2 Hits, Last modified:
Update UnrealIRCD @en:linux
2 Hits, Last modified:
n8n installation with Docker Compose @en:linux
2 Hits, Last modified:
Postfix trivial rewrite problem @en:linux
2 Hits, Last modified:
Postfix Virtual Mailbox Limit @en:linux
2 Hits, Last modified:
DelLastXFiles - delete data chronologically @en:software
2 Hits, Last modified:
Start Registry Editor @en:windows
2 Hits, Last modified:
Execute repair of Windows 10 @en:windows
2 Hits, Last modified:
Password Manager @en:archiv:software
2 Hits, Last modified:
MySQL Backup under Linux @en:linux:mysql
2 Hits, Last modified:
n8n installation with Docker Compose @en:linux:n8n
2 Hits, Last modified:
Execute repair of Windows 10 @en:windows:10
2 Hits, Last modified:
Start Registry Editor @en:windows:essentials
2 Hits, Last modified:
Helpful NMAP scanner commands @en:it-security
1 Hits, Last modified:
Secure passwords @en:it-security
1 Hits, Last modified:
Backup Script Linux @en:linux
1 Hits, Last modified:
Security on the net @en:tut
1 Hits, Last modified:
Courier with TLS connection @en:linux:courier
1 Hits, Last modified:
Debian Fileserver with Samba @en:linux:samba
1 Hits, Last modified:
Password Manager @en:software:passwort_manager
1 Hits, Last modified: