NoSociety.de

#nosoc

  • Seiten-Werkzeuge
    Seite anzeigenÄltere VersionenLinks hierher
  • Webseiten-Werkzeuge
    Letzte ÄnderungenMedien-ManagerÜbersicht
  • Benutzer-Werkzeuge
    Anmelden

Suche

Unten sind die Ergebnisse Ihrer Suche gelistet.

Enthält
  • Genaue Treffer
  • Beginnt mit
  • Endet mit
  • Enthält
@en
  • Alle Namensräume
  • en:it-security (13)
  • en:linux (2)
  • en:user (1)
  • en:windows (1)
letztes Jahr
  • Jederzeit
  • Letzte Woche
  • Letzter Monat
  • letztes Jahr
Sortiere nach Treffer
  • Sortiere nach Treffer
  • Sortiere nach letzter Änderung

Volltextergebnisse:

Shellcode Injection Part 4 @en:it-security:blog
15 Treffer, Zuletzt geändert: vor 10 Monaten
e which I was happy to use as a reference. habe.((https://help.x64dbg.com/en/latest/commands/index.html ... Helpful tools ==== * Microsoft Visual Studio((https://visualstudio.microsoft.com/de/downloads/)) * x64dbg((https://x64dbg.com/)) * PEView((http://wjradburn.com/software/)) * ShenCode((https://github.com/psycore8
Buffer overflow in the 64-bit stack - Part 2 @en:it-security:blog
13 Treffer, Zuletzt geändert: vor 10 Monaten
is by passing the command to be executed to the [[https://de.wikipedia.org/wiki/C-Standard-Bibliothek|li... tutorial is fundamentally based on the work of [[https://blog.techorganic.com|superkojiman]] ((https://blog.techorganic.com/2015/04/21/64-bit-linux-stack-sma... can be found in the link collection at the end. ((https://book.hacktricks.xyz/reversing-and-exploiting/l
Buffer overflow in the 64-bit stack - part 1 @en:it-security:blog
8 Treffer, Zuletzt geändert: vor 11 Monaten
low on the 64-bit stack to gain root privileges.((https://www.ired.team/offensive-security/code-injectio... n buffer overflows, stack etc. can be found here((https://medium.com/@buff3r/basic-buffer-overflow-on-64... e debugger GDB with helpful commands to exploit.((https://github.com/longld/peda/blob/master/README)) <code bash> git clone https://github.com/longld/peda.git ~/peda echo "source
Buffer overflow in the 64-bit stack - Part 3 @en:it-security:blog
7 Treffer, Zuletzt geändert: vor 10 Monaten
is restarted. Superkojiman describes in detail [[https://blog.techorganic.com|in his Blog]] how to circ... t in the GOT. We can now utilise this principle.((https://ir0nstone.gitbook.io/notes/types/stack/aslr/pl... ster/binaries/linux/x86_64/socat]] * pwntools ((https://docs.pwntools.com/en/stable/install.html)) <c... in/part-3|Github]]. <file c bof-part3.c> /* Code https://blog.techorganic.com/2016/03/18/64-bit-linux-s
Shellcode Injection Part 1 @en:it-security:blog
6 Treffer, Zuletzt geändert: vor 11 Monaten
the shellcode. We do this with the tool jigsaw ((https://github.com/RedSiege/Jigsaw)) tool and the Obfy... e binary file look different with each process. ((https://0xpat.github.io/Malware_development_part_6/))((https://www.fo-sec.com/articles/10-defender-bypass-methods#3)) To do this, we download [[https://github.com/fritzone/obfy|Obfy]] to include the
Shellcode Injection Part 2 @en:it-security:blog
5 Treffer, Zuletzt geändert: vor 11 Monaten
rt 1. You can download the source code from the [[https://github.com/psycore8/nosoc-shellcode|Github rep... 33). For this we use a python script, which is [[https://www.bordergate.co.uk/function-name-hashing/|in... \\ \\ ==== Jigsaw ==== In part 1 I have Jigsaw ((https://github.com/RedSiege/Jigsaw )) to disguise the ... ==== Obfy ==== Jigsaw in connection with Obfy ((https://github.com/fritzone/obfy )) was an immediate s
$whoami @en:user
4 Treffer, Zuletzt geändert: vor 11 Monaten
avelling, Music, Developing, Boxing * **TV**: [[https://www.themoviedb.org/list/7062465|Serienliste @t... liste|Series hit list]] ===== $social ===== | {{https://bsky.app/static/favicon-32x32.png}} bluesky.com | [[https://bsky.app/profile/psycore8.bsky.social|psycore8]] | | {{https://github.githubassets.com/favicons/favicon.png|}
64-Bit Stack CheatSheet @en:it-security
3 Treffer, Zuletzt geändert: vor 10 Monaten
==== The x64 register is structured as follows ((https://learn.microsoft.com/de-de/windows-hardware/drivers/debugger/x64-architecture)) ((https://www.complang.tuwien.ac.at/ubvl/amd64/amd64h.ht... s. More on this can be found in the Cheat-Sheet((https://cs.brown.edu/courses/cs033/docs/guides/x64_che
Obfuscation: ByteSwapping @en:it-security:blog
3 Treffer, Zuletzt geändert: vor 7 Monaten
y2.asm -o poly.o </code> I do the cleanup with [[https://github.com/psycore8/shencode|ShenCode]]: <cod... nd the complete shellcode here: * Shellcode: [[https://github.com/psycore8/Shellcodes/blob/main/SwapBytes/poly2.asm|poly2.asm]] * [[https://github.com/psycore8/shencode|ShenCode]] ----
Obfuscation: polymorphic in-memory decoder @en:it-security:blog
3 Treffer, Zuletzt geändert: vor 9 Monaten
ecoder ===== I have taken the XOR decoder from [[https://www.doyler.net/security-not-included/shellcode... n the decoder. I use my ShellCode tool for this [[https://github.com/psycore8/shencode|ShenCode]]: <cod... I have integrated the XOR stub as a template in [[https://github.com/psycore8/shencode|ShenCode]] as a t
Tools @en:it-security:blog
3 Treffer, Zuletzt geändert: vor 2 Tagen
ый результат дадут свежие базы для xrumer <a href=https://www.olx.ua/d/uk/obyavlenie/progon-hrumerom-dr-... 50-po-ahrefs-uvelichu-reyting-domena-IDXnHrG.html>https://www.olx.ua/d/uk/obyavlenie/progon-hrumerom-dr-... ===== The encoder is part of my shellcode tool [[https://github.com/psycore8/shencode|ShenCode]], which
Linux Commands Cheatsheet @en:linux
2 Treffer, Zuletzt geändert: vor 11 Monaten
width | | sh blubb.sh | sh file executen | | wget http://www.psoft.net/shiv/HS/u-web-my4.tgz | gets file... ge system time ===== Set the time under Linux. ((https://wiki.ubuntuusers.de/Systemzeit/)) ==== show t
Host Discovery with Metasploit database @en:it-security
1 Treffer, Zuletzt geändert: vor 11 Monaten
-sP 192.168.2.0/24 [*] Nmap: Starting Nmap 7.93 ( https://nmap.org ) at 2022-12-29 21:57 Mitteleurop�isc
Backing up the sshd @en:linux
1 Treffer, Zuletzt geändert: vor 7 Monaten
== 2.0 Putty Private Key ===== Now we download [[http://www.chiark.greenend.org.uk/~sgtatham/putty/down
Reset the registry at an earlier point in time @en:windows
1 Treffer, Zuletzt geändert: vor 10 Monaten
oot CD ===== First of all, you need a boot CD. [[http://www.ubcd4win.com/|UBCD4win]] is suitable for th
The importance of awareness in IT security @en:it-security:blog
1 Treffer, Zuletzt geändert: vor 11 Monaten
Privilege escalation: Windows admin thanks to Linux @en:it-security:blog
1 Treffer, Zuletzt geändert: vor 10 Monaten