Questions about this topic? Sign up to ask in the talk tab.
Search results
From NetSec
- ...September/17/02-03 Log]''' ''Introduction to [[Nmap|network mapping]] Part 1'' - '''[[User:Foo|Foo]]''' ...eptember/25/00-02 Log] ''Advanced [[SQL injection]] [[exploitation]] (Part 1)'' - '''[[User:Hatter|hatter]]'''4 KB (523 words) - 11:13, 17 July 2016
- string variable sys.argv[1]10 KB (1,462 words) - 03:56, 18 September 2012
- http://whois.arin.net/rest/net/NET-206-71-119-0-1.html 02:32 <~hatter> +114 KB (2,287 words) - 03:56, 18 September 2012
- 03:10 <@rorschach> it looks like me -> vps 1 -> tor -> -> vps 2 -> tor -> world 03:11 <@rorschach> so, I ssh into vps 116 KB (2,344 words) - 03:55, 18 September 2012
- 00:09:20 <hatter> suppose our url is /article.php?id=1 00:11:58 <hatter> /article.php?id=-113 KB (1,900 words) - 03:55, 18 September 2012
- ...our main() function two values, string literal "Hello there" and sys.argv[1] (which is the first command line parameter.) 01:54:27 <zzzzzZZZZzzz> print main( "Hello there", sys.argv[1] )9 KB (1,219 words) - 04:20, 18 September 2012
- 02:22:18 <foo> nmap -vv -sS -e lo 127.0.0.1 02:22:23 <foo> Scanning localhost.localdomain (127.0.0.1) [1000 ports]12 KB (1,590 words) - 01:52, 20 September 2012
- 20:10 <@pseudo> likewise, setenforce 1 will enable it ...7fff28cbf5b0 a3=7fff28cbf000 items=0 ppid=702 pid=1558 auid=1030 uid=0 gid=1 030 euid=0 suid=0 fsuid=0 egid=1030 sgid=1030 fsgid=1030 tty=pts1 ses=2216 KB (2,601 words) - 03:28, 26 September 2012
- <hatter> Query OK, 1 row affected (0.00 sec) <hatter> Query OK, 1 row affected (0.05 sec)16 KB (2,284 words) - 06:59, 25 September 2012
- <m4> i would move the value 1 into eax, since 1=exit <m4> both are 1 byte in size15 KB (2,829 words) - 01:53, 20 September 2012
- cmpb %dil, (%rbx, %rsi, 1) movb (%rbx, %rsi, 1), %r10b36 KB (5,340 words) - 20:07, 25 May 2013
- <hatter> [0x4-0x7] section type - 0 is null, 1 is progbits, 2 is symtab, 3 is strtab7 KB (1,075 words) - 01:53, 20 September 2012
- python sqli-slee.py -u "http://target.com/?id=1%27" -i "select database()" ...Intel Mac OS X 10_7_3) AppleWebKit/534.55.3 (KHTML, like Gecko) Version/5.1.3 Safari/534.53.10' }5 KB (607 words) - 03:57, 21 November 2012
- And [[bit shift|shifted left]] 12 bits (1 shifted left 12 bits will become 0x1000 or binary 00010000 00000000): cmpb %dil, (%rbx, %rsi, 1)9 KB (1,318 words) - 03:18, 25 April 2013
- lea -1(%rip), %rax ; the %rax register now contains the address of `pc'. Breakpoint 1 at 0x4000b16 KB (947 words) - 03:32, 25 April 2013
- ...rray) and may have unpredictable behaviors if an array is passed (e.g. var[1]=foo&var[2]=bar in the url.)}}3 KB (429 words) - 02:43, 13 November 2012
- [0x4-0x7] section type - 0 is null, 1 is progbits, 2 is symtab, 3 is strtab xorl (%rax,%rbx,1), %ecx # %rcx = offset to section headers7 KB (1,026 words) - 03:27, 25 April 2013
- if (index($username, "admin") != -1) ...4 KB (512 words) - 07:28, 6 December 2012
- *1) Android doesn't automatically check an application's file permissions. ...ttack is a vulnerability in an Android application called dSploit (version 1.028b)(This has since been patched), which has all the binaries in /data/dat3 KB (477 words) - 07:25, 15 November 2012
- /articles.php?id=1 ..., for one moment, that there are 255 rows with sequential id's starting at 1 in the articles table. It will rarely ever be this way in the wild.15 KB (2,076 words) - 20:06, 5 May 2013
- ╰─➤ ./pub-sqli-hap.py http://127.0.0.1/sqli.php\?id\= id users [*] Attacking: http://127.0.0.1/sqli.php?id=8 KB (1,182 words) - 06:06, 24 November 2012
- * For testing purposes we've installed MySQL 5.1 locally and created a table called sample: | 5.1.58-log |8 KB (1,245 words) - 18:46, 21 November 2012
- and sleep(ascii(substring(@@database,1,1))) -- MySQL and pg_sleep(ascii(substring(current_database,1,1))) is null -- PostgreSQL3 KB (567 words) - 17:17, 21 November 2012
- # the Free Software Foundation; either version 1, or (at your option) exit(1)18 KB (1,097 words) - 04:40, 20 November 2012
- ...the lines of [integer][equal sign][integer], or that a request with "AND 1=1" had its connection reset, but the page without the injection continues to Instead of comparing a value like "1=1", compare mathematical expressions. Mathematical expressions may be the ke9 KB (1,376 words) - 18:51, 19 November 2012
- * A bit can be 1 or 0 (True or False) 1 row in set (0.00 sec)</source>8 KB (1,138 words) - 19:08, 21 November 2012
- | 1 ! scope="row" | 113 KB (2,041 words) - 01:24, 2 December 2012
- | \x48\x6b\x??\x#2\x#1 ...ing is the ability to use the ins and outs instructions to add or subtract 1,2, or 4 against the %rdi register. This still leaves no significant add or24 KB (3,808 words) - 03:31, 25 April 2013
- @mysql_query("SELECT * FROM user WHERE user_id = " . $id . " LIMIT 1"); ...integer, this statement is still vulnerable, if a user inputs "id=1%20OR1=1", the statement will not be escaped (since there are no quotes) and still1 KB (219 words) - 02:53, 12 May 2013
- [user@localhost shellcode]$ generators/socket-reuse-generator.py 127.0.0.1 1234 The standard loader accepts shellcode as a command line argument (argv[1]) and executes it. This can be combined with the shellcode generator to tes9 KB (1,291 words) - 00:20, 26 May 2013
- movl $1, %eax movl $1, %eax27 KB (4,175 words) - 17:40, 16 May 2013
- @mysql_query("SELECT * FROM user WHERE user_id = " . $id . " LIMIT 1");942 B (135 words) - 02:51, 12 May 2013
- ...ry = "SELECT * FROM user WHERE pwreset_code= '" . $pwresetcode ."' LIMIT 1"; // SELECT * FROM user WHERE pwreset_code='' LIMIT 1;2 KB (218 words) - 02:40, 12 May 2013
- $username = $argv[1]; $username = $username . ":1";1 KB (138 words) - 02:59, 12 May 2013
- {{code|text=<source lang="bash">IGNORECASE=1 find -regextype posix-awk -regex ".*\.(rb|php|pl|py|pm)" -exec grep -HnC2 \435 B (66 words) - 02:56, 12 May 2013
- ...from lax02s01-in-f8.1e100.net (74.125.224.168): icmp_req=1 ttl=51 time=13.1 ms</source>}}2 KB (267 words) - 02:02, 12 May 2013
- group_id int foreign key not null default 1, The target software will automatically put new users in group 1 (non-activated users list) on registration. Perhaps on update it would upd2 KB (254 words) - 02:55, 12 May 2013
- ...ay) and may have unpredictable behaviors if an array is passed (e.g. var[1]=foo&var[2]=bar in the url.) if (index($username, "admin") != -1) ...34 KB (4,531 words) - 11:03, 20 April 2013
- ip addr add 10.0.0.1/24 dev eth1.10 address 10.0.0.11 KB (168 words) - 20:37, 29 October 2016
- Linux hostname 4.0.5-1-ARCH #1 SMP PREEMPT Sat Jun 6 18:37:49 CEST 2015 x86_64 GNU/Linux</pre> This should show you information about the Kernel version being used (4.0.5-1), what date the Kernel was built on (the important part is the year, 2015)2 KB (307 words) - 06:36, 8 July 2015
- | SHA-1||160||Yes||No||Collision are expensive to generate, but a sufficiently moti5 KB (751 words) - 23:37, 26 October 2015