OffSec PG - BBS Cute, Born2Root, Cybersploit1, Deception
BBS Cute Enumeration Machine IP → 192.168.192.128 Network Scan Nmap scan → nmap -A -Pn -p- -T4 -o nmap.txt 192.168.192.128 OS Detection → OS: Linux; CPE: cpe:/o:linux:linux_kernel ...
BBS Cute Enumeration Machine IP → 192.168.192.128 Network Scan Nmap scan → nmap -A -Pn -p- -T4 -o nmap.txt 192.168.192.128 OS Detection → OS: Linux; CPE: cpe:/o:linux:linux_kernel ...
Open Source Projects Anatomy of Open Source Projects A typical open source project has the following types of people → Author - The one who creates the project Owner - The one who has admin...
The tasks are based on a web application called ELGG which is open source. It is designed to be like an open source version of Facebook or myspace. The prebuilt vm called seedubuntu is used to host...
Set-UID is an important security mechanism in unix systems. When a Set-UID program is run, the executing program assumes the owner’s privileges irrespective of the user running the program. The tas...
A hash function is said to be secure if it is a one way hash function and is collision resistant. The one way property ensures that given a hash value h, it is computationally infeasible to find an...
A shell is an interface to the operating system’s services. All process are created by fork() and given a new direction by the exec() process. The trace of forks and calls can be seen from the stra...
Stack 0 #include <stdlib.h> #include <unistd.h> #include <stdio.h> int main(int argc, char **argv) { volatile int modified; char buffer[64]; modified = 0; gets(bu...