Today we are going to solve a problem which has been given to me by my colleague. The wanted to build a infrastructure where every user can register through a portal and upload their public key. When the user tries to login to the system, OpenSSH server will execute a python script (planning to upgrade it to rust) and generate appropriate string so that that specific user can access his / her own LinuX Container (LXC).
A good shell environment is quite important for completing various tasks. In Linux most of the advanced commands, scripts are done in a shell environment. I have searched for a good terminal so that I can perform various activities with ease. After considering various terminals like Terminator, Tmux and others, I have final found the tool I was looking for. Tilix  had most of the features I was looking for like hot key assignment of various commands and it had a very flexible user interface so that I can start with a minimal but make a complex by adding more tabs or splitting the terminals into various window.
There is requirement that we need to perform database analysis on invalid entires into the database. We need to trace or track the entries performed in the database. But to do that we need a proper way to do it. how to test In this guide we will make a test database in called Tweety in Microsoft SQL Server 2017 and connect to it using Microsoft SQL Server Management Studio.
In this tutorial we will go through the very easy to exploit Follina (CVE-2022-30190) which can be used to perform command execution. This is a easy to build exploit as command can be executed on the remote system witout any promot. As this exploit does not require any macro for exploit, and the complexity of the development is easy, attackers can easily use this to enter enterprise network via email and opening the file using Microsoft Office.
In this guide we will try to explore if we can check for any mnemonics which we don’t want the CPU to execute. In the below example, we will try to block some specific commands from being executed in the CPU. The challenge is to convert rawbytes to assembly language again and check for prohibited mnemonics. code # prohibit command # the objective is to block certain commands from qiling import Qiling from qiling.
In this segment we will take a sample code from the how to and try to execute according to our own. In this test, we will try to perform an simple addition and see how it goes. The below tutorial will be a very basic entry into the qiling framework where we will perform a simple addition. addition To perform the addition, following code will be executed onto the CPU.
In this part, we will try to push a value on to the stack and will try to read it. We will assembly code mov eax, 0xdead mov ebx, 0xbeef push eax push ebx We get the below raw bytes (there are various websites from which you can do this, if you do not know how to generate the raw bytes.): B8ADDE0000BBEFBE00005053 Now we will try to execute the code below and try to read the values found in the register: