Skip to content

FieldOfRice/DATA

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

35 Commits
 
 
 
 
 
 

Repository files navigation

Notes

Windows

  • To remove files which are "Access denied" use an elevated CMD and type
    sc config TrustedInstaller binPath= "cmd.exe /C del path/to/file"
    sc start TrustedInstaller
    sc config TrustedInstaller binPath= "C:\Windows\servicing\TrustedInstaller.exe"

  • Or with Powershell type
    sc.exe start TrustedInstaller
    $p = Get-NtProcess -Name TrustedInstaller
    $proc = New-Win32Process cmd.exe -CreationFlags NewConsole -ParentProcess $p

  • Interesting Metadata at downloaded files
    cd C:\Users\...\Downloads
    DIR /R
    notepad ...:Zone.Identifier:$DATA
    reveals download URL and Referrer URL

  • To access all files of the WSL2 filesystem from W11 use Explorer e.g. \\wsl$\Ubuntu-20.04\ or wsl.localhost\Ubuntu-20.04\

  • list proxies: netsh interface portproxy show all

  • Add the openSSH Feature

  • tunnel using rdp A: ssh -L 10000:localhost:3389 username@192.168.16.8 # login with username and password and keep shell open (do NOT use keys, use your brain)

  • tunnel using rdp B: mstsc /v:localhost:10000 # initiate the rdp session to the rdp server running at the remote(rdp server listens on localhost only)

  • admin Powershell: (Get-MpPreference).ExclusionPath

  • user Powershell: & 'C:\Program Files\Windows Defender\MpCmdRun.exe' -Scan -ScanType 3 -File "C:<path to check>|*" # would print "Scanning … was skipped"

Linux

mount iso
sudo mount -o loop /path/filename.iso /mnt; ls -alL /mnt
Luks related commands
# create
dd if=/dev/urandom of=special.img bs=1M count=1024
cryptsetup --verify-passphrase luksFormat special.img
sudo cryptsetup open --type luks special.img myspecial
ls /dev/mapper/myspecial
sudo mkfs.ext4 -L myspecial /dev/mapper/myspecial
sudo cryptsetup close myspecial
sudo mkdir /myspecial
sudo chmod a+rwx /myspecial
# open
sudo cryptsetup open --type luks special.img myspecial
ls /dev/mapper/myspecial
sudo mount /dev/mapper/myspecial /myspecial
ls -alL /myspecial/
# close (don't forget it...)
sudo umount /myspecial
sudo cryptsetup close myspecial

debian 12 bookworm unable to install openssh-server, needed commands are:

mv -i /var/lib/apt/lists/deb.debian.org_debian_dists_bookworm_InRelease /root/
apt-get update
apt-get install openssh-server

Abbreviations

Abbr Description URLs
AAA Authentication, Authorization, and Accounting
ADS Alternate Data Streams (DIR /R)
AES Advanced Encryption Standard
AI Artificial Intelligence
AMOLED Active Matrix Organic LED
API Application Programming Interface
APK Android Package
AR Augmented Reality
ARP Address Resolution Protocol (IPv4) https://en.wikipedia.org/wiki/Address_Resolution_Protocol
ASM Attack Surface Management
ATM Automated Teller Machine
ATT&CK Adversarial Tactics, Techniques, and Common Knowledge
AV Antivirus
BASH Bourne Again Shell
BCE Before Common Era (neutral variant of BC/AD)
BFS Breadth First Search (Queue)
BGP Border Gateway Protocol
BU Backup
CA Configuration Assessment, Compliance and Auditing
CAPA Common Analysis Platform for Artifacts
CDI Constrained Data Item
CFG Classifier Free Guidance
CFOR Cross Fork Object Reference
CIA Confidentiality, Integrity and Availability
CIS Center for Internet Security https://de.wikipedia.org/wiki/Center_for_Internet_Security https://www.cisecurity.org/
CISO Chief Information Security Officer
CKPT Checkpoint
CLI Command Line Interface
CNAME Canonical Name Record (see DNS)
CNCF Cloud Native Computing Foundation
CNF Conjunctive Normal Form
CRTP Certified Red Team Professional
CS Cloud Security / Container Security
CSF Cyber Security Framework
CSI Cyber Security Industry, CompuServe Incorporated
CSP Constraint Satisfaction Problem
CTF Capture The Flag
CVE Common Vulnerabilities and Exposures https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures
CVSS Common Vulnerability Scoring System
DAD Disclosure, Alteration, and Destruction/Denial
DDD Domain Driven Design
DEFCON Defense Condition https://en.wikipedia.org/wiki/DEFCON https://defcon.org/
DFIR Digital Forensics and Incident Response
DFS Depth First Search (Stack)
DHCP Dynamic Host Configuration Protocol (Port Server 67, Client 68)
DID Defense In Depth
DLNA Digital Living Network Alliance
DNS Domain Name System (Port 53)
DOH DNS Over HTTPS
DPA Data Protection Act
DSS Data Security Standard
DTP Desktop Publishing
DVD Digital Video Disc
E6 Ethernet Globalization Protocols
EAN Enterprise Area Network
EDGE Enhanced Data Rates For Global Evolution
EDR Endpoint Detection and Response
EIGRP Enhanced Interior Gateway Routing Protocol (CISCO proprietary)
ELK Elasticsearch, Logstash, Kibana
EPP Endpoint protection platforms
ESE DB Extensible Storage Engine Database (Windows, Jet Blue)
ESN Electronic Serial Number
ETL Extract, Transform, Load
EXIF Exchangeable Image File Format
FIM File Integrity Monitoring
FLARE Forensics, Logic Analysis, and Reverse Engineering
FLOSS FLARE Obfuscated String Solver
FOAK First Of A Kind
FP False Positive
FSSAI Food Safety & Standards Authority Of India
FTP File Transfer Protocol (Port 21)
GBFS Greedy Best First Search
GDPR General Data Protection Regulation
GECOS General Electric Comprehensive Operating System
GGP Gateway To Gateway Protocol
GOOGLE Global Organization Of Oriented Group Language Of Earth
GPRS General Packet Radio Service
GPS Global Positioning System
GT Global Titles
HDMI High Definition Multimedia Interface
HIDS Host based Intrusion Detection System
HIPAA Health Insurance Portability and Accountability Act
HITECH Health Information Technology for Economic and Clinical Health
HMAC Keyed-Hash Message Authentication Code
HTTP Hypertext Transfer Protocol (Port 80)
HTTPS HTTP Secure (Port 443)
HS Hotspot
HSDPA High Speed Downlink Packet Access
HSPA High Speed Packet Access
HSUPA High Speed Uplink Packet Access
IaaS Infrastructure as a Service
ICANN Internet Corporation for Assigned Names and Numbers
ICMP Internet Control Message Protocol
ID Intrusion Detection
IDS Intrusion Detection System
IEC International Electrotechnical Commission
IFSC Indian Financial System Code
IGMP Internet Group Management Protocol
IMAP Internet Message Access Protocol (Port 143)
IMEI International Mobile Equipment Identity
IMSI International Mobile Subscriber Identity
IP Internet Protocol
IPS Intrusion Prevention System
IR Incident Response
ISO International Organization for Standardization
ISP Internet Service Provider
IVP Integrity Verification Procedures
JSON Java Script Object Notation
KE Knowledge Engineering
KISS Keep It Simple Stupid
KPI Keep People Interested
KPI Key Performance Indicators
LAN Local Area Network
LCD Liquid Crystal Display
LDA Log Data Analysis
LED Light Emitting Diode
LGTM Looks Good To Me
LLM Large Language Model
LOLBAS Living Off The Land Binaries and Scripts (and Libraries) https://github.com/LOLBAS-Project/LOLBAS/blob/master/README.md
LORA Low Rank Adaptation
MAEC Malware Attribute Enumeration and Characterization
MAN Metropolitan Area Network
MBC Malware Behavior Catalogue
MD Manhattan Distance
MFA Multifactor Authentication
MGMT Management
MIT Mitigation
MOTW Mark Of The Web (M$ Windows)
MTP Media Transfer Protocol
MTTD Mean Time To Detect
MTTR Mean Time To Resolution
NDP Neighbor Discovery Protocol (IPv6)
NDR Network Detection Response
NF Normalized Float
NFC Near Field Communication
NIDS Network Intrusion Detection System
NIST US National Institute of Standards and Technology https://en.wikipedia.org/wiki/National_Institute_of_Standards_and_Technology
NMOT Nominal Module Operating Temperature
NNTP Network News Transfer Protocol
NOCT Normal Operating Cell Temperature
NP Non-deterministic Polynomial Time
NTP Network Time Protocol
NX Non Exeutable
OLE Object Linking and Embedding
OLED Organic Light Emitting Diode
OOP Object Oriented Programming
OOTB Out Of The Box
OS Operating System
OSI Open Systems Interconnection
OSPF Open Shortest Path First
OSSEC Open Source HIDS Security https://en.wikipedia.org/wiki/OSSEC https://www.ossec.net/
OTG On The Go
PAN Personal Area Network
PAN Permanent Account Number
PCI Payment Card Industry
PDF Portable Document Format
PE Portable Executable
PK Passkeys
PKI Public Key Infrastruture
POC Proof Of Concept
POI Point Of Interest
POLAN Passive Optical Local Area Network
POLP Principle Of Least Privilege
POP3 Post Office Protocol (Port 110)
PPA Post Privacy Age
PPI Pixels Per Inch
PPP Point To Point Protocol https://en.wikipedia.org/wiki/Point-to-Point_Protocol
PSWA PowerShell Web Access
PTR Pointer Resource Record (see DNS)
QOTD Quote of The Day (Port 17) https://en.wikipedia.org/wiki/QOTD
QVGA Quarter VGA
RA Risk Analysis
RAG Retrieval Augmented Generation
RAM Random Access Memory
RARP Reverse ARP https://en.wikipedia.org/wiki/Reverse_Address_Resolution_Protocol
RAT Remote Access Trojan
RC Regulatory Compliance
RCE Remote Code Execution
RDP Remote Desktop Protocol (Port 3389)
RIP Routing Information Protocol
ROM Read Only Memory
RSA Rivest–Shamir–Adleman
SAN Storage/System Area Network
SCA Security Configuration Assessment
SEM Security Event Management
SFTP Secure file Transfer Protocol
SIEM Security Information and Event Management aka SEM + SIM https://en.wikipedia.org/wiki/Security_information_and_event_management
SIM Security Information Management
SIM Subscriber Identity Module
SLCD Super Liquid Crystal Display
SMB Server Message Block
SMTP Simple Mail Transfer Protocol (Port 25)
SNS Social Network Service
SOA Start Of Authority
SOAR Security Orchestration, Automation and Response
SOC Security Operations Center
SPI Serial Peripherial Interface
SPOC Single Point Of Control
SPOF Single Point Of Failure
SS7 Signaling System No. 7
SSH Secure Shell (Port 22)
SSL Secure Socket Layer
STC Standard Test Conditions
SWIFT Society For Worldwide Interbank Financial Telecommunication
TCP Transmission Control Protocol
TELNET Teletype Network (Port 23) https://en.wikipedia.org/wiki/Telnet
TI Threat Intelligence
TP Transformation Procedures
TLS Transport Layer Security https://en.wikipedia.org/wiki/Transport_Layer_Security
UAC User Account Control
UDI Unconstrained Data Item
UDP User Datagram Protocol
UMTS Universal Mobile Telecommunications System
UPS Uninterruptible Power Supply
URI Uniform Resource Identifier
URL Uniform Resource Locator
URN Uniform Resource Name
USB Universal Serial Bus
USO Update Session Orchestrator
UTC Coordinated Universal Time https://en.wikipedia.org/wiki/Coordinated_Universal_Time
VAS Vulnerability Assessment System
VD Vulnerability Detection
VGA Video Graphics Array/Adapter
VM Vulnerability Management
VPN Virtual Private Network
VR Virtual Relity
WAN Wide Area Network
WIFI Wireless Fidelity
WLAN Wireless Local Area Network
WVGA Wide VGA
WXGA Widescreen Extended Graphics Array
XDR Extended Detection and Response System
YAHOO Yet Another Hierarchical Officious Oracle https://en.wikipedia.org/wiki/Yahoo!

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages