Posts filed under Bind shell

EMETv4 – Part 2

[begin of phase 2] Take a look at the [phase 1] I continue my tests about EMETv4. This time I’ve installed EMETv4 on the same machine HP-CLI01 and HP-SRV01 (note that framework 4 is required ). The only configuration I set is the “recommended” one. Test4 Target: Windows Server 2003 SP2 eng; Host Name: HP-SRV01;… (read more)

EMETv4 – Part 1

The theory Microsoft has relased the full edition of the free software EMETv4 “Enhanced Mitigation Experience Toolkit”. The Company puts together some tecnologies such ASLR and DEP to mitigate the risk of system hacking; first of all the “Zero day” attacks. This, thanks to DEP and ASLR, will not only patch Microsoft software, but all… (read more)

Some tricks using Netcat

If you are here, I suppose you know that Netcat (NC) is an utility which reads and writes data across network connections, using TCP or UDP transport. Nothing more, nothing less. Let’s see some exemples of use. First of all let’s read the help output: C:\>nc.exe -h [v1.11 NT www.vulnwatch.org/netcat/] connect to somewhere:   nc… (read more)

Create a domain user admin through an exploited PC

The server and pc hardening is the process of securing a system, limiting the surface that can be attacked. One of its role is to limitate the use of amministrative right. Nowadays users have to use an unprivileged accounts, also sysadmins have to remind this role when configuring service and scripts. Sometimes, to let centralized… (read more)