User contributions for NKirnbauer
Jump to navigation
Jump to search
- 14:44, 21 March 2025 diff hist +3 BLE CTF -r hat gefehlt current
- 18:44, 28 February 2025 diff hist +2,609 N Genymotion Setup Example Created page with "== Summary == This documentation explains how to set up a virtual phone using Genymotion for later use in IT security testing, such as attacks and vulnerability analysis. == Description == Genymotion is a versatile Android emulation platform that started as a fast developer-focused emulator and has grown into a cloud and desktop-based "Android as a Service" solution. === Step 1 === First download Genymotion: https://www.genymotion.com/product-desktop/download/ ==..." current
- 18:42, 28 February 2025 diff hist +43 N File:Genymotion10.png == Source == Screenshot Elvis current
- 18:37, 28 February 2025 diff hist +43 N File:Genymotion9.png == Source == Elvis Screenshot current
- 18:36, 28 February 2025 diff hist +43 N File:Genymotion8.png == Source == Elvis Screenshot current
- 18:35, 28 February 2025 diff hist +43 N File:Genymotion7.png == Source == Elvis Screenshot current
- 18:34, 28 February 2025 diff hist +43 N File:Genymotion6.png == Source == Elvis Screenshot current
- 18:07, 28 February 2025 diff hist +43 N File:Genymotion5.png == Source == Elvis Screenshot current
- 18:05, 28 February 2025 diff hist +43 N File:Genymotion4.png == Source == Screenshot Elvis current
- 17:58, 28 February 2025 diff hist +43 N File:Genymotion2.png == Source == Elvis Screenshot current
- 17:58, 28 February 2025 diff hist +43 N File:Genymotion3.png == Source == Elvis Screenshot current
- 12:34, 28 February 2025 diff hist +43 N File:Genymotion1.png == Source == Screenshot Elvis current
- 16:17, 12 February 2025 diff hist +113 N File:MidnightBlizzardOverview.png == Source == https://www.wiz.io/blog/midnight-blizzard-microsoft-breach-analysis-and-best-practices current
- 16:15, 12 February 2025 diff hist +5,106 N Midnight Blizzard Attack on Microsoft Created page with "== Summary == This documentation is about who Midnight Blizzard is and with which steps they were able to successfully attack Microsoft. == Who is Midnight Blizzard? == Midnight Blizzard is known under many different names, including Nobelium, APT29 and Cozy Bear. It is a state-sponsored Russian threat hacker group that emerged in the 2010s, where they often engaged in campaigns targeting diplomatic and political intelligence collection. The group was involved in ma..." current
- 14:28, 11 February 2025 diff hist +1 SambaCry →Mitagtion current
- 14:27, 11 February 2025 diff hist +106 SambaCry →Mitagtion
- 14:22, 11 February 2025 diff hist −3,989 SambaCry
- 14:21, 11 February 2025 diff hist +8,147 N SambaCry Created page with "== Summary == SambaCry is a vulnerability that is also known as CVE-2017-7494 and was discovered in the Samba Software in 2017. It allows a remote attacker to execute arbitrary code on a vulnerable server. This works because a malicious client can upload a shared library to a writable share, and then cause the server to load and execute it. == What is Samba? == Samba is an open-source implementation of the SMB/CIFS protocol, allowing file and print sharing between..."
- 17:39, 19 December 2024 diff hist +47 N File:Samba7.png == Source == Screenshot Elvis Lab current
- 17:37, 19 December 2024 diff hist +47 N File:Samba6.png == Source == Screenshot Elvis Lab current
- 17:34, 19 December 2024 diff hist +47 N File:Samba5.png == Source == Screenshot Elvis Lab current
- 17:25, 19 December 2024 diff hist +47 N File:Samba4.png == Source == Screenshot Elvis Lab current
- 17:16, 19 December 2024 diff hist +47 N File:Samba3.png == Source == Screenshot Elvis Lab current
- 17:14, 19 December 2024 diff hist +33 File:Samba2.png current
- 17:14, 19 December 2024 diff hist 0 N File:Samba2.png
- 16:19, 19 December 2024 diff hist +47 N File:Samba1.png == Source == Screenshot Elvis Lab current
- 02:05, 7 December 2024 diff hist +3,054 N Website Spoofing: Using Setoolkit Created page with "== Summary == Website Spoffing is when a legitimate website is replicated to trick user into thinking it’s the real one. When they then enter for example their username and password or other sensitive information, the hacker obtains this information and can use it in their favor. == URL Spoofing == A website’s URL gets altered, typically in a way that the user doesn’t immediately notice. There are several common methods for this: === Homograph Attack or IDN..." current
- 01:50, 7 December 2024 diff hist +47 N File:Setoolkit9.png == Source == Screenshot Elvis Lab current
- 01:49, 7 December 2024 diff hist +47 N File:Setoolkit8.png == Source == Screenshot Elvis Lab current
- 01:49, 7 December 2024 diff hist +47 N File:Setoolkit7.png == Source == Screenshot Elvis Lab current
- 01:42, 7 December 2024 diff hist +47 N File:Setoolkit6.png == Source == Screenshot Elvis Lab current
- 01:41, 7 December 2024 diff hist +47 N File:Setoolkit5.png == Source == Screenshot Elvis Lab current
- 01:40, 7 December 2024 diff hist +47 N File:Setoolkit4.png == Source == Screenshot Elvis Lab current
- 01:37, 7 December 2024 diff hist 0 File:Setoolkit3.png NKirnbauer uploaded File:Setoolkit3.png current
- 01:36, 7 December 2024 diff hist +37 N File:Setoolkit3.png NKirnbauer moved page File:Setoolkit3.png to File:Setoolkit3 old.png Tag: New redirect
- 01:36, 7 December 2024 diff hist 0 m File:Setoolkit3 old.png NKirnbauer moved page File:Setoolkit3.png to File:Setoolkit3 old.png current
- 01:33, 7 December 2024 diff hist 0 File:Setoolkit3 old.png NKirnbauer uploaded a new version of File:Setoolkit3.png
- 01:18, 7 December 2024 diff hist +47 N File:Setoolkit3 old.png == Source == Screenshot Elvis Lab
- 01:15, 7 December 2024 diff hist +47 N File:Setoolkit2.png == Source == Screenshot Elvis Lab current
- 00:52, 7 December 2024 diff hist +47 N File:Setoolkit1.png == Source == Screenshot Elvis Lab current
- 18:10, 6 December 2024 diff hist +1 Sherlock: An OSINT Tool →Functionallity current
- 18:10, 6 December 2024 diff hist +1 Sherlock: An OSINT Tool →Usage
- 18:10, 6 December 2024 diff hist 0 Sherlock: An OSINT Tool →Installation
- 18:09, 6 December 2024 diff hist −2 Sherlock: An OSINT Tool →Installation
- 18:09, 6 December 2024 diff hist +1,717 N Sherlock: An OSINT Tool Created page with "== Summary == Sherlock is a well-known tool for OSINT (Open-Source Intelligence). You can use this tool to find users across different social media platforms based on their username. This article gives you a brief overview of how to use Sherlock and how it works. == Installation == On Kali Linux, enter these commands in the shell to install: sudo apt install sherlock to check installation: sherlock --version == Usage == Search for a user with sherlock: sh..."
- 17:52, 6 December 2024 diff hist +47 N File:Sherlock elvis2.png == Source == Screenshot Elvis Lab current
- 17:51, 6 December 2024 diff hist +47 N File:Sherlock elvis1.png == Source == Screenshot Elvis Lab current
- 17:37, 6 December 2024 diff hist +131 N File:Sherlock instagram entry.png == Source == Screenshot https://github.com/sherlock-project/sherlock/blob/master/sherlock_project/resources/data.json current
- 00:36, 23 November 2024 diff hist +43 m Throwing Star LAN Tap expired link changed with link from wayback machine current
- 23:26, 22 November 2024 diff hist −64 m IP Cameras Pentesting Report fixed link current