{"id":1066,"date":"2010-02-06T17:42:04","date_gmt":"2010-02-06T16:42:04","guid":{"rendered":"http:\/\/www.mitternachtshacking.de\/blog\/1066-random-stuff-1"},"modified":"2010-02-20T18:10:48","modified_gmt":"2010-02-20T17:10:48","slug":"random-stuff-1","status":"publish","type":"post","link":"https:\/\/www.mitternachtshacking.de\/blog\/1066-random-stuff-1","title":{"rendered":"Random Stuff &#8211; 1"},"content":{"rendered":"<p>Ein paar Sachen die schon seit geraumer Zeit in meiner Inbox vorsichhinschimmeln:<\/p>\n<p><strong>ADS<\/strong><\/p>\n<p>ADS is where some file metadata is stored.\u00c2\u00a0 Yes, it&#8217;s not viewable in Windows Explorer, but if you want more transparency with ADS, you can add ADS to the Properties tabs of the file system and view ADS for every file in the GUI by using StrmExt.dll. See: <a href=\"http:\/\/msdn.microsoft.com\/en-us\/library\/ms810604.aspx\">http:\/\/msdn.microsoft.com\/en-us\/library\/ms810604.aspx<\/a><\/p>\n<p><strong>Shellcode<\/strong><\/p>\n<p>If you are interested in shellcoding then check out <a href=\"http:\/\/www.projectshellcode.com\/\">www.projectshellcode.com<\/a> for heaps of shellcode tutorials, whitepapers, tools and resources.<\/p>\n<p><strong>Metasploit Addon<\/strong><\/p>\n<p>MetaScanner is a script in ruby to scan a host for exploits than are already in metasploit framework. This is not a vulnerability scanner and may report some few false puritives. How many times have you scanned a host using nmap and then tried different exploits from the framework? This tool automates that for you. You can find it on <a href=\"http:\/\/kalgecin.110mb.com\/index.php?id=codes\">http:\/\/kalgecin.110mb.com\/index.php?id=codes<\/a>.<\/p>\n<p><strong>Fuzzer<\/strong><\/p>\n<p>Krakow Labs maintains a current list of security driven fuzzing technologies: <a href=\"http:\/\/www.krakowlabs.com\/lof.html\">http:\/\/www.krakowlabs.com\/lof.html<\/a><\/p>\n<p>Ich denke ich werde in Zukunft \u00f6fter Links mit so einer Kurzbeschreibung f\u00fcr Sachen posten, die bisher unter den Tisch gefallen sind, weil sie eigentlich keinen kompletten Blogeintrag rechtfertigen.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ein paar Sachen die schon seit geraumer Zeit in meiner Inbox vorsichhinschimmeln: ADS ADS is where some file metadata is stored.\u00c2\u00a0 Yes, it&#8217;s not viewable in Windows Explorer, but if you want more transparency with ADS, you can add ADS to the Properties tabs of the file system and view ADS for every file in [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[8,10],"tags":[],"_links":{"self":[{"href":"https:\/\/www.mitternachtshacking.de\/blog\/wp-json\/wp\/v2\/posts\/1066"}],"collection":[{"href":"https:\/\/www.mitternachtshacking.de\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mitternachtshacking.de\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mitternachtshacking.de\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mitternachtshacking.de\/blog\/wp-json\/wp\/v2\/comments?post=1066"}],"version-history":[{"count":0,"href":"https:\/\/www.mitternachtshacking.de\/blog\/wp-json\/wp\/v2\/posts\/1066\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.mitternachtshacking.de\/blog\/wp-json\/wp\/v2\/media?parent=1066"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mitternachtshacking.de\/blog\/wp-json\/wp\/v2\/categories?post=1066"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mitternachtshacking.de\/blog\/wp-json\/wp\/v2\/tags?post=1066"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}