//CODE:
#include<stdio.h>
#include<string.h>
int main (int argc, char** argv)
GDB commands by function - simple guide | |
--------------------------------------- | |
More important commands have a (*) by them. | |
Startup | |
% gdb -help print startup help, show switches | |
*% gdb object normal debug | |
*% gdb object core core debug (must specify core file) | |
%% gdb object pid attach to running process | |
% gdb use file command to load object |
#!/usr/bin/python3 | |
import subprocess | |
from termcolor import colored | |
def setting_up(): | |
global data | |
# list of commands to list down available SSID names | |
l1 = ['netsh', 'wlan', 'show', 'profiles'] |
got
---> global offset table
virtual address space
(VAS) or address space
---> is the set of ranges of virtual addresses
that an operating system makes available to a process
.
I am mostly into the offensive side of security but also have done Threat Hunting
and the Blue Team
side of security while working as Security Research Intern in my current Company.
By configuring sysmon and attaching it with Windows Event Logger and looking for suspicious logs or running open source tools like DeepBlueCLI
(UEBA style Detection techniques), to perform Threat Hunting
via Windows Event Logs.
Analysing Memory images
with volatility or for small-scale analysing (a particular process) used Moneta/PeSieve.
Also used RITA for analyzing PCAP files
(in the form of Zeek logs
).
Also used, Velociraptor for collecting Host-based state information via Velociraptor Query Language (VQL) queries, which performs PowerShell queries to get juicy artefacts out of the system.
Similar to this Velociraptor, I have also used another tool named, Osqueryi, targeting the Linux environment.
I used this mainly while hunting any artefacts
***my rootkit