Skip to content

Commit aafdb7f

Browse files
carlospolopgitbook-bot
authored andcommitted
GITBOOK-4111: change request with no subject merged in GitBook
1 parent bce38a1 commit aafdb7f

File tree

47 files changed

+382
-42
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

47 files changed

+382
-42
lines changed
Loading
Loading
Loading
Loading
Loading
Loading
-19.5 KB
Loading
6.96 KB
Loading

.gitbook/assets/image (1) (1) (1).png

33.5 KB
Loading

.gitbook/assets/image (1) (1).png

250 KB
Loading

.gitbook/assets/image (1).png

-287 KB
Loading
Loading
Loading
Loading
Loading
Loading
-88.2 KB
Loading
109 KB
Loading
-114 KB
Loading

.gitbook/assets/image (2) (1) (1).png

65.2 KB
Loading

.gitbook/assets/image (2) (1).png

-12.4 KB
Loading

.gitbook/assets/image (2).png

163 KB
Loading

.gitbook/assets/image.png

-189 KB
Loading

README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ You can check their **blog** in [**https://blog.stmcyber.com**](https://blog.stm
4040

4141
### [Intigriti](https://www.intigriti.com)
4242

43-
<figure><img src=".gitbook/assets/image (2) (1) (1).png" alt=""><figcaption></figcaption></figure>
43+
<figure><img src=".gitbook/assets/image (2) (1) (1) (1).png" alt=""><figcaption></figcaption></figure>
4444

4545
**Intigriti** is the **Europe's #1** ethical hacking and **bug bounty platform.**
4646

backdoors/salseo.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -99,7 +99,7 @@ Open the SalseoLoader project using Visual Studio.
9999

100100
### Add before the main function: \[DllExport]
101101

102-
![](<../.gitbook/assets/image (2) (1) (1) (1) (1) (1) (1) (1) (1) (1).png>)
102+
![](<../.gitbook/assets/image (2) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1).png>)
103103

104104
### Install DllExport for this project
105105

forensics/basic-forensic-methodology/specific-software-file-type-tricks/.pyc.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@
1212

1313
</details>
1414

15-
<img src="../../../.gitbook/assets/image (1) (1) (1) (1) (1) (1) (1) (1) (1) (1).png" alt="" data-size="original">
15+
<img src="../../../.gitbook/assets/image (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1).png" alt="" data-size="original">
1616

1717
If you are interested in **hacking career** and hack the unhackable - **we are hiring!** (_fluent polish written and spoken required_).
1818

@@ -231,7 +231,7 @@ C:\Users\test\Desktop\test>pyinstaller --onefile hello.py
231231
232232
* [https://blog.f-secure.com/how-to-decompile-any-python-binary/](https://blog.f-secure.com/how-to-decompile-any-python-binary/)
233233
234-
<img src="../../../.gitbook/assets/image (1) (1) (1) (1) (1) (1) (1) (1) (1) (1).png" alt="" data-size="original">
234+
<img src="../../../.gitbook/assets/image (1) (1) (1) (1) (1) (1) (1) (1) (1) (1) (1).png" alt="" data-size="original">
235235
236236
If you are interested in **hacking career** and hack the unhackable - **we are hiring!** (_fluent polish written and spoken required_).
237237

macos-hardening/macos-auto-start-locations.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -449,7 +449,7 @@ The iTerm2 preferences located in **`~/Library/Preferences/com.googlecode.iterm2
449449
450450
This setting can be configured in the iTerm2 settings:
451451
452-
<figure><img src="../.gitbook/assets/image.png" alt="" width="563"><figcaption></figcaption></figure>
452+
<figure><img src="../.gitbook/assets/image (2).png" alt="" width="563"><figcaption></figcaption></figure>
453453
454454
And the command is reflected in the preferences:
455455
@@ -774,7 +774,7 @@ mv /tmp/folder.scpt "$HOME/Library/Scripts/Folder Action Scripts"
774774
775775
Then, open the `Folder Actions Setup` app, select the **folder you would like to watch** and select in your case **`folder.scpt`** (in my case I called it output2.scp):
776776
777-
<figure><img src="../.gitbook/assets/image (2).png" alt="" width="297"><figcaption></figcaption></figure>
777+
<figure><img src="../.gitbook/assets/image (2) (1).png" alt="" width="297"><figcaption></figcaption></figure>
778778
779779
Now, if you open that folder with **Finder**, your script will be executed.
780780
@@ -972,7 +972,7 @@ Writeup: [https://posts.specterops.io/saving-your-access-d562bf5bf90b](https://p
972972
* `~/Library/Screen Savers`
973973
* **Trigger**: Select the screen saver
974974
975-
<figure><img src="../.gitbook/assets/image (1).png" alt="" width="375"><figcaption></figcaption></figure>
975+
<figure><img src="../.gitbook/assets/image (1) (1).png" alt="" width="375"><figcaption></figcaption></figure>
976976
977977
#### Description & Exploit
978978

macos-hardening/macos-red-teaming/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ Moreover, after finding proper credentials you could be able to brute-force othe
5353

5454
#### JAMF device Authentication
5555

56-
<figure><img src="../../.gitbook/assets/image (2) (1) (1) (1) (1) (1) (1) (1).png" alt=""><figcaption></figcaption></figure>
56+
<figure><img src="../../.gitbook/assets/image (2) (1) (1) (1) (1) (1) (1) (1) (1).png" alt=""><figcaption></figcaption></figure>
5757

5858
The **`jamf`** binary contained the secret to open the keychain which at the time of the discovery was **shared** among everybody and it was: **`jk23ucnq91jfu9aj`**.\
5959
Moreover, jamf **persist** as a **LaunchDaemon** in **`/Library/LaunchAgents/com.jamf.management.agent.plist`**

0 commit comments

Comments
 (0)