본문 바로가기

Linux22

Unix and Linux support in ConfigMgr 2012 SP1 Supported Distributions At the time of writing, Configuration Manager 2012 Service Pack 1 offers client support for the following UNIX and Linux distributions;Red Hat Enterprise LinuxVersion 4, 5, 6 (x86 and x64)SolarisVersion 9 (SPARC)Version 10 (x86 and SPARC)SUSE Linux Enterprise ServerVersion 9 (x86)Version 10 SP1 (x86 and x64)Version 11 (x86 and x64)In the near future the number of distribu.. 2013. 8. 20.
Windows Management Instrumentation (WMI) Client for Linux If you don’t want to install external monitoring application to your Windows, the easiest way to monitor it is to use WMI (Windows Managament Instrumentation). This is an infrastructure for management data and operations on Windows-based operating systems and it is available by default from Windows 2000 through Windows 7 to Windows 2008 R2. For more details about WMI see the following pages: Win.. 2013. 8. 19.
POST EXPLOITATION COMMAND LISTS I've had a private list of commands that I run on Windows or Linux when I pop a shell, as I'm sure most pentesters do. It isn't so much a thing of hoarding as much it is just jumbled notes that are 'not worth posting' Well, I made two (now 3) public google docs (anyone can edit) *don't be a dick clause Linux/Unix/BSD Post Exploitation: https://docs.google.com/document/d/1ObQB6hmVvRPCgPTRZM5NMH03.. 2011. 9. 9.
Mozilla Firefox 4.0 정식 출시 Mozilla 재단은 2011년 3월 22일(태평양시각 오전7시, 한국시간 오후 11시) 4억명이 넘는 전세계 사용자에게 더 빠르고 미려한 맞춤 기능을 갖춘 Firefox 4를 정식 출시합니다. Mozilla 는 웹을 더 나은 곳으로 만드는데 기여하고자 하는 글로벌 비영리 조직입니다. 우리는 무료이면서 공개 소프트웨어로 개발하는 대중적인 웹 브라우저 최신 버전인 Mozilla Firefox 4를 선보이게 되었습니다. 새 Firefox는 미려한 사용자 인터페이스와 다양한 신기능, 최신 웹 기술에 대한 지원과 엄청난 속도감을 제공하여 사용자에게 한층 높은 인터넷 사용 경험을 제공해 줄 것입니다. Firefox 4는 전 세계 75개 언어 이상 지원하며 Windows, Mac OS X, Linux 버전으로 다운.. 2011. 3. 23.
Linux Kernel 'pipe.c' Local Privilege Escalation Vulnerability Linux kernel is prone to a local privilege-escalation vulnerability that is caused by a NULL-pointer dereference. Local attackers can exploit this issue to execute arbitrary code with kernel-level privileges. Successful exploits will result in the complete compromise of affected computers. Failed exploit attempts will result in a denial-of-service condition. Exploit: The following proof of conce.. 2009. 11. 4.