Please enable JavaScript.
Coggle requires JavaScript to display documents.
COMPUTERS - Coggle Diagram
COMPUTERS
Networks
-
-
in modern networks, do firewalls also fulfill the routing function :question:
-
-
DNS
how does DNS give different answers based on the place the request came from? (google.com will be resolved to diffrerent IPs based on locality) :question:
-
-
others
-
-
-
Projects / TODOs
-
Get the windows "master USB" (or debug USB, idk) from GRO
-
-
write c programs and reverse them #
-
Systems
Operating Systems
-
OS-specific questions
Windows
COM : wow, such mysterious
-
-
-
-
-
-
wtf is hotpatching, (cf mov edi, edi instruction, page 189 of sans 610) ? How does this work with write xor execute:question:
-
file ownership
a domain can be the owner of a file? (right-click, file ownership, work/personnal) :question:
-
Processes
difference between a service, a process and a task :question:
-
-
-
-
Unix
-
Orphaned processes
The init process automatically becomes the parent of any orphaned process. This is done on purpose in the case of a daemon.
-
-
Programs
How programs get run
-
Dynamic Linking
Is the mechanism for not loading a library twice the COW (Copy On Write) ? That is, a child program inherits the loaded library from its parent?
Is a common library loaded at the very start of the OS? does the init process load printf for example? what about rare libraries, surely not all of them are loaded ?
If not, then what is the mechanism for not loading a library twice?
the loaded libraries must be relocatable right? (in case the code already uses an address needed in the library)
Does that mean that a library may need to be loaded twice to satisfy the constraints posed by two processes?
-
-
-
-
location independance, windows vs linux
-
-
-
-
File descriptors
is there a standard out and standard in per process? else, when I have several command prompts running, how does the right output arrive in the right prompt :question:
Similar question with all file descriptors. Where is the info for what file descriptors correspond to what stored? in the process-specific data (same place where ........ is stored) :question:
-
Booting
when the boot process is over, is the bios still running or is it only active to set things up and then exits?
Depends : in older OSes, the BIOS was still active. In newer OSes (windows for ex), the OS can interface more directly with hardware.
cf www.youtube.com/watch?v=ZplB2v2eMas
-
Virtual memory
the kernel is mapped inside every process's memory map, in a region accessibleonly in kernel mode. The point is to not change the adress table (exact name, acronym:question:) at every syscall, since its an overhead.
meltdown (or spectre:question:) attacks make use of the kernel memory being mapped in the process's adress table :question: . Therefore, it has become necessary to map the kernel memory separately (acronym for this :question:) except for the least dangerous and most frequently called syscalls.
www.youtube.com/watch?v=DdUeTN0qfuE
www.youtube.com/watch?v=g9HTAK0WwkY
www.youtube.com/watch?v=AKGtJAi4wGo
-
-
-
Drivers
Are drivers standalone processes? Are they like services hosted in a bigger process (I know the System process on windows "has" drivers) :question:
-
Security
Blue Team
Reverse
-
-
-
-
questions
-
-
Where to look when I want ot know the interface of a function (where are the arguments and return in _strlen of libc for example?)
-
formation
understand dynamic loading of libraries better, vs IAT, vs whatever else there is
-
-
-
-
object-oriented reversing (vtables, etc)
-
defense
-
Techniques
-
-
Encryption
How come when my disk is encrypted my computer doesn't run much slower? isn't it an overhead to every disk operation :question:
-
when the disk is encrypted, where is the key stored? is it the session password?
-
-
-
-
-
Red Team
hacker tools
burp suite
- web-pentest capabilities?
-
-
-
-
-
-
-
-
hacker techniques
-
-
Web
-
XSS
:+1:: https://webhook.site : a website that you can use as a listener, for cookie stealing purposes for example.
Usage example : www.youtube.com/watch?v=UXtxfka2TuY
-
Windows
-
-
Windows APIs for attack
-
what are the permissions needed to attack other processes via windows APIs? # #
-
-
-
-
-
-
-
-
-
-
-
-
-
more research
forensics
- www.youtube.com/c/13cubed
general
- www.youtube.com/watch?v=FZtprMfP9d0
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Enterprise systems
-
authentication
Kerberos
Attacks
-
Golden ticket
the secret used for the TGT (NTLM hash of the KRBTGT account in Windows :question:) is stolen : any TGT can be created
-
-
-
-