Search results

Jump to navigation Jump to search
  • First find out a users' GUID: niutil -readprop . /users/username generateduid
    2 KB (277 words) - 21:42, 30 September 2008
  • # A user may access our website, and perform queries there. Users may perform query by specific IP addresses, ranges of IP addresses, and wit # Custom reports that are available as Atom/RSS feeds, that let users keep up-to-date.
    2 KB (379 words) - 21:16, 29 June 2010
  • This will be a client/server app that allows users to test what's being blocked, either by firewalls, by ISPs, etc.
    451 bytes (67 words) - 14:43, 8 August 2008
  • ===Users and groups=== Listing users
    8 KB (1,356 words) - 09:13, 21 January 2011
  • I was getting more and more spam, so I disabled editing for non-approved users. If you want to edit, please email me (ron at skullsecurity.net) and let me
    2 KB (313 words) - 21:30, 6 July 2021
  • ===Enumerating users===
    10 KB (1,728 words) - 09:11, 21 January 2011
  • * Redirecting users if you control their DNS server
    5 KB (915 words) - 15:58, 6 October 2014
  • ...file require root access, since the shadow file is inaccessible to normal users. If a user can take control of these programs and have the program run a sh -rwxr-xr-x 1 ron users 11180 2007-03-14 13:46 StackExploit*
    13 KB (1,963 words) - 04:43, 20 January 2012