-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathindex.xml
More file actions
82 lines (67 loc) · 5.27 KB
/
index.xml
File metadata and controls
82 lines (67 loc) · 5.27 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>blog.kanbach.org</title>
<link>https://blog.kanbach.org/</link>
<description>Recent content on blog.kanbach.org</description>
<generator>Hugo -- gohugo.io</generator>
<lastBuildDate>Tue, 12 Aug 2025 00:00:00 +0000</lastBuildDate>
<atom:link href="https://blog.kanbach.org/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Windows OOBE Breakout Revived</title>
<link>https://blog.kanbach.org/post/windows-oobe-breakout-revived/</link>
<pubDate>Tue, 12 Aug 2025 00:00:00 +0000</pubDate>
<guid>https://blog.kanbach.org/post/windows-oobe-breakout-revived/</guid>
<description>This is a short story that describes an alternative way of breaking out of the Windows Out-of-Box-Experience (OOBE) and gaining access to the command line of Windows with the privileges of the user defaultuser0 who is part of the local Administrators group.
What is OOBE? To get everyone on board, I would like to briefly describe what OOBE is, and when these screens appear to the user.
The Windows Out-of-Box-Experience is a series of screens that the user is presented when Windows is initially started after its installation.</description>
</item>
<item>
<title>Firewalls under the hood - UFW</title>
<link>https://blog.kanbach.org/post/firewalls-under-the-hood-ufw/</link>
<pubDate>Wed, 07 Dec 2022 00:00:00 +0000</pubDate>
<guid>https://blog.kanbach.org/post/firewalls-under-the-hood-ufw/</guid>
<description>This blogpost aims to explain some of the inner workings of the &ldquo;uncomplicated firewall&rdquo; (ufw) that is available for Ubuntu installations since 8.04 LTS and for Debian installations since 10.
Before going into detail, ufw is not a firewall but a frontend for iptables. Iptables is a frontend for the netfilter kernel module that is performing packet filtering within the Linux kernel. Therefore all actions that are performed via ufw can be directly queried using the iptables command.</description>
</item>
<item>
<title>Escaping from Mozilla Firefox in Restricted Environments</title>
<link>https://blog.kanbach.org/post/escaping-from-mozilla-firefox-in-restricted-environments/</link>
<pubDate>Sun, 07 Aug 2022 00:00:00 +0000</pubDate>
<guid>https://blog.kanbach.org/post/escaping-from-mozilla-firefox-in-restricted-environments/</guid>
<description>How to execute operating system commands by leveraging legitimate functions of Mozilla Firefox.
Software environments in which users should only be able to perform a limited amount of tasks often use Kiosk applications to reduce the opportunities of a user to interact with the system. In many environments, only a few pre-defined applications are published to the user, like web browsers or POS software, depending on what the user needs to do.</description>
</item>
<item>
<title>Network Security Implications of Host Models</title>
<link>https://blog.kanbach.org/post/network-security-implications-of-host-models/</link>
<pubDate>Sat, 30 Nov 2019 00:00:00 +0000</pubDate>
<guid>https://blog.kanbach.org/post/network-security-implications-of-host-models/</guid>
<description>This blog post is about a concept in network stacks called &ldquo;Host Model&rdquo; and its implications on network security.
It is important for both, the offensive and the defensive side to know the differences between the host model paradigms and to be aware of the defaults that are used in common operating systems.
In this blog post the following 2 hosts will be considered:
Host A
eth0 IPv4 address: 192.168.100.1/24 MAC: 00:0C:29:6D:57:01 eth1 IPv4 Address: 10.</description>
</item>
<item>
<title>How to permanently change a MAC address using ethtool</title>
<link>https://blog.kanbach.org/post/how-to-permanently-change-a-mac-address-using-ethtool/</link>
<pubDate>Fri, 23 Nov 2018 00:00:00 +0000</pubDate>
<guid>https://blog.kanbach.org/post/how-to-permanently-change-a-mac-address-using-ethtool/</guid>
<description>Changing the MAC address of a network interface can be a common task if you either change addresses for privacy reasons or if you're performing security assessments.
If you're using a Linux-based operating system, this can be done using one of the following commands:
ifconfig eth0 hw ether xx:xx:xx:xx:xx:xx
macchanger-ng --mac xx:xx:xx:xx:xx:xx eth0
ip link set eth0 address xx:xx:xx:xx:xx:xx
While these changes are only temporary, it's also possible to instruct the operating system to set the MAC address straight after booting, for example by modifying files like /etc/network/interfaces.</description>
</item>
<item>
<title>About</title>
<link>https://blog.kanbach.org/about/</link>
<pubDate>Fri, 23 Nov 2018 00:00:00 +0000</pubDate>
<guid>https://blog.kanbach.org/about/</guid>
<description>Hi all, here I'll write about IT-Sec and in-depth technical stuff in general.
If you want to get in touch contact me via BlueSky: bka-sec.bsky.social, on X: bka, or on LinkedIn.</description>
</item>
</channel>
</rss>