|
183 | 183 |
|
184 | 184 |
|
185 | 185 |
|
| 186 | + <article class="post on-list"> |
| 187 | + <h2 class="post-title"> |
| 188 | + <a href="//localhost:1313/posts/kernel_hacking/">Kernel_hacking</a> |
| 189 | + </h2> |
| 190 | + |
| 191 | + <div class="post-meta"><time class="post-date">2026-02-17</time><span class="post-author">Ceald</span></div> |
| 192 | + |
| 193 | + |
| 194 | + <span class="post-tags"> |
| 195 | + |
| 196 | + #<a href="//localhost:1313/tags/linux/">linux</a> |
| 197 | + |
| 198 | + #<a href="//localhost:1313/tags/ebpf/">ebpf</a> |
| 199 | + |
| 200 | + #<a href="//localhost:1313/tags/lkms/">lkms</a> |
| 201 | + |
| 202 | + #<a href="//localhost:1313/tags/malware/">malware</a> |
| 203 | + |
| 204 | + #<a href="//localhost:1313/tags/c/">C</a> |
| 205 | + |
| 206 | + #<a href="//localhost:1313/tags/programming/">programming</a> |
| 207 | + |
| 208 | + </span> |
| 209 | + |
| 210 | + |
| 211 | + |
| 212 | + <img src="https://media1.tenor.com/m/oZJ_94Ngnl8AAAAd/penguin-linux.gif" |
| 213 | + class="post-cover" |
| 214 | + alt="Kernel_hacking" |
| 215 | + title="Cover Image" /> |
| 216 | + |
| 217 | + |
| 218 | + <div class="post-content"> |
| 219 | + |
| 220 | + <p>A dive into linux kernel hacking</p> |
| 221 | + |
| 222 | + </div> |
| 223 | + |
| 224 | + |
| 225 | + <div> |
| 226 | + <a class="read-more button inline" href="/posts/kernel_hacking/">[Read more]</a> |
| 227 | + </div> |
| 228 | + |
| 229 | + </article> |
| 230 | + |
186 | 231 | <article class="post on-list"> |
187 | 232 | <h2 class="post-title"> |
188 | 233 | <a href="//localhost:1313/posts/bpfs/">Bpfs</a> |
@@ -349,44 +394,6 @@ <h2 id="stealing-tokens-via-windows-processes">Stealing Tokens Via Windows Proce |
349 | 394 |
|
350 | 395 | </article> |
351 | 396 |
|
352 | | - <article class="post on-list"> |
353 | | - <h2 class="post-title"> |
354 | | - <a href="//localhost:1313/posts/winregistrysecrets/">Win-Registry-Secrets</a> |
355 | | - </h2> |
356 | | - |
357 | | - <div class="post-meta"><time class="post-date">2025-03-20</time><span class="post-author">Ceald</span></div> |
358 | | - |
359 | | - |
360 | | - <span class="post-tags"> |
361 | | - |
362 | | - #<a href="//localhost:1313/tags/windows/">windows</a> |
363 | | - |
364 | | - #<a href="//localhost:1313/tags/new/">new</a> |
365 | | - |
366 | | - #<a href="//localhost:1313/tags/go/">go</a> |
367 | | - |
368 | | - </span> |
369 | | - |
370 | | - |
371 | | - |
372 | | - |
373 | | - |
374 | | - <div class="post-content"> |
375 | | - |
376 | | - <h2 id="intro">Intro</h2> |
377 | | -<p>The windows registry is a system database that contains keys and values. Some things in the registry include; Windows credentials, cached passwords, usernames, and other credentials. In windows a group of keys is called a “hive” the hives that are the cool ones are; SAM, System, and Security.</p> |
378 | | -<h2 id="system-hive">SYSTEM Hive</h2> |
379 | | -<p>The most important registry hive is the “System” hive, in the key: <code>CurrentControlSet\Control\Lsa</code> there are the necessary components to craft the boot key which will be used to decrypt the rest of the registry database to get things like hashes for users. Here’s some example code from “Go-Go-Gadget-Katz” for getting the boot key:</p> |
380 | | - |
381 | | - </div> |
382 | | - |
383 | | - |
384 | | - <div> |
385 | | - <a class="read-more button inline" href="/posts/winregistrysecrets/">[Read more]</a> |
386 | | - </div> |
387 | | - |
388 | | - </article> |
389 | | - |
390 | 397 |
|
391 | 398 | <div class="pagination"> |
392 | 399 | <div class="pagination__buttons"> |
|
0 commit comments