diff --git a/.gitbook/assets/68747470733a2f2f7777772e6275796d6561636f666665652e636f6d2f6173736574732f696d672f637573746f6d5f696d616765732f6f72616e67655f696d672e706e67 (6) (4) (3) (1).png b/.gitbook/assets/68747470733a2f2f7777772e6275796d6561636f666665652e636f6d2f6173736574732f696d672f637573746f6d5f696d616765732f6f72616e67655f696d672e706e67 (6) (4) (11).png
similarity index 100%
rename from .gitbook/assets/68747470733a2f2f7777772e6275796d6561636f666665652e636f6d2f6173736574732f696d672f637573746f6d5f696d616765732f6f72616e67655f696d672e706e67 (6) (4) (3) (1).png
rename to .gitbook/assets/68747470733a2f2f7777772e6275796d6561636f666665652e636f6d2f6173736574732f696d672f637573746f6d5f696d616765732f6f72616e67655f696d672e706e67 (6) (4) (11).png
diff --git a/.gitbook/assets/68747470733a2f2f7777772e6275796d6561636f666665652e636f6d2f6173736574732f696d672f637573746f6d5f696d616765732f6f72616e67655f696d672e706e67 (6) (4) (6) (1).png b/.gitbook/assets/68747470733a2f2f7777772e6275796d6561636f666665652e636f6d2f6173736574732f696d672f637573746f6d5f696d616765732f6f72616e67655f696d672e706e67 (6) (4) (9).png
similarity index 100%
rename from .gitbook/assets/68747470733a2f2f7777772e6275796d6561636f666665652e636f6d2f6173736574732f696d672f637573746f6d5f696d616765732f6f72616e67655f696d672e706e67 (6) (4) (6) (1).png
rename to .gitbook/assets/68747470733a2f2f7777772e6275796d6561636f666665652e636f6d2f6173736574732f696d672f637573746f6d5f696d616765732f6f72616e67655f696d672e706e67 (6) (4) (9).png
diff --git a/.gitbook/assets/image (253) (1) (2) (1) (1) (1).png b/.gitbook/assets/image (253) (1) (2) (1) (1) (2) (2) (1).png
similarity index 100%
rename from .gitbook/assets/image (253) (1) (2) (1) (1) (1).png
rename to .gitbook/assets/image (253) (1) (2) (1) (1) (2) (2) (1).png
diff --git a/.gitbook/assets/image (253) (1) (2) (1) (1) (2) (1).png b/.gitbook/assets/image (253) (1) (2) (1) (1) (2) (2) (2).png
similarity index 100%
rename from .gitbook/assets/image (253) (1) (2) (1) (1) (2) (1).png
rename to .gitbook/assets/image (253) (1) (2) (1) (1) (2) (2) (2).png
diff --git a/.gitbook/assets/image (253) (1) (2) (1) (1) (2).png b/.gitbook/assets/image (253) (1) (2) (1) (1) (2) (2) (3).png
similarity index 100%
rename from .gitbook/assets/image (253) (1) (2) (1) (1) (2).png
rename to .gitbook/assets/image (253) (1) (2) (1) (1) (2) (2) (3).png
diff --git a/.gitbook/assets/image (446) (1) (2).png b/.gitbook/assets/image (446) (1) (2).png
new file mode 100644
index 000000000..574ff118e
Binary files /dev/null and b/.gitbook/assets/image (446) (1) (2).png differ
diff --git a/.gitbook/assets/image (535) (1) (1) (2) (2) (1).png b/.gitbook/assets/image (535) (1) (1) (2) (2) (2) (1).png
similarity index 100%
rename from .gitbook/assets/image (535) (1) (1) (2) (2) (1).png
rename to .gitbook/assets/image (535) (1) (1) (2) (2) (2) (1).png
diff --git a/.gitbook/assets/image (535) (1) (1) (2) (2).png b/.gitbook/assets/image (535) (1) (1) (2) (2) (2) (2).png
similarity index 100%
rename from .gitbook/assets/image (535) (1) (1) (2) (2).png
rename to .gitbook/assets/image (535) (1) (1) (2) (2) (2) (2).png
diff --git a/.gitbook/assets/image (563).png b/.gitbook/assets/image (566) (1).png
similarity index 100%
rename from .gitbook/assets/image (563).png
rename to .gitbook/assets/image (566) (1).png
diff --git a/.gitbook/assets/image (570).png b/.gitbook/assets/image (567) (1).png
similarity index 100%
rename from .gitbook/assets/image (570).png
rename to .gitbook/assets/image (567) (1).png
diff --git a/linux-unix/linux-privilege-escalation-checklist.md b/linux-unix/linux-privilege-escalation-checklist.md
index 1ab4a0d59..f8ba4a81f 100644
--- a/linux-unix/linux-privilege-escalation-checklist.md
+++ b/linux-unix/linux-privilege-escalation-checklist.md
@@ -154,7 +154,7 @@ If you want to **know** about my **latest modifications**/**additions** or you h
If you want to **share some tricks with the community** you can also submit **pull requests** to ****[**https://github.com/carlospolop/hacktricks**](https://github.com/carlospolop/hacktricks) ****that will be reflected in this book.
Don't forget to **give ⭐ on the github** to motivate me to continue developing this book.
-![](../.gitbook/assets/68747470733a2f2f7777772e6275796d6561636f666665652e636f6d2f6173736574732f696d672f637573746f6d5f696d616765732f6f72616e67655f696d672e706e67%20%286%29%20%284%29%20%284%29.png)
+![](../.gitbook/assets/68747470733a2f2f7777772e6275796d6561636f666665652e636f6d2f6173736574732f696d672f637573746f6d5f696d616765732f6f72616e67655f696d672e706e67%20%286%29%20%284%29%20%285%29.png)
[**Buy me a coffee here**](https://www.buymeacoffee.com/carlospolop)\*\*\*\*
diff --git a/macos/macos-security-and-privilege-escalation/inspecting-and-debugging-mac-os-apps.md b/macos/macos-security-and-privilege-escalation/inspecting-and-debugging-mac-os-apps.md
index 07663a26f..1d1b3cbda 100644
--- a/macos/macos-security-and-privilege-escalation/inspecting-and-debugging-mac-os-apps.md
+++ b/macos/macos-security-and-privilege-escalation/inspecting-and-debugging-mac-os-apps.md
@@ -227,7 +227,60 @@ lldb -n malware.bin --waitfor
help
|
- help breakpoint #Get help of breakpoint command |
+
+ help breakpoint #Get help of breakpoint command
+ help memory write #Get help to write into the memory
+ |
+
+
+ reg
+ |
+
+ reg read $rax
+ reg write $rip 0x100035cc0
+ |
+
+
+ x/s <reg/memory address>
+ |
+ Display the memory as a null-terminated string. |
+
+
+ x/i <reg/memory address>
+ |
+ Display the memory as assembly instruction. |
+
+
+ x/b <reg/memory address>
+ |
+ Display the memory as byte. |
+
+
+ print object (po)
+ |
+
+ This will print the object referenced by the param
+ po $raw
+ {
+
+ dnsChanger = {
+
+ "affiliate" = "";
+
+ "blacklist_dns" = ();
+
+ Note that most of Apple’s Objective-C APIs or methods return objects,
+ and thus should be displayed via the “print object” (po)
+ command. If po doesn't produce a meaningful output use x/b
+
+
+ |
+
+
+ memory write
+ |
+ memory write 0x100600000 -s 4 0x41414141 #Write AAAA in that address |
diff --git a/macos/macos-security-and-privilege-escalation/macos-mdm.md b/macos/macos-security-and-privilege-escalation/macos-mdm.md
index f3696a5ac..321516436 100644
--- a/macos/macos-security-and-privilege-escalation/macos-mdm.md
+++ b/macos/macos-security-and-privilege-escalation/macos-mdm.md
@@ -95,7 +95,7 @@ It follows a few steps to get the Activation Record performed by **`MCTeslaConfi
2. The JSON payload is encrypted using Absinthe \(**`NACSign`**\)
3. All requests over HTTPs, built-in root certificates are used
-![](../../.gitbook/assets/image%20%28563%29.png)
+![](../../.gitbook/assets/image%20%28566%29.png)
The response is a JSON dictionary with some important data like:
@@ -115,7 +115,7 @@ The response is a JSON dictionary with some important data like:
* Signed using the **device identity certificate \(from APNS\)**
* **Certificate chain** includes expired **Apple iPhone Device CA**
-![](../../.gitbook/assets/image%20%28570%29.png)
+![](../../.gitbook/assets/image%20%28567%29%20%281%29.png)
### Step 6: Profile Installation
diff --git a/pentesting-web/saml-attacks/README.md b/pentesting-web/saml-attacks/README.md
index 0f7f54e7b..3637f7858 100644
--- a/pentesting-web/saml-attacks/README.md
+++ b/pentesting-web/saml-attacks/README.md
@@ -6,7 +6,7 @@
## Attacks Graphic
-![](../../.gitbook/assets/image%20%28535%29%20%281%29%20%281%29%20%282%29%20%282%29%20%281%29.png)
+![](../../.gitbook/assets/image%20%28535%29%20%281%29%20%281%29%20%282%29%20%282%29%20%282%29%20%281%29.png)
## Tool
diff --git a/pentesting/6379-pentesting-redis.md b/pentesting/6379-pentesting-redis.md
index 483a1d642..438776002 100644
--- a/pentesting/6379-pentesting-redis.md
+++ b/pentesting/6379-pentesting-redis.md
@@ -24,7 +24,7 @@ msf> use auxiliary/scanner/redis/redis_server
### Banner
-Redis is a **text based protocol**, you can just **send the command in a socket** and the returned values will be readable. Also remember that Redis can run using **ssl/tls** \(but this is very weird\).
+Redis is a **text based protocol**, you can just **send the command in a socket** and the returned values will be readable. Also remember that Redis can run using **ssl/tls** \(but this is very weird\).
In a regular Redis instance you can just connect using `nc` or you could also use `redis-cli`:
@@ -44,7 +44,7 @@ In this last case, this means that **you need valid credentials** to access the
### Redis Authentication
**By default** Redis can be accessed **without credentials**. However, it can be **configured** to support **only password, or username + password**.
-It is possible to **set a password** in _**redis.conf**_ file with the parameter `requirepass` **or temporary** until the service restarts connecting to it and running: `config set requirepass p@ss$12E45`.
+It is possible to **set a password** in _**redis.conf**_ file with the parameter `requirepass` **or temporary** until the service restarts connecting to it and running: `config set requirepass p@ss$12E45`.
Also, a **username** can be configured in the parameter `masteruser` inside the _**redis.conf**_ file.
{% hint style="info" %}
@@ -52,8 +52,8 @@ If only password is configured the username used is "**default**".
Also, note that there is **no way to find externally** if Redis was configured with only password or username+password.
{% endhint %}
-In cases like this one you will **need to find valid credentials** to interact with Redis so you could try to [**brute-force**](../brute-force.md#redis) ****it.
-In case you found valid credentials you need to **authenticate the session** after establishing the connection with the command:
+In cases like this one you will **need to find valid credentials** to interact with Redis so you could try to [**brute-force**](../brute-force.md#redis) **\*\*it.
+In case you found valid credentials you need to** authenticate the session\*\* after establishing the connection with the command:
```bash
AUTH
diff --git a/pentesting/pentesting-web/iis-internet-information-services.md b/pentesting/pentesting-web/iis-internet-information-services.md
index f17107730..e5d8b2b64 100644
--- a/pentesting/pentesting-web/iis-internet-information-services.md
+++ b/pentesting/pentesting-web/iis-internet-information-services.md
@@ -195,7 +195,7 @@ Host: example-mvc-application.minded
[...]
```
-From the previous output, inside the /bin directory you will also be able to find the Dlls
+From the previous output, inside the /bin directory you will also be able to find the Dlls
* System.Web.Mvc.dll
* System.Web.Mvc.Ajax.dll
@@ -235,7 +235,7 @@ HTTP/1.1 200 OK
Note how in the previous output you can see a new namespace called: **WebApplication1.AdditionalFeatures** which indicates that there is another Dll in the /bin folder called **WebApplication1.AdditionalFeatures.dll**
-### Common files
+### Common files
From [here](https://www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/)
diff --git a/phishing-methodology/README.md b/phishing-methodology/README.md
index 7e77c0cc2..4652e748e 100644
--- a/phishing-methodology/README.md
+++ b/phishing-methodology/README.md
@@ -339,7 +339,7 @@ The page www.mail-tester.com can indicate you if you your domain is being blocke
* Decide from which account are you going to send the phishing emails. Suggestions: _noreply, support, servicedesk, salesforce..._
* You can leave blank the username and password, but make sure to check the Ignore Certificate Errors
-![](../.gitbook/assets/image%20%28253%29%20%281%29%20%282%29%20%281%29%20%281%29%20%281%29.png)
+![](../.gitbook/assets/image%20%28253%29%20%281%29%20%282%29%20%281%29%20%281%29%20%282%29%20%282%29.png)
{% hint style="info" %}
It's recommended to use the "**Send Test Email**" functionality to test that everything is working.
diff --git a/windows/checklist-windows-privilege-escalation.md b/windows/checklist-windows-privilege-escalation.md
index f80de1812..c278353ab 100644
--- a/windows/checklist-windows-privilege-escalation.md
+++ b/windows/checklist-windows-privilege-escalation.md
@@ -126,7 +126,7 @@ If you want to **know** about my **latest modifications**/**additions** or you h
If you want to **share some tricks with the community** you can also submit **pull requests** to ****[**https://github.com/carlospolop/hacktricks**](https://github.com/carlospolop/hacktricks) ****that will be reflected in this book.
Don't forget to **give ⭐ on the github** to motivate me to continue developing this book.
-![](../.gitbook/assets/68747470733a2f2f7777772e6275796d6561636f666665652e636f6d2f6173736574732f696d672f637573746f6d5f696d616765732f6f72616e67655f696d672e706e67%20%286%29%20%284%29%20%283%29%20%281%29.png)
+![](../.gitbook/assets/68747470733a2f2f7777772e6275796d6561636f666665652e636f6d2f6173736574732f696d672f637573746f6d5f696d616765732f6f72616e67655f696d672e706e67%20%286%29%20%284%29%20%284%29.png)
[**Buy me a coffee here**](https://www.buymeacoffee.com/carlospolop)\*\*\*\*