Browse Source

updated titles

Marius Schwarz 4 years ago
parent
commit
c3c60ede06

+ 0 - 8
cheatsheets/crypto/prng.md

@@ -1,8 +0,0 @@
----
-title: prng.md
-categories: [cheatsheets]
----
-# Cryptography: PRNG
-
-
-

+ 1 - 2
cheatsheets/misc/proxmox.md

@@ -1,10 +1,9 @@
 ---
-title: Proxmox
+title: Proxmox Setup
 categories: [cheatsheets]
 tags: [misc, proxmox, virt]
 ---
 
-# Proxmox
 
 ## Limit Webinterface (8006) to Loopback
 

+ 4 - 3
cheatsheets/security/malware/COM.md

@@ -1,7 +1,8 @@
 ---
-title: COM.md
+title: Windows - Component Object Model (COM)
 categories: [cheatsheets]
 ---
+
 # The Component Object model (COM)
 
 -> Interface Model, makes it possible for Applications to call code from other Apps.
@@ -9,12 +10,12 @@ categories: [cheatsheets]
 
 Client/Server Framework (Malware uses client Models and sometimes COM Servers)
 
-### Find COM Objects: 
+### Find COM Objects:
 	If a Application uses COM Objects it needs to init. those by calling OleInitialize() or CoInitialzeEx()
 
 
 ### Naming:
-* GUIDs 	- globally Unique identifiers 
+* GUIDs 	- globally Unique identifiers
 * CLSIDs 	- Class identifiers
 * IIDs 		- Interface identifiers
 

+ 1 - 1
cheatsheets/security/malware/anti-debugging.md

@@ -1,5 +1,5 @@
 ---
-title: anti-debugging.md
+title: Anti Debugging Techniques
 categories: [cheatsheets]
 ---
 # Anti Debugging

+ 2 - 2
cheatsheets/security/malware/createmutex.md

@@ -1,5 +1,5 @@
 ---
-title: createmutex.md
+title: Windows API - CreateMutex
 categories: [cheatsheets]
 ---
 # CreateMutex()
@@ -20,7 +20,7 @@ Microsoft Documentation: https://msdn.microsoft.com/en-us/library/windows/deskto
 
 -----------------------------------------------------------------------
 
-Mutexes are used for inter-process communication, eg. Malware checks if its already running by opening 
+Mutexes are used for inter-process communication, eg. Malware checks if its already running by opening
 a preset mutex OpenMutex(), and thereby checking if its already running.
 Example below.
 

+ 1 - 1
cheatsheets/security/malware/createthread.md

@@ -1,5 +1,5 @@
 ---
-title: createthread.md
+title: Windows API - CreateThread
 categories: [cheatsheets]
 ---
 # CreateThread()

+ 0 - 5
cheatsheets/security/malware/maliciouswindowsfunctions.md

@@ -1,5 +0,0 @@
----
-title: maliciouswindowsfunctions.md
-categories: [cheatsheets]
----
-# Windows API

+ 8 - 8
cheatsheets/security/malware/malware_launching.md

@@ -1,5 +1,5 @@
 ---
-title: malware_launching.md
+title: Malware Launching
 categories: [cheatsheets]
 ---
 # Covert Process Launching
@@ -27,7 +27,7 @@ categories: [cheatsheets]
 
 
 int main() {
-	
+
 
 	const DWORD pid = 11428;
 	char *dllName = "H:\awesome.dll";
@@ -68,7 +68,7 @@ int main() {
 	printf("[+] Wrote String in Memory
 ");
 
-	HMODULE hKernel32 = GetModuleHandle("kernel32.dll");	
+	HMODULE hKernel32 = GetModuleHandle("kernel32.dll");
 
 	if(!hKernel32) {
 		printf("[-] No Handle to Kernel32.dll");
@@ -133,7 +133,7 @@ int main() {
 2. Remote Hooks - observe/manipulate messages for a remote Process
 
 * Remote Hooks are split in two other types:
-1. High-Level Hooks - Hook Proc as exported function in a DLL, which is mapped by the OS 
+1. High-Level Hooks - Hook Proc as exported function in a DLL, which is mapped by the OS
 into ProcessSpace of one or more Threds
 2. Low-Level Hooks - Hook Proc contained in the Process which installed the Hook
 
@@ -161,7 +161,7 @@ LRESULT CALLBACK LowLevelKeyboardProc(int nCode, WPARAM wParam, LPARAM lParam) {
 
 
 int main() {
-	
+
 	hookHandle =SetWindowsHookEx(WH_KEYBOARD_LL, LowLevelKeyboardProc, NULL, 0);
 	if(!own) {
 		printf("[-] No Hook for you :(
@@ -172,7 +172,7 @@ int main() {
 	MSG msg;
 	while (GetMessage(&msg, NULL, 0, 0))
 	{
-	}	
+	}
 
 	return 0;
 }
@@ -196,7 +196,7 @@ Example
 
 
 int main() {
-	
+
 	int pid = 14464;
 	HANDLE hProc = OpenProcess(PROCESS_ALL_ACCESS, FALSE, pid);
 
@@ -236,7 +236,7 @@ int main() {
 
 	return 0;
 }
-``` 
+```
 
 
 ### Detours

+ 1 - 2
cheatsheets/security/malware/persistence.md

@@ -1,8 +1,7 @@
 ---
-title: persistence.md
+title: Windows Malware Persistence Mechanisms
 categories: [cheatsheets]
 ---
-# Persistence
 
 ### Registry
 

+ 4 - 4
cheatsheets/security/malware/services.md

@@ -1,16 +1,16 @@
 ---
-title: services.md
+title: Windows Services
 categories: [cheatsheets]
+tags: [windows]
 ---
-# Services
 
 Services run without their own Process. Services are run as background jobs.
-Run & Scheduled by the Windows Service Manager (WSM) 
+Run & Scheduled by the Windows Service Manager (WSM)
 
 Services got SYSTEM Priviledge (only as Administrator installable).
 Services are also a Way of Persistance (can be run on startup)
 
-## Win32 API Functions to manipulate Servies: 
+## Win32 API Functions to manipulate Servies:
 * OpenSCManager(): Returns HANDLE to a Service (ServiceControlManager)
 * CreateService(): Creates a new Service, and adds it to the SC Manager
 * StartService(): Starts a Service if set to "manually"

+ 1 - 2
cheatsheets/security/pentesting/tools.md

@@ -1,10 +1,9 @@
 ---
-title: tools.md
+title: Offensive Security Tooling
 categories: [cheatsheets]
 tags: [security]
 ---
 
-# Offsec Tools
 
 ## Reconnaissance:
 

+ 0 - 7
cheatsheets/template.md

@@ -1,7 +0,0 @@
----
-title: <Title here>
-categories: [cheatsheets]
-tags: [topic]
----
-
-# <Title here>