<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="http://creutz.spdns.de/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="http://creutz.spdns.de/feed.php">
        <title>bash.history - edv:hacking:hack</title>
        <description></description>
        <link>http://creutz.spdns.de/</link>
        <image rdf:resource="http://creutz.spdns.de/lib/exe/fetch.php/wiki:dokuwiki.svg" />
       <dc:date>2026-04-29T19:20:53+00:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="http://creutz.spdns.de/doku.php/edv:hacking:hack:sidebar?rev=1755287408&amp;do=diff"/>
                <rdf:li rdf:resource="http://creutz.spdns.de/doku.php/edv:hacking:hack:start?rev=1755287408&amp;do=diff"/>
                <rdf:li rdf:resource="http://creutz.spdns.de/doku.php/edv:hacking:hack:termux?rev=1755287408&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="http://creutz.spdns.de/lib/exe/fetch.php/wiki:dokuwiki.svg">
        <title>bash.history</title>
        <link>http://creutz.spdns.de/</link>
        <url>http://creutz.spdns.de/lib/exe/fetch.php/wiki:dokuwiki.svg</url>
    </image>
    <item rdf:about="http://creutz.spdns.de/doku.php/edv:hacking:hack:sidebar?rev=1755287408&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-08-15T19:50:08+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>sidebar</title>
        <link>http://creutz.spdns.de/doku.php/edv:hacking:hack:sidebar?rev=1755287408&amp;do=diff</link>
        <description>Zutück

Ethical Hacking


  * Grundlagen

  * The Onion-Web

  * Vulnerability Management

  * Informationsbeschaffung

  * Enemeration

  * Metasploit

  * Vulnability-Scanner

  * Phasen eines Systemangriffs

  * Zugang verschaffen

  * Privilegien Eskalation

  * Malware

  * Shellter

  * Root Kits

  * ICPM Tunneling Covert Channel

  * Alternate Data Streams (ADS)

  * Malware Analyse

  * integrität mit Tripwire prüfen

  * Sheep-Dip Systeme

  * Sandboxen

  * Steganografie

  * Informat…</description>
    </item>
    <item rdf:about="http://creutz.spdns.de/doku.php/edv:hacking:hack:start?rev=1755287408&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-08-15T19:50:08+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>start</title>
        <link>http://creutz.spdns.de/doku.php/edv:hacking:hack:start?rev=1755287408&amp;do=diff</link>
        <description>Ethical Hacking, der Komplettkurs

Labor

Es werden Folgende Instanzen auf dem esxi benötigt:

	*  Kali -&gt; Dies wird das Arbeits-System
	*  Metasploitable 2 -&gt; Ein unsicheres System zum Scannen (Nicht im Internet sichtbar!)
	*  Win7 -&gt; System um Windows-Hacks zu testen (idealerweise ohne Updates)</description>
    </item>
    <item rdf:about="http://creutz.spdns.de/doku.php/edv:hacking:hack:termux?rev=1755287408&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2025-08-15T19:50:08+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>termux</title>
        <link>http://creutz.spdns.de/doku.php/edv:hacking:hack:termux?rev=1755287408&amp;do=diff</link>
        <description>Termux Hacking

Metasploit

apt upgrade &amp;&amp; apt update &amp;&amp; apt install wget &amp;&amp; wget &lt;https://Auxilus.github.io/metasploit.sh&gt;

HeardBleed

apt upgrade &amp;&amp; apt update &amp;&amp; git clone &lt;https://github.com/TechnicalMujeeb/HeartBleed.git&gt;

Goldeneye

apt upgrade &amp;&amp; apt update &amp;&amp; apt install git &amp;&amp; apt install python &amp;&amp; git clone &lt;https://github.com/jseidl/GoldenEye&gt;</description>
    </item>
</rdf:RDF>
