- Get the reverse shell in netcat
- check python support in the target system
which python
- If your terminal is using zsh, then you need to switch to bash
# -*- mode: ruby -*- | |
# vi: set ft=ruby : | |
Vagrant.configure("2") do |config| | |
config.vm.box = "ubuntu/xenial64" | |
config.vm.box_check_update = false | |
# Spark Jobs history | |
config.vm.network "forwarded_port", guest: 4040, host: 4040 | |
# Spark Master | |
config.vm.network "forwarded_port", guest: 8080, host: 8080 |
#!/bin/bash | |
# Enabling ADB over network | |
# adb kill-server && adb start-server # restart adb server | |
# adb tcpip 5555 # start adb service | |
# adb connect <phone_id> # connect to the device | |
# For enabling loudspeaker and cut the call, make sure to change it based on your phone screen | |
# Ref for getting touch coordinates: https://android.stackexchange.com/questions/164295/how-can-i-see-the-pointer-location-and-simulate-it |
TOTP (Time-Based One-Time Password) is a one-time password algorithm that uses the current time as a variable. It is commonly used in two-factor authentication (2FA) systems. TOTP generates a numeric code that changes every 30 seconds and is based on a shared secret between the client and the server.
Check | Description |
---|---|
X-Frame-Options header | Should be set to DENY or SAMEORIGIN to prevent Clickjacking. |
Content-Security-Policy (CSP) | Use frame-ancestors , child-src , frame-src directives to restrict embedding origins. |
Sandboxing iframes | Use sandbox attribute with strict flags like allow-scripts or allow-forms . |