CTF http://vulnerable.shieldsurge.com/
$ nmap -sV vulnerable.shieldsurge.com
PORT STATE SERVICE VERSION
22/tcp filtered ssh
25/tcp filtered smtp
| #!/usr/bin/env python3 | |
| from scapy.all import * | |
| import logging | |
| import datetime | |
| interface = 'enp3s0' # changeme! | |
| logging.basicConfig( | |
| level=logging.DEBUG, |
CTF http://vulnerable.shieldsurge.com/
$ nmap -sV vulnerable.shieldsurge.com
PORT STATE SERVICE VERSION
22/tcp filtered ssh
25/tcp filtered smtp
| /* | |
| * | |
| * Web Application Firewall built with Cloudflare workers | |
| * | |
| * Author: < https://twitter.com/dustyfresh > | |
| * | |
| * License: GPLv3 < https://www.gnu.org/licenses/gpl-3.0.en.html > | |
| * | |
| * Cloudflare worker documentation: | |
| * < https://developers.cloudflare.com/workers/about/ > |
RethinkDB is the first open-source, scalable JSON database built from the ground up for the realtime web. It inverts the traditional database architecture by exposing an exciting new access model – instead of polling for changes, the developer can tell RethinkDB to continuously push updated query results to applications in realtime. RethinkDB’s realtime push architecture dramatically reduces the time and effort necessary to build scalable realtime apps.
The project I'm using RethinkDB for is storing data from various scrapers I'm working on.
Sometimes you need to access a service that is behind a firewall that you do not have permissions to influence. You can get around your inability to modify the firewall policies by tunneling your service over a Tor hidden service with SSH.
| #!/usr/bin/env python | |
| import requests | |
| import random | |
| import string | |
| from time import sleep | |
| while True: | |
| sleep(random.choice(range(5))) | |
| lol = ''.join(random.choice(string.ascii_uppercase + string.digits + string.ascii_lowercase) for _ in range(4)) | |
| url = 'https://kek.gg/u/{}'.format(lol) |
| ACRIDMINI - TAO computer hacking project | |
| ADJUTANT VENTURE - Intrusion set? | |
| ALOOFNESS - Cyber threat actor | |
| ALTEREDCARBON - An IRATEMONK implant for Seagate drives | |
| AMULETSTELLAR - Cyber threat actor sending malicious e-mails | |
| ANGRYNEIGHBOR - Family of radar retro-reflector tools used by NSA's TAO division | |
| APERTURESCIENCE - TAO computer hacking project | |
| ARGYLEALIEN - Method to cause a loss of data by exploiting zeroization of hard-drives | |
| ARKSTREAM - Implant used to reflash BIOS, installed by remote access or intercepted shipping | |
| ARROWECLIPSE - Counter CNE tool |
I hereby claim:
To claim this, I am signing this object:
| from miniboa import TelnetServer | |
| import logging as logz | |
| def on_connect(client): | |
| logz.info('New connection from {}'.format(client.address)) | |
| clients.append(client) | |
| # Fake login prompt | |
| client.send('Login: ') | |
| def on_disconnect(client): |
| #!/usr/bin/env python3 | |
| import sys | |
| from datetime import datetime | |
| import time | |
| from time import sleep | |
| from dnslib import DNSLabel, QTYPE, RD, RR, RCODE | |
| from dnslib import A, AAAA, CNAME, MX, NS, SOA, TXT | |
| from dnslib.server import DNSServer |