This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
L0 = bare metal machine | |
L1 = VM on bare metal | |
L2 = VM on VM | |
First, ensure virtualization is enabled on L0 as described here: https://docs.fedoraproject.org/en-US/quick-docs/using-nested-virtualization-in-kvm/#proc_enabling-nested-virtualization-in-kvm | |
Next, launch L1 with the following Vagrant config (or an equivalent directly on the hypervisor): | |
Vagrant.configure("2") do |config| | |
config.vm.box = "generic/ubuntu1604" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import json,xmltodict | |
""" | |
Nmap XML Output to Json Output in Python | |
example : data = xml2json('nmap_output.xml') | |
""" | |
def xml2json(xml): | |
xmlfile = open(xml) | |
xml_content = xmlfile.read() | |
xmlfile.close() | |
xmljson = json.dumps(xmltodict.parse(xml_content), indent=4, sort_keys=True) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<# | |
.SYNOPSIS | |
FindOuPermissions is a Windows PowerShell script that finds all of the different OUs in a domain, | |
determins the permissions assigned to different users and groups, and reports back which are different | |
from their parent; including what those permissions are. | |
This script does require that the device be joined to the domain being queried and RSAT is installed. | |
Author: Eric Kuehn |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
var jq = document.createElement('script'); | |
jq.src = "https://ajax.googleapis.com/ajax/libs/jquery/2.1.4/jquery.min.js"; | |
document.getElementsByTagName('head')[0].appendChild(jq); | |
// ... give time for script to load, then type (or see below for non wait option) | |
//localStorage.setItem("playbackRate", 2.1); | |
console.log('[start]Pluralsight Continuous Play'); | |
window.setInterval(function(){ |
This is a note for myself describing various Visual Basic macros construction strategies that could be used for remote code execution via malicious Document vector. Nothing new or fancy here, just a list of techniques, tools and scripts collected in one place for a quick glimpse of an eye before setting a payload.
All of the below examples had been generated for using as a remote address: 192.168.56.101.
List:
- Page substiution macro for luring user to click Enable Content
- The Unicorn Powershell based payload
This section is a boiled down version of everything above. It should serve as an easy reference. These steps assume you've identified and installed the correct JDK.
- Locate the jar file: Extender > Extensions > Select extension > Details.
bapps\
directory is located atC:\Users\yourusername\AppData\Roaming\BurpSuite\bapps
- Backup the original jar file to a different folder, outside of bapps.
- Change extension from .jar to .zip, extract contents, delete .zip file
- Make your modifications
- Re-jar:
jar cvf yourJarName.jar -C extractedContentsDirectory/ .
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# update apt-get | |
export DEBIAN_FRONTEND="noninteractive" | |
sudo apt-get update | |
# remove previously installed Docker | |
sudo apt-get remove docker docker-engine docker.io* lxc-docker* | |
# install dependencies 4 cert |