Skip to content

Instantly share code, notes, and snippets.

@grutz
grutz / crack-all-lm.sh
Created August 21, 2012 16:13
Crack All LANMAN Hashes!
#!/bin/bash
# crack-all-lms-avenger
# (c) 2012 by Kurt Grutzmacher ([email protected])
# License: BSD 3-Clause - http://opensource.org/licenses/bsd-3-clause
#
# So you have a pwdump file and it has some LANMAN hashes, eh? Run this and I
# guarantee you'll crack a ton of them!
#
# Some paths are hardcoded. YMMV. No warranty express or implied. See your
@grutz
grutz / generate-religious-books.py
Created August 21, 2012 18:55
Generate Religious Book/Chapter/Verse combinations
#!/usr/bin/env python
"""
Bible/Quran books, chapters, and verse wordlist generator
This script creates an output of books of the Bible and Quran, permutations of their
chapters and verses. Includes common abbreviations of book names and the Spanish equivalent
for the Bible.
(c) 2012 Kurt Grutzmacher <[email protected]>
@grutz
grutz / gist:6206693
Created August 11, 2013 20:24
CMIYC 2013: Challenge 9 PFX Crack
grutz@beelzebubba:2013-cmiyc-street-challenges_1-9$ tar -tvf Challenge9_street.tar.xz
drwxr-sr-x root/root 0 2013-08-01 20:12 Challenge9_street/
-rw-r--r-- root/root 329 2013-08-01 20:12 Challenge9_street/README
-rw-r--r-- root/root 67108864 2013-08-01 20:12 Challenge9_street/efs.dd
grutz@beelzebubba:2013-cmiyc-street-challenges_1-9$ cd Challenge9_street
grutz@beelzebubba:loop$ Challenge9_street$ cat README
The filesystem in this .dd image has some encrypted files within it.
If you recover any of the passwords needed to decrypt the files,
@grutz
grutz / chall9-info.txt
Last active December 20, 2015 22:39
CMIYC 2013: Challenge 9 Info
grutz@beelzebubba:2013-cmiyc-street-challenges_1-9$ tar -xvf Challenge9_street.tar.xz
drwxr-sr-x root/root 0 2013-08-01 20:12 Challenge9_street/
-rw-r--r-- root/root 329 2013-08-01 20:12 Challenge9_street/README
-rw-r--r-- root/root 67108864 2013-08-01 20:12 Challenge9_street/efs.dd
grutz@beelzebubba:2013-cmiyc-street-challenges_1-9$ cd Challenge9_street
grutz@beelzebubba:Challenge9_street$ cat README
The filesystem in this .dd image has some encrypted files within it.
If you recover any of the passwords needed to decrypt the files,
@grutz
grutz / cmiyc-chall9-fs.txt
Created August 11, 2013 20:30
CMIYC 2013: Challenge 9 Loop filesystem
grutz@beelzebubba:Challenge9_street$ cd loop
grutz@beelzebubba:loop$ ls
backup $RECYCLE.BIN secret documents System Volume Information
grutz@beelzebubba:loop$ ls backup
63492B3A0CE6EF8BBFD60B8446C95A76D26E30C7 mabel.pfx
grutz@beelzebubba:loop$ ls secret\ documents/
dipper.txt mabel.txt shared.txt
@grutz
grutz / cmiyc-chall9-pfx-crack.txt
Last active December 20, 2015 22:39
CMIYC 2013: Challenge 9 PFX Cracking
grutz@beelzebubba:loop$ backup$ openssl pkcs12 -in backup/mabel.pfx
Enter Import Password:
Mac verify error: invalid password?
grutz@beelzebubba:loop$ /opt/pw-crackers/jtr/JohnTheRipper/run/pfx2john backup/mabel.pfx
mabel:$pfx$*2558*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
@grutz
grutz / cmiyc-chall3.txt
Created August 11, 2013 23:16
CMIYC 2013: Street Challenge 3
grutz@beelzebubba:2013-cmiyc-street-challenges_1-9$ tar -xvf Challenge3_street.tar.xz
Challenge3_street/id2entry.bdb
grutz@beelzebubba:2013-cmiyc-street-challenges_1-9$ cd Challenge3_street/
grutz@beelzebubba:Challenge3_street$ file id2entry.bdb
id2entry.bdb: Berkeley DB (Btree, version 9, native byte-order)
grutz@beelzebubba:Challenge3_street$ strings id2entry.bdb | grep SSHA | head
&{SSHA}rUEBr1cZJEclB1oQP/XnzK2T36aKsZzH
&{SSHA}VWbYRWmrB/Mv3VWw3lL17z6t62BY+7at
&{SSHA}X0qLhkDDL7o+rIWc5VbMN5bmJu7fcAh2
&{SSHA}RvIG3vxCOy/MAgL5eS9prXfHv2JEt4G6

Keybase proof

I hereby claim:

  • I am grutz on github.
  • I am grutz (https://keybase.io/grutz) on keybase.
  • I have a public key whose fingerprint is 8B59 F3BF 6E27 1945 BB27 2367 91AC A71E 80F4 E20A

To claim this, I am signing this object: