This document is under construction, but is intended to get you up and running quickly with cracking hashes in the cloud using the Paperspace service.
Resources used for this article:
This document is under construction, but is intended to get you up and running quickly with cracking hashes in the cloud using the Paperspace service.
Resources used for this article:
# ------Instructions--------- | |
# Install (and configure) subfinder, assetfinder, and httprobe | |
# go get -v github.com/projectdiscovery/subfinder/cmd/subfinder && go get -v github.com/tomnomnom/httprobe && go get -v github.com/tomnomnom/assetfinder | |
# cat firefox.sh >> ~/.bashrc | |
# source ~/.bashrc | |
# Usage - subf_ff target.tld | |
# asset_ff target.tld | |
subf_ff () { | |
subfinder -d $1 -silent -t 100 | httprobe -c 50 | sort -u | while read line; do firefox $line; sleep 10; done |
#!/bin/bash | |
if [ $# -eq 0 ] | |
then | |
echo $'Usage:\n\tcheck-smb-v3.11.sh TARGET_IP_or_CIDR' | |
exit 1 | |
fi | |
echo "Checking if there's SMB v3.11 in" $1 "..." | |
nmap -p445 --script smb-protocols -Pn -n $1 | grep -P '\d+\.\d+\.\d+\.\d+|^\|.\s+3.11' | tr '\n' ' ' | replace 'Nmap scan report for' '@' | tr "@" "\n" | grep 3.11 | tr '|' ' ' | tr '_' ' ' | grep -oP '\d+\.\d+\.\d+\.\d+' |
0 | |
00 | |
01 | |
02 | |
03 | |
1 | |
1.0 | |
10 | |
100 | |
1000 |
import sys | |
import yaml | |
def parse_wifi_map(map_path): | |
with open(map_path, 'r') as f: | |
data = f.read() | |
wifi_map = yaml.load(data) | |
devices = set() |
I now do password cracking in the cloud using a suped up AWS rig. More details here.
This document is under construction, but is intended to get you up and running quickly with cracking hashes in the cloud using the Paperspace service.
Resources used for this article:
In February 2017, Google announced the availability GPU-based VMs. I spun up a few of these instances, and ran some benchmarks. Along the way, I wrote down the steps taken to provision these VM instances, and install relevant drivers.
Update April 2019: Updated instructions to use instances with the Tesla T4 GPUs.
#!/bin/bash | |
# | |
# Attack created by Mubix. For more information see: | |
# https://room362.com/post/2016/snagging-creds-from-locked-machines | |
# Modified for Nethunter by Binkybear | |
# | |
# ================== # | |
# Check for root | |
# ================== # |
#!/bin/bash | |
# Targeted jammer | |
NIC=$1 # Your wireless NIC | |
BSSID=$2 # Your target BSSID | |
if [ "$NIC" == "" ]; then | |
echo "No NIC defined." | |
exit 1 | |
fi |
#!/bin/bash | |
sudo apt-get install git | |
cd /tmp/ | |
git clone https://github.com/darkoperator/MSF-Installer.git | |
cd MSF-Installer | |
sudo ./msf_install.sh -i | |
source ~/.bashrc | |
sudo chmod 0666 /usr/local/share/metasploit-framework/log/production.log |