- Recon
- Find vuln
- Exploit
- Document it
Unicornscans in cli, nmap in msfconsole to help store loot in database.
#!/bin/sh | |
java -jar -Xmx2g -Djava.awt.headless=true ~/BurpSuitePro/burpsuite_pro.jar http jerrygamblin.com 80 | |
cp *.html ~/BurpSuitePro/scan.html | |
wkhtmltopdf scan.html scan.pdf | |
curl -F [email protected] -F initial_comment="BurpProxy JerryGamblin.com Scan" -F channels=#burpreports -F token=(Your Token) https://slack.com/api/files.upload | |
rm *.html | |
rm *.pdf |
# ___ ___ __ __ | |
# / | __ ______/ (_) /_____/ / | |
# / /| |/ / / / __ / / __/ __ / | |
# / ___ / /_/ / /_/ / / /_/ /_/ / | |
# /_/ |_\__,_/\__,_/_/\__/\__,_/ | |
# | |
# Linux Audit Daemon - Best Practice Configuration | |
# /etc/audit/audit.rules | |
# | |
# Compiled by Florian Roth |
# -*- coding: utf-8 -*- | |
import requests | |
import os | |
from time import time as timer | |
from bs4 import BeautifulSoup | |
from multiprocessing.dummy import Pool as ThreadPool | |
# import for "'ascii' codec can't decode byte" error | |
import sys |
#!/bin/bash | |
curl -s https://www.blackhat.com/us-17/briefings.html | egrep 'https://www.blackhat.com/docs/us-17/.*\.pdf' | awk -F '"' '{ print $4 }' | while read URL; | |
do | |
F=$(basename $URL) | |
if [ ! -r $F ]; then | |
curl -s -o $F $URL | |
echo "Scrapped $f" | |
fi | |
done |
# Serving Random Payloads with NGINX | |
# add set_random module https://github.com/openresty/set-misc-nginx-module#set_random | |
# edit file /etc/nginx/sites-enabled/default | |
set_random $uri 1 3; | |
map $uri $payloads { | |
1 /payload.lnk; | |
2 /payload.hta; | |
3 /payload.exe; |
Steps to install Metasploit on Windows 10 using the Windows Subsystem for Linux | |
1.) Enable Developer Mode | |
C:\> reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AppModelUnlock" /t REG_DWORD /f /v "AllowDevelopmentWithoutDevLicense" /d "1" | |
2.) Enable Windows Subsystem for Linux | |
C:\> DISM /online /enable-feature /featurename:Microsoft-Windows-Subsystem-Linux | |
3.) Reboot |
hashcat (v3.30) starting in benchmark mode... | |
... | |
OpenCL Platform #1: NVIDIA Corporation | |
====================================== | |
* Device #1: Tesla K80, 2047/11439 MB allocatable, 13MCU | |
* Device #2: Tesla K80, 2047/11439 MB allocatable, 13MCU | |
* Device #3: Tesla K80, 2047/11439 MB allocatable, 13MCU | |
* Device #4: Tesla K80, 2047/11439 MB allocatable, 13MCU | |
* Device #5: Tesla K80, 2047/11439 MB allocatable, 13MCU |
#!/bin/bash | |
python3 bot.py |
RSA 2017 DevOOPS: Attacks And Defenses For DevOps Toolchains Talk Links SessionID: HTA-W02 | |
https://www.slideshare.net/chrisgates/devoops-attacks-and-defenses-for-devops-toolchains | |
Past talks: | |
http://www.slideshare.net/KenJohnson61/aws-surival-guide | |
[Ken Johnson earlier talk on AWS security, dedicated to using these services (cloudwatch/config/cloudtrail)] | |
https://www.youtube.com/watch?v=g-wy9NdATtA&feature=youtu.be |