Pentesting-Exploitation Programs and Commands , Protocols Network / Ports
This is a gist used in the following blog posts:
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/sh | |
| systemctl enable ssh; | |
| systemctl start ssh; | |
| service ssh start; | |
| apt-get install gpg-agent; | |
| echo "deb http://http.kali.org/kali kali-rolling main contrib non-free" > /etc/apt/sources.list; | |
| gpg --keyserver hkp://keys.gnupg.net --recv-key 7D8D0BF6; | |
| gpg --fingerprint 7D8D0BF6; | |
| gpg -a --export 7D8D0BF6 | apt-key add -; |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| 'use strict'; | |
| const express = require('express'); | |
| const bodyParser = require('body-parser'); | |
| const { default: RuntimeClientFactory, TraceType } = require("@voiceflow/runtime-client-js"); | |
| const {randomBytes} = require('crypto') | |
| function generateId(length) { | |
| return randomBytes(length).reduce((p, i) => p + (i % 32).toString(32), '') | |
| } |
Magic crafts to make Ubuntu much awesomeness.
Install better OSD https://extensions.gnome.org/extension/1345/better-osd/
Size: 7
Hide delay: 1500
// Right bottom:
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| cat ~/domain.txt | httprobe | while read url;do ww=$(for i in "X-Oversized-Header-1: Big_Valuetestetstsetsetstsetestsetsetsetsetsetestsetsetsetsetsetsetsetsetsetesset" "X-Meta-Malicious-Header: \r\n" "X-HTTP-Method-Override: POST" "X-Forwarded-Port: 123" "X-Forwarded-Host: $url:123";do curl -s -L -I -H $i $url;done|grep HTTP|grep -v '301 '|awk '{ printf "%3d: %s\n", NR, $0 }');echo -e "\e[1;32m$url\e[0m""\n""$ww""\n";done |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| resolvers: | |
| - 1.1.1.1 | |
| - 1.0.0.1 | |
| - 8.8.8.8 | |
| - 8.8.4.4 | |
| - 9.9.9.9 | |
| - 9.9.9.10 | |
| - 77.88.8.8 | |
| - 77.88.8.1 | |
| - 208.67.222.222 |
I've transformed this gist into a git repository.
Whenever you research a certain vulnerability ask yourself these questions and please answer them for us
Does the exploited service write a log?
(check ls -lrt /var/log or lsof +D /var/log/ or lsof | grep servicename)
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| parse_user_options() { | |
| local -r args=("${@}") | |
| local opts | |
| # The following code works perfectly for | |
| opts=$(getopt --options a:,f,h --long abc:,help,flag -- "${args[@]}" 2> /dev/null) || { | |
| usage | |
| die "error: parsing options" "${error_parsing_options}" | |
| } | |
| eval set -- "${opts}" | |
| while true; do |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/env bash | |
| #: Your comments here. | |
| set -o errexit | |
| set -o nounset | |
| set -o pipefail | |
| work_dir=$(dirname "$(readlink --canonicalize-existing "${0}" 2> /dev/null)") | |
| readonly conf_file="${work_dir}/script.conf" | |
| readonly error_reading_conf_file=80 | |
| readonly error_parsing_options=81 | |
| readonly script_name="${0##*/}" |